[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 65.050557][ T27] kauditd_printk_skb: 7 callbacks suppressed [ 65.050567][ T27] audit: type=1800 audit(1568714741.353:29): pid=9691 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 65.076758][ T27] audit: type=1800 audit(1568714741.353:30): pid=9691 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.2' (ECDSA) to the list of known hosts. 2019/09/17 10:05:52 fuzzer started 2019/09/17 10:05:53 dialing manager at 10.128.0.26:43233 2019/09/17 10:05:53 syscalls: 2487 2019/09/17 10:05:53 code coverage: enabled 2019/09/17 10:05:53 comparison tracing: enabled 2019/09/17 10:05:53 extra coverage: extra coverage is not supported by the kernel 2019/09/17 10:05:53 setuid sandbox: enabled 2019/09/17 10:05:53 namespace sandbox: enabled 2019/09/17 10:05:53 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/17 10:05:53 fault injection: enabled 2019/09/17 10:05:53 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/17 10:05:53 net packet injection: enabled 2019/09/17 10:05:53 net device setup: enabled 10:07:26 executing program 0: getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@remote, @dev}, &(0x7f0000000040)=0x8) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x8000, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2600060}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x8, 0x70bd2c, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8002012}, 0x40000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4880420}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, r2, 0x8, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xffffffff, 0x10001, 0xc5, 0x8ac}}}}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4008040) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r3, &(0x7f00000005c0)={&(0x7f0000000340)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000380)="e5840221d090d7aca189d4ba525169673c0b165b2664870ab66f9aaf82ad81e90cc628f083fb3d237fc5ff6d6968cabaad0a88108115b6921efa812f95b81bfb8d01e587ef9e38bc56a86a1aef3c0f532cf1ac2f81d963b69674c805d381087cceb093a1ed50c7180c07a1bfca71a52180db79ffdec9071739e8d59730039d54fdfa4508639a9983a36142d2e2f09f8112d357911345edae3056ee4021c470489e8c4227f8c106d294b3bdbf9e333bac9ae558d7cc8f4e1e016c8c2eefa19e46a97673227c2ea570d7e70cc95ea6cd85241f92ba5a517029ab7bbf044697a7ffe68ce21d2374a9c2bde8866422b12cfcfd301273ac", 0xf5}, {&(0x7f0000000480)="5a619a452b762e4ad2bf80d5738f0899614e90dde3a565d9953fb0c747d939e70e005cb9b2a7061884bd7bd3905ce206171741892171aae941534f7c7dcf7a5495d2295873666a22935e0ed01b5de333d8", 0x51}, {&(0x7f0000000500)="8a9b7493", 0x4}, {&(0x7f0000000540)="16f3414ea43a95b1d564f93b6d79", 0xe}], 0x4}, 0x44000000) ustat(0x10000, &(0x7f0000000600)) socket$bt_bnep(0x1f, 0x3, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup/syz0\x00', 0x1ff) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000680)={0x6, [0x82, 0x80, 0x3, 0xbc9e, 0x8, 0x7fffffff]}) sendto$rxrpc(r3, &(0x7f00000006c0)="443a723a8e1230a439c6c5", 0xb, 0x4000, &(0x7f0000000700)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x24) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000740)='/dev/null\x00', 0x8000, 0x0) write$P9_RXATTRCREATE(r4, &(0x7f0000000780)={0x7, 0x21, 0x2}, 0x7) pipe2(&(0x7f00000007c0)={0xffffffffffffffff}, 0x4000) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x3) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000800)={0x5, 0xff, 0x6, 0x1, 0x3f, 0x5}) openat$md(0xffffffffffffff9c, &(0x7f0000000840)='/dev/md0\x00', 0x200, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000880)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000008c0)={'icmp\x00'}, &(0x7f0000000900)=0x1e) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/net/pfkey\x00', 0x400, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r6, 0x0, 0x48f, &(0x7f0000000980)={0xf776bfed8a8e0b48, @broadcast, 0x4e23, 0x3, 'ovf\x00', 0x1, 0x8, 0xa}, 0x2c) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/full\x00', 0x80a01, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r7, 0x800443d2, &(0x7f0000000a80)={0x4, &(0x7f0000000a00)=[{}, {}, {}, {}]}) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/btrfs-control\x00', 0x280000, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r8, 0x800443d2, &(0x7f0000000bc0)={0x9, &(0x7f0000000b00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]}) syz_open_dev$vbi(&(0x7f0000000c00)='/dev/vbi#\x00', 0x3, 0x2) write$P9_RXATTRWALK(r5, &(0x7f0000000c40)={0xf, 0x1f, 0x1, 0x5}, 0xf) rt_sigpending(&(0x7f0000000c80), 0x8) syzkaller login: [ 169.913461][ T9855] IPVS: ftp: loaded support on port[0] = 21 10:07:26 executing program 1: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) fdatasync(r0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@tipc=@id, &(0x7f0000000100)=0x80, 0x800) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000001c0)={0xffffffffffffffff, r2, 0x0, 0x51, &(0x7f0000000140)="9f3a45daadfc877b7ba5f8bd64744c20f030b3c98b80a8a664faaea78d25151193ec7cdec6d0e5d38f7e388d92d55328b5e9b8cd7d737a7194f16a981796efe1763ed7c1314a4a23f3020e9ade38e8721f", 0x98a9, 0xfffffffffffffff9, 0xffffffff, 0x704ca398, 0x2, 0x2, 0x6b, 'syz0\x00'}) r3 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x1, 0x88000) r4 = socket$pppoe(0x18, 0x1, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000300)='/dev/capi20\x00', 0x20280, 0x0) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000340)=[r4, r5, r6, r7, r0], 0x5) ioctl$VIDIOC_S_JPEGCOMP(r7, 0x408c563e, &(0x7f0000000380)={0x6, 0x8, 0x36, "d73863a9ef76b113a28be5617dccb158bd9f1fa7b6b1c5a414b23bddf0e7007b0a59397e2627f391c32a33fd9c8794a5ce199734393a3b30d954bfab", 0x3c, "dd0032a6d746c7364140e72de4c1b309e76db9626aeb839d85677b60b4112ac81545415046db92d205fa255078321f31f18e2e9cf71ce54977fcc171", 0x10}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000440)=0x8) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000480)='/dev/hwrng\x00', 0x1a840, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0xffffffffffffffff, r3, 0x0, 0x1, &(0x7f00000004c0)='\x00', 0xffffffffffffffff}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r8, 0xc1105517, &(0x7f0000000580)={{0x0, 0x0, 0x80000001, 0x9, '\x00', 0xffffffffffff0000}, 0x4, 0x40, 0x7ff, r9, 0x1, 0x4, 'syz1\x00', &(0x7f0000000540)=['*@vmnet1\x00'], 0x9, [], [0x8001, 0x44, 0x8, 0xfffffffffffffffa]}) r10 = syz_open_procfs(r9, &(0x7f00000006c0)='autogroup\x00') ioctl$BLKGETSIZE(r10, 0x1260, &(0x7f0000000700)) socket$l2tp(0x18, 0x1, 0x1) r11 = getpgrp(r9) prctl$PR_SET_PTRACER(0x59616d61, r11) ftruncate(r2, 0x7) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000740)=0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000780)='reno\x00', 0x5) r12 = syz_open_dev$usbmon(&(0x7f00000007c0)='/dev/usbmon#\x00', 0x3f, 0x80) ioctl$DRM_IOCTL_SET_MASTER(r12, 0x641e) r13 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000800)='syz0\x00', 0x200002, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r13, 0x400c6615, &(0x7f0000000840)) r14 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000880)='io\x00') getsockopt$TIPC_DEST_DROPPABLE(r14, 0x10f, 0x81, &(0x7f00000008c0), &(0x7f0000000900)=0x4) [ 170.007665][ T9855] chnl_net:caif_netlink_parms(): no params data found [ 170.069040][ T9855] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.085053][ T9855] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.115024][ T9855] device bridge_slave_0 entered promiscuous mode [ 170.122518][ T9855] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.129645][ T9855] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.137404][ T9855] device bridge_slave_1 entered promiscuous mode [ 170.155780][ T9855] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 10:07:26 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x10000, 0x0) r1 = userfaultfd(0x80000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x80000000}) r2 = msgget$private(0x0, 0x40) msgsnd(r2, &(0x7f0000000080)={0x3, "09c387ce679ec020fd52cc75ab13dffec8b4fb284faaa13203d8a93d6b8b49f8d6e887252e5312d6bc64e88eb191b280e7bc91"}, 0x3b, 0x400) r3 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x240) r4 = getpid() fcntl$setownex(r3, 0xf, &(0x7f0000000100)={0x2, r4}) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x900, 0x0) ioctl$PPPIOCATTCHAN(r5, 0x40047438, &(0x7f0000000180)=0x3) r6 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="506a1afd62c170284f21f666ef6248ffed022b76dadd9110ac7bcb8236d91066cb0ef5844bf153347488591df7ab7723bddb3d6eaf420bb85a7f0a60d677ee75c04db5ebee7b826ba95512963cb7ea33364fcd0b2dcd15beba05988c2eddfbfacbf37856020afe2e3e143f00ce7fb4b6b6293c0befd086fb1df6e57a19914a22ffd8c787a59c5c455b400274ff3d70727e166a8dac5cb156ba70c57bb40289626871166a263666ff54b0a1a70e4fcb07c8d47aaacfa60f80c115a37a76afa27d0938b32557653f2a49ae6b95f68902c25a74846d36499206321a359912087d15ce85d81f1a24f13c92a8dac4a9de4bd39c21e046a98be0b417", 0xf9, 0xffffffffffffffff) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r6, r7, 0xee01) r8 = syz_open_dev$radio(&(0x7f0000000400)='/dev/radio#\x00', 0x3, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={'vlan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000480)={'vcan0\x00', r9}) r10 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sequencer\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000500)={0x0, 0x2}, &(0x7f0000000540)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r10, 0x84, 0x7b, &(0x7f0000000580)={r11, 0x5}, 0x8) r12 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000680)='/dev/dlm-monitor\x00', 0x501200, 0x0) recvfrom$unix(r12, &(0x7f00000006c0), 0x0, 0x20, &(0x7f0000000700)=@abs={0x1, 0x0, 0x4e23}, 0x6e) ptrace$pokeuser(0x6, r4, 0x3, 0x5732) vmsplice(r5, &(0x7f0000000a40)=[{&(0x7f0000000780)="b910d029f834a46b881508b245fa3361c604a66478270b23f3ce2fa81df1d29b92667101f034b6020e736e65a86ce99c93c7f38620216030128ce0dcd01e363c8927965b8f1e63fa548799f2097f0141d4fd00dd8ea0067d6683149fd327d610c739b8f0a42997f68be8bfea752929d82782ee2bd023815ea527023380f04df52f055dff3447dc1434b0af28940af5efbb0dfa728857a9cfc0596cf177d152", 0x9f}, {&(0x7f0000000840)="80ca137f4eedafc42fbc1e11154a81e717a53239ec407793cc4a97b094345da9353821fb68ce53720b95e683cfea5640405f080fb0a037", 0x37}, {&(0x7f0000000880)="70b79b7a1f857a5a61ffa958f7bc263bd875332e9e65b8d27d988af2c11251633727f209281e696e304e78360167e07b9014dbdb102b8fe79486e1011dded07978c0af36eb286d187ae34e428af222e04ac5ff2166992f", 0x57}, {&(0x7f0000000900)="035d128e35830823e2983f11d12c394679c66f3dd58e476614bf3f4b820ae0fd54ac8d5abab327a2910abfe9cc86b5aebb2b6fa315bc7997d1b55c9bd6dad0ead223d640ff79532b0160afb9eec794e72eddad1ac1d222931e30f8780630c2be734ba40a33966de504281530101527aa70807131763af9c1d76184682350befb9dd8a0b2c32486abf1afdbd8df665314f7e78b0c701c7f4941a041", 0x9b}, {&(0x7f00000009c0)="b374bff02e5a10af9b73f5def7c69d222ffa3ff960adc9ac73bcfe6b30dba3755e5d5b39142b811a5a767ff789685a830e7b0466648c9fa222f396267e138a79e8831f7f98413bcc0ec280e8e52066936967a840a46fb6fbe514e539e5521116bec9dbdc2ab08b9745f9afae240fdbbce29ed61a917ee1e25d8001de03d579", 0x7f}], 0x5, 0x8) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000ac0)={0xffffffffffffffff, 0x1ff, 0xc2a}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r8, 0x6, 0x21, &(0x7f0000000b00)="e19745a6a8e63cc79428a23f0fe9f517", 0x10) bind(r12, &(0x7f0000000b40)=@pppoe={0x18, 0x0, {0x3, @broadcast, 'nr0\x00'}}, 0x80) sendto$isdn(r5, 0xfffffffffffffffd, 0x0, 0x0, &(0x7f0000000bc0)={0x22, 0x0, 0x7ff, 0x3, 0x7fffffff}, 0x6) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000c00)=0x3) ioctl$IOC_PR_CLEAR(r5, 0x401070cd, &(0x7f0000000c40)={0x3}) r13 = shmget(0x1, 0x2000, 0x10, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_UNLOCK(r13, 0xc) [ 170.166524][ T9855] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.177934][ T9858] IPVS: ftp: loaded support on port[0] = 21 [ 170.196839][ T9855] team0: Port device team_slave_0 added [ 170.206207][ T9855] team0: Port device team_slave_1 added [ 170.287635][ T9855] device hsr_slave_0 entered promiscuous mode 10:07:26 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x400000, 0x0) getpeername$tipc(r4, &(0x7f0000000240)=@name, &(0x7f0000000280)=0x10) r5 = syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x3, 0x400000) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x4abc724ba56ec208, 0x0) getsockopt$SO_TIMESTAMP(r6, 0x1, 0x40, &(0x7f0000000340), &(0x7f0000000380)=0x4) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000880)=@broute={'broute\x00', 0x20, 0x3, 0x47a, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000400], 0x0, &(0x7f00000003c0), &(0x7f0000000400)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x3, 0x1, 0x17524, 'bond_slave_0\x00', 'veth1_to_team\x00', 'rose0\x00', 'lo\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0x0, 0xff, 0xff, 0x0, 0xff, 0x1fe], @empty, [0xff, 0x0, 0x7f, 0x0, 0xff, 0x7f], 0xee, 0x196, 0x1c6, [@connlabel={'connlabel\x00', 0x8, {{0x1}}}, @nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x10001}}}], [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}, @common=@nflog={'nflog\x00', 0x50, {{0xfffffffffffffff9, 0x7, 0xec8c, 0x0, 0x0, "56f268fe79966f069ce5017e0ef850997f074cba84fe7fa4affe3d1273836e2dc4340f3dd95e95b4591ba30194e29d14da1162bec678c45d83f96781b93a94b1"}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}, {0x9, 0x6b, 0xf9, 'eql\x00', 'team_slave_1\x00', 'veth1_to_bridge\x00', 'team_slave_1\x00', @broadcast, [0xff, 0xa824d4419e98fdcc, 0xff], @dev={[], 0x26}, [0x0, 0x0, 0xff, 0x7f, 0xff], 0x6e, 0x6e, 0xe6, [], [], @common=@nflog={'nflog\x00', 0x50, {{0x7ff, 0x6, 0x4778, 0x0, 0x0, "80142722bac7d342c19afc1dbbbcd27f2117352971207690a9cfa98ce35a1417682f15df0c7fed117198d27a46286d7bf21ace2aab3f62f443754459bae3cc86"}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x1, [{0x0, 0x5fb5df37698bd765, 0x10, 'vcan0\x00', 'bond_slave_0\x00', 'vlan0\x00', 'veth0_to_team\x00', @dev={[], 0x17}, [0xff, 0x0, 0x0, 0x7f, 0xff], @broadcast, [0x0, 0x0, 0xff, 0x101, 0x0, 0xff], 0xae, 0x10e, 0x13e, [@quota={'quota\x00', 0x18, {{0x1, 0x0, 0x6e, 0x2}}}], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x8}}}, @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x3}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}]}, 0x4f2) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000900)='/dev/vcs\x00', 0x10480, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r7, 0x0, 0x80, &(0x7f0000001f40)=@filter={'filter\x00', 0xe, 0x4, 0x15b0, [0x0, 0x20000980, 0x20000b16, 0x20000c84], 0x0, &(0x7f0000000940), &(0x7f0000000980)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{0x9, 0x3a, 0x8848, 'veth1_to_bond\x00', 'nlmon0\x00', 'nlmon0\x00', 'gre0\x00', @random="299b4b23e245", [0xff, 0xff, 0x0, 0xff], @remote, [0x7f, 0x80, 0xff, 0xff, 0xff, 0xff], 0x9e, 0x11e, 0x166, [@pkttype={'pkttype\x00', 0x8, {{0x5}}}], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x8, 'syz0\x00', 0x40}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x4, 0x3, 0x9}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{0xe82bbf08f7178f83, 0x77, 0x17, 'veth0\x00', 'teql0\x00', 'bond_slave_1\x00', 'veth0_to_bond\x00', @empty, [0x101, 0xff, 0xff, 0x0, 0x0, 0xff], @remote, [0x861330cf16ff40f, 0xff, 0xff, 0xff], 0x6e, 0xee, 0x13e, [], [@common=@log={'log\x00', 0x28, {{0x6, "677ff8ef49b4750e601cfdf682ca94cfdcecae8814ffe937340a90f13ebf", 0xd}}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}], @common=@log={'log\x00', 0x28, {{0x200, "30b94f428abe33603431f897f561ce604bc105adcffa627fed58b214f3e7", 0x1}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{0x17, 0x12, 0xd, 'vlan0\x00', 'team0\x00', 'gre0\x00', 'team0\x00', @dev={[], 0xb}, [0xff, 0xff, 0xff, 0x0, 0x80, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0xff, 0x76e94fea21c9429c, 0x7f, 0xff, 0xff, 0xff], 0x9e, 0x9e, 0xee, [@cgroup0={'cgroup\x00', 0x8, {{0x3f}}}], [], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x8, 'syz1\x00', 0xa45}}}}, {0x9, 0x0, 0x6001, 'team_slave_1\x00', 'syz_tun\x00', 'ip6gre0\x00', 'bridge0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0xff, 0x0, 0x7f, 0x0, 0xff, 0xff], @local, [0x0, 0x0, 0x80, 0xff, 0xff, 0x101], 0x112e, 0x115e, 0x118e, [@among={'among\x00', 0x8b0, {{@offset, @zero, 0x0, {[0x3, 0x8, 0x7, 0xffff, 0x6, 0x1, 0x5, 0x8, 0x3ff, 0x1, 0x1f, 0x7d9110ff, 0x3ef, 0x6, 0x9, 0x6, 0x1, 0x8, 0x3, 0x307, 0x2, 0x5, 0x8, 0x6, 0xae2, 0x700, 0x1, 0x1, 0x9, 0x10001, 0xfffffffffffffeff, 0x401, 0xffff, 0x0, 0x9, 0x0, 0xbc1, 0x4, 0x3ff, 0x10001, 0x9, 0x100000000, 0x7fff, 0x6, 0x9, 0x5, 0x6, 0x3, 0x2, 0x3, 0x7, 0xffffffffffffffce, 0x9, 0xe5, 0x7, 0x293c, 0x6, 0x0, 0x4, 0x4, 0x8, 0x6, 0x4, 0xfffffffffffff001, 0x1, 0x3, 0x9, 0x3, 0xffffffffffffdce6, 0x100000, 0xde7f, 0x9432, 0x0, 0x0, 0x2, 0x833, 0xc0000, 0xffffffffffffffff, 0x1000, 0x800, 0x3, 0x2, 0x3, 0xa7, 0x764, 0x800, 0x5, 0xfff, 0x6, 0x200, 0x5, 0xecc3, 0x800, 0x1f, 0xffffffff, 0x15a1, 0x80000000, 0x4, 0x8, 0x8000, 0x1000, 0x401, 0x3, 0x2, 0x9, 0x95, 0x8, 0x62e65db7, 0x1ff, 0x1, 0x40, 0x4, 0xcfdd, 0x1, 0x1, 0x4, 0x7, 0x9, 0x7f, 0x100000000, 0x5, 0xfff, 0x1, 0x8, 0xffffffff, 0x7, 0x3, 0x401, 0x10001, 0x1, 0x401, 0x40, 0x36fe, 0x100000001, 0x8, 0x0, 0x4, 0x1, 0x0, 0x2, 0x9, 0x1, 0x1, 0x4, 0x7, 0x4, 0x7, 0x5, 0x0, 0x1, 0x1, 0xf7, 0x13918b21, 0x1e89, 0x4, 0x6, 0x95d2, 0x9b, 0x2, 0x81, 0x6, 0xa5, 0x9, 0x3, 0x10001, 0x8b7, 0xfff, 0x1, 0x101, 0x4, 0x7, 0x5, 0x7fffffff, 0x0, 0x8, 0x8, 0x58, 0x9, 0x73, 0xfe00000000, 0x200000000000000, 0x0, 0x8, 0x8, 0x1f, 0x236f0408, 0xffff, 0xfffffffffffffff7, 0x8, 0x1, 0xfffffffffffffffb, 0x5, 0x4bdc, 0x7, 0x100, 0x4, 0x6, 0x5, 0x0, 0x5, 0x0, 0x9, 0xffffffff, 0x8000, 0x3f, 0x4, 0x1000, 0x8, 0x0, 0x7f, 0x2, 0x3e7210a7, 0x4, 0x4, 0x10001, 0x80000000, 0x100, 0x7ff, 0x3, 0xff, 0xffffffffffffffdf, 0x8, 0x500000000000000, 0x2, 0x100, 0x0, 0xb42, 0xfffffffffffffffd, 0x8, 0x7, 0xfffffffffffffc01, 0x8, 0x87, 0x401, 0x8, 0x9, 0xfff, 0x9, 0x3, 0x6, 0x200, 0x81f, 0x4, 0x0, 0x6, 0x7, 0x0, 0x8000, 0x8001, 0x1, 0x0, 0x7, 0x5, 0x3, 0x2, 0x100000000, 0x1], 0x3, [{[0x7f, 0x447], @local}, {[0x4], @loopback}, {[0x2, 0x5], @local}]}, {[0x6, 0x4, 0x9, 0x7, 0x7, 0x6, 0x4, 0x1, 0x0, 0x7fffffff, 0x8, 0x8, 0xfff, 0x1ff, 0x7, 0x2, 0x6, 0x7, 0x1, 0x9, 0x80000000, 0x3, 0xfe00000000000000, 0x80, 0xb6f, 0x3, 0x2, 0x9, 0xff, 0x3, 0x400, 0x10, 0x8, 0x524f, 0x46a8, 0xfffffffffffffff8, 0x800, 0x6, 0x1f, 0x0, 0x101, 0xff, 0x8, 0x80000001, 0xffff, 0x4, 0x0, 0x3, 0x4, 0x1, 0x7, 0x2, 0x5, 0x8, 0xfffffffffffffa3a, 0x623c, 0x8, 0xffffffffffff72b9, 0x401, 0x3, 0x7, 0x3, 0x401, 0x10000, 0x800, 0x3, 0x10001, 0x8, 0x0, 0x9b, 0xd84, 0xf559, 0x8, 0x4, 0xc915, 0x8, 0xfffffffffffffffb, 0x0, 0x800, 0x8ad, 0x81, 0x101, 0xef, 0x8000, 0x5, 0x1, 0x400, 0x7, 0x6, 0x7fff800000, 0x7, 0x5, 0x6, 0x700, 0x8, 0xd44, 0xd6a3, 0x0, 0xf4, 0x1f, 0x100, 0x401, 0x7db, 0x8, 0x3, 0x3, 0x5, 0xffffffff, 0x2, 0xfff, 0x7fff, 0x5, 0x5, 0x7, 0x5, 0x7, 0x3, 0x680623a3, 0x400, 0xff, 0x0, 0x0, 0x4, 0x5, 0x0, 0x100, 0x0, 0x5, 0x1, 0xe2dc00000, 0xffffffffffffffe0, 0x5, 0x1, 0xdf2e, 0x100000000, 0xfff, 0x2, 0x0, 0x3, 0x1000, 0x4, 0xfffffffffffff000, 0x2, 0x7fff, 0x3f, 0x1, 0x4, 0x7fff, 0x1, 0xfff, 0xf0a4, 0x94, 0x8, 0xc6, 0xfffffffffffffffe, 0x4, 0x6, 0x3, 0xa30, 0x3f, 0x4, 0x4, 0x1, 0x1, 0x8, 0x6, 0x3, 0x7, 0xffff, 0x10000, 0x0, 0x3, 0x32fc80000, 0x100000001, 0x2, 0x0, 0x4000000, 0x401, 0x5b41, 0x231, 0x480000, 0x100000000, 0xe2, 0x5, 0x1, 0x9, 0x3, 0x7, 0x0, 0x3f, 0x3, 0x0, 0x20, 0x6, 0xff, 0x8, 0x8000, 0x1f2344d5, 0x6, 0x4, 0x8, 0x10001, 0x8000, 0x4, 0x6, 0x80000001, 0x7, 0xe1, 0x57e, 0x6, 0x0, 0x3, 0x3f, 0x423b, 0x35, 0x8000, 0xfffffffffffffffe, 0xfff, 0x9, 0x0, 0xfffffffffffff9b4, 0x8001, 0x7, 0x4, 0xc7, 0x3, 0x0, 0x80, 0x9, 0xe652, 0xd3, 0x7700, 0x400, 0x39, 0xfd, 0x3, 0x100000000, 0x80000001, 0x0, 0x6, 0x1, 0x7, 0x1, 0x9, 0x0, 0x7, 0x3, 0x4, 0x9, 0x3, 0x4, 0x6, 0x1ff, 0x8001, 0x1d, 0x7, 0xa72d], 0x9, [{[0x2, 0x7fff], @local}, {[0x78, 0x9], @initdev={0xac, 0x1e, 0x1, 0x0}}, {[0x4, 0xc0], @dev={0xac, 0x14, 0x14, 0xb}}, {[0x60f4c1dd, 0x9], @initdev={0xac, 0x1e, 0x1, 0x0}}, {[0x100, 0x6], @empty}, {[0x5, 0x3], @rand_addr=0x9}, {[0x4e9, 0x6], @empty}, {[0x100000000, 0x5], @dev={0xac, 0x14, 0x14, 0x18}}, {[0x80000001, 0xa8e], @multicast1}]}}}}, @u32={'u32\x00', 0x7c0, {{[{[{0x5}, {0x8, 0x2}, {0xfffffffffffffffd, 0x7}, {0x4}, {0x2, 0x3}, {0x40, 0x3}, {0x6}, {0x0, 0x3}, {0x7f}, {0xaa7, 0x2}, {0xa4}], [{0x10000, 0x6}, {0x0, 0x5}, {0x7, 0xd4}, {0x7fff, 0x759}, {0x4, 0xfffffffffffffff7}, {0x6, 0x8}, {0x6, 0x9}, {0x1, 0x1}, {0x4, 0x8}, {0x40c, 0x80000000}, {0x2, 0x3}], 0x8, 0x8}, {[{0x1, 0x1}, {0x0, 0x2}, {0x9, 0x938d13d3fdbca485}, {0x7, 0x1}, {0x7, 0x1}, {0x1, 0x2}, {0x1000, 0x3}, {0x6}, {0x2, 0x2}, {0x4, 0x2}, {0x7a214d99, 0x1}], [{0x6, 0x100}, {0x80000001, 0xffffffffffffc7af}, {0x8, 0xc9a}, {0x3, 0x9}, {0x9, 0x9}, {0x80000001, 0x2}, {0x0, 0x7fffffff}, {0x3, 0x905}, {0x3ff, 0x4000000000000}, {0x40, 0x6}, {0x2, 0xff}], 0x2, 0x6}, {[{0x3, 0x2}, {0x3, 0xdfe3b9e0d3803c3d}, {0xa59}, {0x80000000}, {0x100000001}, {0x9d3, 0x2}, {0x6}, {0x0, 0x3}, {0x1}, {0x638e, 0x1}, {0x7, 0x2}], [{0x10000}, {0xfffffffffffffffb, 0xffff}, {0x3, 0x1f}, {0x8000, 0x8}, {0xc25, 0x1}, {0x8, 0xfff}, {0x0, 0x7ff}, {0x3, 0xfffffffffffffffa}, {0x20, 0x3}, {0x3, 0x8}, {0x1, 0x5}], 0x4}, {[{0x8, 0x2}, {0x10001}, {0x29, 0x3}, {0xf88, 0x2}, {0x3f3f, 0x3}, {0x8000, 0x3}, {0x1}, {0x6b, 0x3}, {0x7, 0x1}, {0x0, 0x8c0142d2639b1985}, {0x1f, 0x2}], [{0x3f, 0x9f0a00}, {0x80000001, 0x1ff}, {0x79d, 0x526}, {0xa9800000000000, 0x1ff}, {0x12, 0x7}, {0x101, 0x7}, {0x764, 0x800}, {0x4, 0x5}, {0x7ff, 0xc84}, {0x4, 0x3}, {0x4, 0xfb4}], 0x8, 0x1}, {[{0xfffffffffffffff7, 0x2}, {0x8}, {0x20, 0x3}, {0x3}, {0x1, 0x2}, {0x5, 0x2}, {0x0, 0x2}, {0x6, 0x2}, {0x1, 0x7}, {0x4, 0x3}, {0x72cc}], [{0x10000, 0x5}, {0x0, 0x3f}, {0x1, 0xbddd}, {0x80, 0x48bd}, {0xdd0, 0x3}, {0x3, 0x7f}, {0xfffffffffffffff9, 0x9}, {0x1, 0x1}, {0x1, 0x8}, {0x4, 0x8}, {0xbef, 0x482}], 0x3, 0x2}, {[{0x7fff, 0x1}, {0x989b}, {0xffffffffffffffff, 0x1}, {0x770, 0x3}, {0x5, 0x2}, {0xc3, 0x1}, {0x80, 0x2}, {0x1, 0x1}, {0xfffffffffffff800}, {0x80}, {0x5, 0x3}], [{0x8000, 0x4000000000000000}, {0xfffffffffffff001, 0x4}, {0x4, 0x380000000000}, {0x2, 0x9}, {0x3, 0xa4bf}, {0x9, 0x3}, {0xfff, 0x1000}, {0x2, 0x4}, {0x3, 0x252}, {0x680000000000, 0x3}, {0x2, 0x8}], 0x8, 0x8}, {[{0x9, 0x1}, {0x8000}, {0x48}, {0x7, 0x1}, {0x80, 0x1}, {0x8001, 0x2}, {0x4, 0x3}, {0x6, 0x3}, {0x7, 0x2}, {0x6, 0x1}, {0x1}], [{0x4}, {0xffff, 0x5}, {0xfff, 0x7}, {0x1, 0xc31}, {0x5, 0x9}, {0x5, 0x6}, {0x8, 0x3}, {0x4, 0x87}, {0x6, 0xfffffffffffffc00}, {0x5, 0xfffffffffffffffb}, {0x3, 0x2}], 0x8, 0x6}, {[{0x5, 0x2}, {0x3, 0x3}, {0x5, 0x1}, {0x8000}, {0x1, 0x3}, {0x2, 0x2}, {0x4}, {0x1, 0x2}, {0xfffff80000000000, 0x1}, {0x8}, {0x0, 0x3}], [{0xba, 0x80000001}, {0x6, 0x40}, {0x1, 0x6}, {0x793, 0xe00}, {}, {0x81, 0x9}, {0x4, 0xff}, {0x7, 0x80}, {0x2, 0x800000000}, {0x5, 0x8}, {0x4, 0x92cf}], 0x2, 0x2}, {[{0x6}, {0x1, 0x1}, {}, {0x4, 0x2}, {0x9, 0x1}, {0x7fff}, {0x3a5, 0x1}, {0x2}, {0x7}, {0x3, 0x2}, {0x3, 0x2}], [{0x6, 0x5d2a}, {0x7, 0x7}, {0x0, 0x7}, {0xa21b, 0x8}, {0x3f, 0x7}, {}, {0x5, 0x7}, {0x81, 0x6}, {0x5, 0x2}, {0x7, 0x25f}, {0x15b9, 0x2}], 0x9, 0x6}, {[{0x7, 0x3}, {0x1, 0x2}, {0x8, 0x2}, {0x8, 0x1}, {0x1c98, 0x2}, {0x81, 0x5}, {}, {0x1, 0x6}, {0x8, 0x2}, {0x9, 0x26e1e005ab5d2c4a}, {0x2, 0x1}], [{0x3f, 0x80000000}, {0xbef7, 0x400}, {0x25, 0xfc}, {0x5275}, {0xfd0, 0x92}, {0x59c, 0xd8}, {0x4e7, 0x2}, {0x3, 0x4}, {0x8, 0x81}, {0x9, 0x6598f7fb}, {0x7ff}], 0x1, 0x3}, {[{0x1, 0x3}, {0xff, 0x4}, {0x30, 0x3}, {0x3, 0x66b43bd4b70d998d}, {0x1f}, {0x6, 0x6}, {0x4, 0x1}, {0x1, 0x1}, {0x100}, {0x3a06, 0x3}, {0x10001, 0x3}], [{0x8, 0x9}, {0xd967, 0x5}, {0x3, 0x7}, {0x695, 0x1}, {0x7, 0x8}, {0x3, 0x3237}, {0x90a, 0x800}, {0x1010000000, 0x8}, {0x6, 0x1f}, {0x7ff, 0xd7}, {0x7fff, 0xbd3}], 0x2, 0x4}], 0x3}}}], [@common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}], @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x3}}}}]}]}, 0x1628) r8 = syz_open_dev$sndpcmp(&(0x7f0000001fc0)='/dev/snd/pcmC#D#p\x00', 0x200, 0x0) ioctl$TIOCMGET(r8, 0x5415, &(0x7f0000002000)) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000002040)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r9, 0xc0286405, &(0x7f0000002080)={0x1, 0x7, r2, 0x0, r3, 0x0, 0x9, 0x5}) ioctl$KDDISABIO(r5, 0x4b37) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000020c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(r10, &(0x7f0000002100)={{0xcc, 0xffffffff, 0x8, 0x12a, 0x3d9, 0x5, 0x83, 0x7fff}, "471e6d08846f0942c6f6de1c4c9ab35f0533e6d2ba1d4ab8196af104387623f47eff2a7f185eb251b437a2f58f2aa64b7ee7a24f6bffb1a6b0dc69a58c8fae77cbb0770fc775a1cd5d3bac8834888f60be3748a0663991985775a557a411daf4be2304ae664e4d0f830be8ad1216f1b2abe8042e0b7d1563cf53ced6928fbb49f9811ae3128ffd3ad8420714f630ccd2a0e5102af2d8a0ccf68889b731770aa7ce5d141e69ca1c1ab772c0c38d8913e497f97ce379459afc66afe636d1edb03ab9ac03381c0dc5c591d970e518b3040a46bffa81ac9dce155152", [[], [], [], [], [], [], []]}, 0x7fa) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000002900)={0xfffffffffffffffd, 0x31f2, 0x2, 0x82cf, 0x5, 0x0, 0x200, 0x7f, 0x1, 0x3, 0x14000}, 0xb) r11 = syz_open_dev$dmmidi(&(0x7f0000002940)='/dev/dmmidi#\x00', 0x0, 0x2000) accept4$llc(r11, &(0x7f0000002980)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000029c0)=0x10, 0x800) r12 = syz_open_dev$media(&(0x7f0000002a00)='/dev/media#\x00', 0x7, 0x200000) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r12, 0x84, 0x7, &(0x7f0000002a40)={0x8001}, 0x4) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002a80)='cpuset.effective_cpus\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000002ac0)={0x0, 0xc4}, &(0x7f0000002b00)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r13, 0x84, 0x76, &(0x7f0000002b40)={r14, 0xd5f5}, &(0x7f0000002b80)=0x8) r15 = openat$mixer(0xffffffffffffff9c, &(0x7f0000002c80)='/dev/mixer\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r15, 0x84, 0xd, &(0x7f0000002cc0), &(0x7f0000002d00)=0x4) fallocate(0xffffffffffffffff, 0xa, 0x401, 0x800) [ 170.365597][ T9855] device hsr_slave_1 entered promiscuous mode [ 170.423979][ T9855] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.431101][ T9855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.438459][ T9855] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.445528][ T9855] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.464360][ T9862] IPVS: ftp: loaded support on port[0] = 21 [ 170.464375][ T9860] IPVS: ftp: loaded support on port[0] = 21 [ 170.565488][ T9858] chnl_net:caif_netlink_parms(): no params data found [ 170.597577][ T9855] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.628456][ T9858] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.636192][ T9858] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.644122][ T9858] device bridge_slave_0 entered promiscuous mode [ 170.667114][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 10:07:27 executing program 4: write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x5}, 0x10) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000100)={r1, 0x24, "1bf10c8b6835c057e58f1d0c0bb7e620b756090064aa44eb494ddf8109eca9774b7072c0"}, &(0x7f0000000140)=0x2c) write$UHID_INPUT2(r0, &(0x7f0000000180)={0xc, 0xbd, "9375d7e411f7aefcc1acfcc0e899c3070b604a5fb2ea8da7563dd2e40bf9f621a71e0d23d8fdfeab21b2dccb324f93f00edb438bd1ecee4a40e7776c0d983b60b27fd88c019d48aa483ef5e41cef9226dee0b621af5349513613f6bf70533ac151734c66d15b201e45b238e546076c962c476d313b6ae1088e1bbb455a19c13604c8bbdfa43ec0ba43dd409e263cd47167ebd5764dc59498279dc0aff049a4a01295ef30eadb2a77f4a7c8cf05d3d10953d3ccbae364619779a16c7f0e"}, 0xc3) r3 = socket$inet_sctp(0x2, 0x5, 0x84) fcntl$notify(r3, 0x402, 0x2) r4 = dup(r3) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)={0x12c, r5, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x10c, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x59e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x11}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7147}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6dd9}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x10}, 0x2) accept4$ax25(r0, 0x0, &(0x7f00000004c0), 0x800) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000540)={0x6, 0x7, 0x4, 0x70000, {0x77359400}, {0x5, 0xc, 0x3, 0x7fff, 0x9, 0xcc, "4aabf1bd"}, 0x10000, 0x4, @planes=&(0x7f0000000500)={0x8, 0x4, @userptr=0xedf7, 0x5}, 0x4}) ioctl$VIDIOC_S_OUTPUT(r4, 0xc004562f, &(0x7f00000005c0)=0x79d4) r6 = accept$inet6(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0x1c) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000680)={r2, 0xe41}, &(0x7f00000006c0)=0x8) socketpair(0x2614bf06c103fe38, 0x1, 0xfff, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) connect$x25(r8, &(0x7f0000000740)={0x9, @remote={[], 0x1}}, 0x12) lsetxattr$security_ima(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@md5={0x1, "e6d7a2e97af071ec78d4e45fedd9c5e7"}, 0x11, 0x1) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000840)={0x0, 0x0, 0x0, 0xfffffffffffffffb}, &(0x7f0000000880)=0x18) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r9, 0x84, 0x70, &(0x7f00000008c0)={r10, @in={{0x2, 0x4e22, @loopback}}, [0x40, 0x4, 0x9600000000000, 0x3, 0x7, 0xffffffffffff6c72, 0x81, 0x1, 0x80, 0x6, 0x4, 0x9, 0x8, 0x7ff, 0x8001]}, &(0x7f00000009c0)=0x100) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000a00)={r7, 0x401}, &(0x7f0000000a40)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000a80)={r11, @in={{0x2, 0x4e22, @local}}, 0x0, 0x6}, &(0x7f0000000b40)=0x90) r13 = syz_open_dev$swradio(&(0x7f0000000b80)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000bc0)={0x9b, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_SG_FREE(r13, 0x40106439, &(0x7f0000000c00)={0x6, r14}) connect$can_bcm(r0, &(0x7f0000000c40), 0x10) r15 = syz_open_dev$sndpcmc(&(0x7f0000000c80)='/dev/snd/pcmC#D#c\x00', 0x6a1, 0x800) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000d80)={r12, 0xb8, &(0x7f0000000cc0)=[@in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e21, @multicast2}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e23, 0x8f95, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xa00000000000}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0x8000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}, @in={0x2, 0x4e20, @multicast2}]}, &(0x7f0000000dc0)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r15, 0x84, 0x5, &(0x7f0000000e00)={r16, @in6={{0xa, 0x4e24, 0x80000001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}}, 0x84) [ 170.678444][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.696462][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.710017][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 170.729673][ T9858] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.745054][ T9858] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.752868][ T9858] device bridge_slave_1 entered promiscuous mode [ 170.783120][ T9855] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.824772][ T9858] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.862056][ T9863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.871827][ T9863] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.878927][ T9863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.887795][ T9858] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 10:07:27 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='ip6gre0\x00') ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000040)={0x0}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f00000000c0)={r1, 0x80000, r2}) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x10) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000140)=0x1, 0x4) ioctl$VHOST_VSOCK_SET_RUNNING(r3, 0x4004af61, &(0x7f0000000180)) r4 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_buf(r4, 0x1, 0x1a, &(0x7f00000001c0)=""/103, &(0x7f0000000240)=0x67) ioctl$BLKRRPART(r2, 0x125f, 0x0) syz_mount_image$nfs(&(0x7f0000000280)='nfs\x00', &(0x7f00000002c0)='./file0/file0\x00', 0x1000, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="895640e3c1625acaa61f83f9a7761fcfc87dfa6d3957a5fd36374d2571da88422a1331312edcb7238ebe1194db8145bfecb5d106364ead6b5a795998e54feb8e2b46126bf0aa4fc9b6d93163f41b2573d7", 0x51}, {&(0x7f0000000380)="4f61b0e929d701f3ffdfa4146404afdb86ba776fffdb2d97a31a42f06411987d8bcfaeb0a2757db733942eaf5ce07a79bc502abeb85b20e286582c6ed236a0e2d2c4b2d453e18d7898d7ac740b0176dcbc0cfa188e97d8ef870b434e593339d233358f413f66e751a31d0b16bf4ecbcb06639e84ef896864f4cad665cb879da9e19c4b08b54b9af61d31e880204c2b2838ecfeccdf0df346d1c331285224bea852574bacaf50eef794", 0xa9, 0x6}, {&(0x7f0000000440), 0x0, 0x2}], 0x2000020, &(0x7f0000000500)='ip6gre0\x00') r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r5, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x24, r6, 0x300, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x1}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x40) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f00000006c0)={{0x41, @empty, 0x4e23, 0x4, 'nq\x00', 0x3, 0x4}, {@multicast1, 0x4e24, 0x2, 0x1663, 0x4, 0x1}}, 0x44) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ubi_ctrl\x00', 0x1, 0x0) r7 = accept4$x25(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x12, 0x4a76d740e57f7974) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r7, 0x660c) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000800)={0x0, 0x4}, &(0x7f0000000840)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000880)={r8, @in6={{0xa, 0x4e21, 0x4, @empty, 0x1}}}, &(0x7f0000000940)=0x84) r9 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000980)='/dev/snapshot\x00', 0x121d00, 0x0) ioctl$TIOCMBIC(r9, 0x5417, &(0x7f00000009c0)=0x9) r10 = syz_open_dev$dspn(&(0x7f0000000a00)='/dev/dsp#\x00', 0x6259, 0x80000) setsockopt$inet_tcp_int(r10, 0x6, 0x27, &(0x7f0000000a40)=0x2, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000a80)={0x0}, &(0x7f0000000ac0)=0xc) tkill(r11, 0x3) ioctl$sock_TIOCINQ(r7, 0x541b, &(0x7f0000000b00)) ioctl$TIOCGISO7816(r10, 0x80285442, &(0x7f0000000b40)) socket(0x10, 0xa, 0x7fff) [ 170.946525][ T9862] chnl_net:caif_netlink_parms(): no params data found [ 170.958219][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.967240][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.974306][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.984163][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.992784][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.010993][ T9860] chnl_net:caif_netlink_parms(): no params data found [ 171.033780][ T9869] IPVS: ftp: loaded support on port[0] = 21 [ 171.036584][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.055643][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.066526][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.088399][ T9858] team0: Port device team_slave_0 added [ 171.098207][ T9855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.108916][ T9858] team0: Port device team_slave_1 added [ 171.140873][ T9862] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.148232][ T9862] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.155784][ T9862] device bridge_slave_0 entered promiscuous mode [ 171.172039][ T9872] IPVS: ftp: loaded support on port[0] = 21 [ 171.184895][ T9860] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.192771][ T9860] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.200531][ T9860] device bridge_slave_0 entered promiscuous mode [ 171.208247][ T9862] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.215381][ T9862] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.223422][ T9862] device bridge_slave_1 entered promiscuous mode [ 171.240563][ T9862] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.252654][ T9862] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.272049][ T9860] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.279334][ T9860] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.286962][ T9860] device bridge_slave_1 entered promiscuous mode [ 171.302568][ T9855] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 171.366798][ T9858] device hsr_slave_0 entered promiscuous mode [ 171.425510][ T9858] device hsr_slave_1 entered promiscuous mode [ 171.485101][ T9858] debugfs: Directory 'hsr0' with parent '/' already present! [ 171.493851][ T9860] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.510849][ T9862] team0: Port device team_slave_0 added [ 171.517414][ T9862] team0: Port device team_slave_1 added [ 171.528656][ T9860] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.551010][ T9860] team0: Port device team_slave_0 added [ 171.572809][ T9860] team0: Port device team_slave_1 added 10:07:27 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/238) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000900)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000a00)="ba", 0x1, 0x0, 0x0, 0x0) recvfrom$packet(r3, &(0x7f0000000000)=""/14, 0xe, 0x0, 0x0, 0x0) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x100010, r3, 0x80000000) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000000)={0x3, @bcast, r2}) [ 171.679002][ T9862] device hsr_slave_0 entered promiscuous mode [ 171.735316][ T9862] device hsr_slave_1 entered promiscuous mode [ 171.775021][ T9862] debugfs: Directory 'hsr0' with parent '/' already present! [ 171.836591][ T9860] device hsr_slave_0 entered promiscuous mode [ 171.875476][ T9860] device hsr_slave_1 entered promiscuous mode [ 171.925915][ T9860] debugfs: Directory 'hsr0' with parent '/' already present! [ 171.958749][ T9869] chnl_net:caif_netlink_parms(): no params data found [ 171.987882][ T9860] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.995004][ T9860] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.002299][ T9860] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.009348][ T9860] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.042309][ T9862] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.049410][ T9862] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.056677][ T9862] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.063845][ T9862] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.080502][ T9858] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.090226][ T9872] chnl_net:caif_netlink_parms(): no params data found [ 172.108902][ T9863] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.116378][ T9863] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.123728][ T9863] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.132989][ T9863] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.148119][ T9869] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.156961][ T9869] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.164774][ T9869] device bridge_slave_0 entered promiscuous mode [ 172.172678][ T9869] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.179841][ T9869] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.187482][ T9869] device bridge_slave_1 entered promiscuous mode [ 172.204742][ T9869] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 172.222498][ T9858] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.231203][ T9869] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.250198][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.257995][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.277356][ T9869] team0: Port device team_slave_0 added [ 172.287385][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.296968][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.306284][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.313322][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.320897][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 172.329322][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 172.337609][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.344641][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 172.352505][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 172.363166][ T9869] team0: Port device team_slave_1 added [ 172.380297][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 172.388091][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 172.396608][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.404989][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.413225][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.421966][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.430253][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.438416][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.446819][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 10:07:28 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/238) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000900)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000a00)="ba", 0x1, 0x0, 0x0, 0x0) recvfrom$packet(r3, &(0x7f0000000000)=""/14, 0xe, 0x0, 0x0, 0x0) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x100010, r3, 0x80000000) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000000)={0x3, @bcast, r2}) [ 172.470566][ T9872] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.478143][ T9872] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.486049][ T9872] device bridge_slave_0 entered promiscuous mode [ 172.547545][ T9869] device hsr_slave_0 entered promiscuous mode [ 172.595607][ T9869] device hsr_slave_1 entered promiscuous mode [ 172.655066][ T9869] debugfs: Directory 'hsr0' with parent '/' already present! [ 172.668129][ T9872] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.675423][ T9872] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.683093][ T9872] device bridge_slave_1 entered promiscuous mode [ 172.697609][ T9858] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 172.709240][ T9858] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 172.717574][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.725848][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.753125][ T9860] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.770097][ T9872] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 172.790635][ T9872] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.808997][ T9872] team0: Port device team_slave_0 added [ 172.817942][ T9858] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.826664][ T9863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 172.834735][ T9863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 172.846109][ T9860] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.858445][ T9872] team0: Port device team_slave_1 added [ 172.866380][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 172.878102][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 172.886759][ T3611] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.893844][ T3611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 172.913338][ T9862] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.928543][ T9862] 8021q: adding VLAN 0 to HW filter on device team0 [ 172.957005][ T9872] device hsr_slave_0 entered promiscuous mode [ 173.005435][ T9872] device hsr_slave_1 entered promiscuous mode [ 173.065226][ T9872] debugfs: Directory 'hsr0' with parent '/' already present! [ 173.076712][ T9863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.084456][ T9863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.097142][ T9869] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.129889][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 173.141294][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.160081][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.168841][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.175910][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.184224][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.193707][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.202173][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.210589][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.217672][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.225382][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.233820][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.242096][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.249135][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.256679][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.265146][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 10:07:29 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) timerfd_create(0x9, 0x100800) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="87040066f4c07b38d6627a687100ee15e1a2ef95df000000ff020000000000000000007fff000000000000000000005bbfc216bcafd2f46b034407000a3da4e497125fcea5795cb84d62be7532fee5015cb4"], 0x28) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x81, @loopback}, 0x1c) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 173.273505][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.282037][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.290791][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.318389][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 10:07:29 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/238) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000900)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000a00)="ba", 0x1, 0x0, 0x0, 0x0) recvfrom$packet(r3, &(0x7f0000000000)=""/14, 0xe, 0x0, 0x0, 0x0) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x100010, r3, 0x80000000) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000000)={0x3, @bcast, r2}) [ 173.352899][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.375818][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.384492][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.393697][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 10:07:29 executing program 1: socket$kcm(0x11, 0xa, 0x300) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x8e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x1, 0x101002) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000300)={0x3, 0x3a}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0xffff, 0x1, 0xffffffffffff0000, 0x6}, {0x0, 0x1, 0x4, 0x926}, {0x80000001, 0xd6f, 0x2, 0x4b}, {0x1ff, 0x80, 0x3f, 0x60}, {0x7f, 0x0, 0x4, 0x7}]}) socket$kcm(0x29, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/d\xdf\x00/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05604, &(0x7f0000000080)={0x4, @vbi}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000080)={0x10000, 0x7, 0x3, 'queue0\x00', 0x100}) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x161) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r3, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00'], 0xfdef) [ 173.402306][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.411241][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.422309][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.430742][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.441451][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.450299][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.467416][ T9862] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 173.479227][ T9862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.489402][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 10:07:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000340000000200000063010000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0x840b, &(0x7f000000cf3d)=""/195}, 0x48) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05604, &(0x7f0000000080)={0x4, @vbi}) openat$random(0xffffffffffffff9c, &(0x7f0000000500)='/dev/urandom\x00', 0x400022, 0x0) write$uinput_user_dev(r0, &(0x7f0000000080)={'syz0\x00', {0x2, 0xff00000000000000, 0x380000000000, 0xe4c}, 0x15, [0x1ff, 0xad8, 0xffffffffffffffff, 0xc8f, 0x433a, 0x28000000, 0x1000, 0x80000001, 0x1, 0x7, 0x400, 0x9, 0x10001, 0x2, 0xfff, 0x800, 0x7, 0x8000, 0xb, 0x1, 0x10001, 0xfffffffffffff25d, 0x81, 0x8001, 0xe00000, 0x6, 0xfffffffffffffff8, 0x2, 0x7, 0xfff, 0xfffffffffffffffc, 0x1, 0x10000, 0x2, 0xcbd7, 0x3, 0xf34c, 0x7fff, 0x7, 0x0, 0x7, 0x711, 0x589f, 0x9, 0x40, 0x6, 0x5, 0x61, 0x8, 0x9, 0x9, 0x6, 0x9, 0x5, 0x9, 0x7, 0x8, 0x80000001, 0x7, 0x1, 0x3, 0x101, 0x64, 0x6], [0x80, 0x8, 0x100000001, 0x5, 0x0, 0x3, 0x1ff8000000000, 0x1, 0x2edc74e8, 0x3, 0x5, 0x7, 0x5, 0x2, 0x7f, 0x1, 0x2, 0x1, 0x3, 0x800, 0x3, 0xffffffffffff9a45, 0x2, 0x6c3d, 0x7, 0x0, 0x9, 0x2, 0x3, 0x7ff, 0xa5, 0x5, 0x3ff, 0x512, 0x100000000, 0x4, 0x2, 0x10000, 0x0, 0xa6, 0x65, 0xa65, 0xffffffffffff07b1, 0x4, 0x4, 0x1, 0x8, 0x7fffffff, 0xfffffffffffffa2c, 0x54, 0x4, 0x400, 0x20, 0x4, 0x3c000, 0x1c000000000, 0x9, 0xf511, 0x3f, 0x5, 0x101, 0x2, 0x400, 0x8000], [0x3f, 0x9, 0x10a, 0x7fffffff, 0x3, 0x1, 0x7fffffff, 0x7, 0x9, 0x80c, 0x8, 0x5, 0x2, 0x101, 0x3, 0x7f, 0x3, 0x0, 0x3, 0x6a67, 0x4, 0x10000, 0x1f, 0x6, 0x40, 0x4, 0xffffffffffff7fff, 0x8000, 0x95, 0x80, 0x1, 0x9, 0x8000, 0xffffffffffffff35, 0x5, 0x9, 0x2, 0x6, 0x2350, 0x9e2, 0x7, 0x2, 0x3f, 0x4, 0xffffffffffff8001, 0x80000000, 0x5, 0x9, 0x3, 0x1, 0x0, 0x2, 0x101, 0xffff, 0x100000001, 0xffffffffffffff7f, 0x7, 0x1ff, 0x5, 0x28, 0x10001, 0x100000001, 0x4, 0x5cff], [0x567f, 0x0, 0x80000001, 0x0, 0x7, 0x6, 0xc313, 0x3, 0x563, 0x6, 0x8000, 0x81, 0xfffffffffffffffa, 0xffffffffffffffd2, 0x486d5b05, 0x7fff, 0x4, 0x4613, 0x0, 0x0, 0x4, 0xbe6, 0x10000, 0xfffffffffffffffe, 0x3, 0x7, 0xa5e8, 0x4, 0x2, 0x8, 0x2, 0x1de7000000, 0xd1e7, 0x27e, 0x80000000, 0x4, 0x8, 0x2, 0x47c, 0x7, 0xff, 0x8, 0xfffffffffffffff8, 0xfffffffffffffff8, 0x27a, 0x3, 0x7ff, 0x8001, 0xffff, 0x2, 0x80, 0xffff, 0x1f, 0x3, 0x1f, 0x100, 0x0, 0x7fff, 0x5, 0xffff, 0x2, 0x5, 0x3, 0x2]}, 0x45c) [ 173.497288][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.504977][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.512593][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.521255][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.532588][ T9860] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 10:07:29 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) unshare(0x8000000) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) [ 173.559844][ T9860] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.587954][ T9869] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.595700][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 10:07:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x4, @vbi}) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000040)={0x51, &(0x7f0000000000)="03f2f316a2effbad209214ad"}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x11ca6b, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa030000000000810000008100000888a8ffff0000eae14855b67b9cbf"], 0x0) [ 173.607392][ T3611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.621031][ T9862] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.655228][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.663753][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.682797][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.689900][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.698929][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.707771][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.716223][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.723267][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.733325][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.742112][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 173.751790][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.759677][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 173.768555][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 173.777238][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 173.790518][ T9872] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.808226][ T9860] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.821342][ T9869] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 173.851410][ T9869] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 173.872091][ T9872] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.879809][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 173.888839][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 173.898249][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 173.906587][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 173.914741][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 173.923200][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 173.931469][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.940144][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.948231][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 173.972376][ T9869] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 173.980764][ T9863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.991441][ T9863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.000420][ T9863] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.007540][ T9863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.018551][ T9863] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.050251][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.088979][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 10:07:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x4, @vbi}) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000040)={0x51, &(0x7f0000000000)="03f2f316a2effbad209214ad"}) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x11ca6b, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa030000000000810000008100000888a8ffff0000eae14855b67b9cbf"], 0x0) [ 174.111705][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.118821][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state 10:07:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x11, r1, 0x0) socket$pptp(0x18, 0x1, 0x2) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) [ 174.156419][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.185343][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.206944][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.257191][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.271285][ C0] hrtimer: interrupt took 24212 ns [ 174.272000][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.285870][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.303595][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.311944][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.320330][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 174.330614][ T9872] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 174.342001][ T9872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:07:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r2, 0xc0d05604, &(0x7f0000000080)={0x4, @vbi}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000100)='irlan0\x00'}, 0x30) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000200)={{0x6, 0x1, 0x9, 0x5, 'syz1\x00', 0x1}, 0x1, 0x400, 0x8, r3, 0x7, 0x80, 'syz0\x00', &(0x7f0000000340)=['\x00', 'bdev\x00', 'irlan0\x00', '/dev/video2\x00G\xfeH\xbf\xdf\xb5\x9ee`\xac#FG/\x1e\xa1\xa0\xd4x\x9e?[\xb6\xa8!\x7fA\x89\xa5\x89f\xfe\x0e\xfb\xba>2\xe0\xbc\xb7S\x1c\xb0<\xc2\x87\xe4v\x95\x1cC]\xc5\xd4\"\xd4\xc7\x0e<\x81\xc4\x98\xe0{\xfc\x06\xf44\xf5U\'%\xe0\x05\x9d\xfa-\xb0\x12M\x8f7\x03\x932\x13\xae/?\xb6z7y\x92P\xdf\xe8\xb4\xd6\xfe\xd9\xab\x8ff,\x06\x1c\xcaX\xd1\xa5KH\xbd\xe2pfU\xacb\x1c\xea\xb1\x10\x8aNN\xeb\v\x06\x89\xabD\xaa\xe9q\xd7R.\xcd\xb4\x94\x90\xd4\xf1\xad\x04\xff\x86\xb83TiD\xc3\xb5\xb4TT\xb7\xbf[\xb6lL\x85\xc1U\xc8\nN]O8\xe1\xc9\x90\xbcW\x12\x18T\xe2\xb0\x13G-\x06\xeav\xf4Z\x81\xaf\x98\x7f4\xa0R\xbf\'N\xaa\xb8\xcdX\xce_]&\xe0\x15k\xca\xaf\x1c\xc9-', 'GPL*\x00', '/\x00', '\x00'], 0xfb, [], [0x3f, 0x6, 0x4, 0x7]}) r4 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) r7 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) setsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000)={0x40, 0x5}, 0xff38) r8 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f0000000080)={'irlan0\x00', 0x5}) ppoll(&(0x7f0000000140)=[{r5}, {r7}, {r8}, {r1}], 0x4, 0x0, 0x0, 0xed) [ 174.359259][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.375287][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.392750][ T9872] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 174.565714][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 174.571550][ C1] protocol 88fb is buggy, dev hsr_slave_1 10:07:30 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/238) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000900)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r3, &(0x7f0000000a00)="ba", 0x1, 0x0, 0x0, 0x0) recvfrom$packet(r3, &(0x7f0000000000)=""/14, 0xe, 0x0, 0x0, 0x0) mmap$xdp(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x100010, r3, 0x80000000) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000000)={0x3, @bcast, r2}) 10:07:30 executing program 2: sendmmsg$inet(0xffffffffffffffff, &(0x7f0000004b80)=[{{&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)='q', 0xffffff15}], 0x1, 0x0, 0x334}}, {{0x0, 0x0, 0x0, 0x3a5}}], 0x2, 0x840) r0 = add_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f00000001c0)="04", 0x24a, r1) r2 = add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="84c05c92ef807b7dc827fc035ca11c", 0xf, r1) keyctl$negate(0xd, r0, 0x8, r2) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4) 10:07:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x8f, 0x0, [0x300]}) syz_open_dev$vbi(&(0x7f0000000340)='/dev/vbi#\x00', 0x0, 0x2) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000900)={0x2, 0x4e20, @loopback}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$IMADDTIMER(r3, 0x80044940, &(0x7f00000002c0)=0xffffffffffffffff) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000000a00)="ba", 0x1, 0x0, 0x0, 0x0) recvfrom$packet(r2, &(0x7f0000000000)=""/14, 0xe, 0x0, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) removexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@known='user.syz\x00') ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r5 = dup2(r2, r4) ioctl$VIDIOC_ENUM_FREQ_BANDS(r5, 0xc0405665, &(0x7f0000000200)={0x4, 0x1, 0x80000000000000, 0x1000, 0x100, 0x8, 0xe}) r6 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05604, &(0x7f0000000080)={0x4, @vbi}) r7 = open(&(0x7f0000000380)='./file0\x00', 0x200, 0x14) getdents64(r7, &(0x7f0000000440)=""/106, 0x6a) write$P9_RLERRORu(r6, &(0x7f0000000300)={0x10, 0x7, 0x1, {{0x3, 'lo\x00'}, 0x1}}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xa0000, 0x0) r8 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x40000, 0x0) r9 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x8, 0x10000) ioctl$PPPOEIOCSFWD(r9, 0x4008b100, &(0x7f00000001c0)={0x18, 0x0, {0x2, @local, 'lo\x00'}}) setsockopt$bt_rfcomm_RFCOMM_LM(r8, 0x12, 0x3, &(0x7f0000000100)=0x80, 0xfe72) r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) write$binfmt_elf64(r10, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x9f2) 10:07:30 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7f, 0x22840) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086607, 0x2000000000000000) 10:07:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x11, r1, 0x0) socket$pptp(0x18, 0x1, 0x2) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) 10:07:31 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000400)='ramfs\x00\x9b\x95\x84\x10D\xfb\x9b\x81R#\x10O\xd3\xb4\xe8\xa3\x1f\x00\r\xf6\xd9\xbbt\x95f\x9e\x02\x06\xf946\\{(\xc8\xa7s\xd2>\x81\x88l\x0e\xc5%\x99\x00\x02\x9d\x85\xfc\xa9\\\x99:\xe4\x9c\xf9z>w\xe7\xa9\xa8=\xe9o\x9f\xfbKE\xd7\x9a\x1b\xf8\x86@\x8e\xe6\x9em\x89\xab\x19\xea1\x8e\xa1\xb5\xd7\xc6\xc62\x05\xc7\xe5\xd2m\xeczV\x1d\x84\xcd\xc0\xdf', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') prctl$PR_GET_FPEXC(0xb, &(0x7f00000002c0)) symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f00000001c0)="04", 0x24a, r2) r3 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r2) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000900)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, &(0x7f0000000a00)="ba", 0x1, 0x0, 0x0, 0x0) recvfrom$packet(r4, &(0x7f0000000000)=""/14, 0xe, 0x0, 0x0, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) close(r5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r7}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000540)={r7, @in6={{0xa, 0x4e23, 0x9, @local, 0x3}}, 0x5, 0x4, 0x8, 0x7, 0x5c}, 0x98) keyctl$unlink(0x9, 0x0, r3) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x1, 0x2, &(0x7f0000000280)=[{&(0x7f00000001c0)="9fc130a7c59346af", 0x8, 0x7}, {&(0x7f0000000200)="c82a585225effee0f7c13d5b926951287cfb67ec0b967590fbb6999a18b090eae437e71b08a5973c74ad4650aec9871f4e40ad8a79918ed8ef41e20947a6e4bd72f1647b", 0x44, 0xffffffffffffff8f}], 0x40400, &(0x7f0000000740)=ANY=[@ANYBLOB='quota,user_xattr,nobarrier,fowner=', @ANYRESDEC=r1, @ANYBLOB="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"]) umount2(&(0x7f0000000040)='../file0\x00', 0x2) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 174.663482][ T9986] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 10:07:31 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xfffffffffffffff9, 0x8000) getsockname$inet(r0, &(0x7f0000000200)={0x2, 0x0, @dev}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a61c) socket$inet(0x2, 0x3, 0x1) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x7b) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = socket(0x40000000015, 0x5, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000900)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, &(0x7f0000000a00)="ba", 0x1, 0x0, 0x0, 0x0) recvfrom$packet(r4, &(0x7f0000000000)=""/14, 0xe, 0x0, 0x0, 0x0) bind$inet(r4, &(0x7f0000000300)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) sendto$inet(r3, &(0x7f0000000a00)="ba", 0x1, 0x0, 0x0, 0x0) r5 = socket(0x40000000015, 0x5, 0x0) connect$inet(r5, &(0x7f0000000900)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r5, &(0x7f0000000a00)="ba", 0x1, 0x2000c004, 0x0, 0x1e6) recvfrom$packet(r5, &(0x7f0000000000)=""/14, 0xe, 0x0, 0x0, 0x0) getpeername$netlink(r5, &(0x7f0000000280), &(0x7f00000002c0)=0xc) recvfrom$packet(r1, &(0x7f0000000000)=""/14, 0xe, 0x0, 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_TRY_FMT(r6, 0xc0d05604, &(0x7f0000000080)={0x4, @vbi}) ioctl$PPPIOCATTACH(r6, 0x4004743d, &(0x7f00000001c0)=0x1) r7 = socket(0x40000000015, 0x5, 0x0) connect$inet(r7, &(0x7f0000000900)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r7, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r7, &(0x7f0000000a00)="ba", 0x1, 0x0, 0x0, 0x0) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00') recvfrom$packet(r7, &(0x7f0000000000)=""/14, 0xe, 0x0, 0x0, 0x0) splice(r7, 0x0, r3, 0x0, 0x10005, 0x0) 10:07:31 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000900)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r2, &(0x7f0000000a00)="ba", 0x1, 0x0, 0x0, 0x0) recvfrom$packet(r2, &(0x7f0000000000)=""/14, 0xffffffffffffff96, 0x400020c0, 0x0, 0x372) accept4$inet6(r2, 0x0, &(0x7f0000000000), 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000900)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, &(0x7f0000000a00)="ba", 0x1, 0x0, 0x0, 0x0) recvfrom$packet(r4, &(0x7f0000000000)=""/14, 0xe, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000240)=@req3={0x9, 0xffff, 0x3, 0x8, 0xbf, 0x7}, 0x1c) r5 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) r6 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x4, 0x2400) ioctl$VIDIOC_G_TUNER(r6, 0xc054561d, &(0x7f00000001c0)={0x6bd, "c07e04dbb0c3f818f701fd90d05f0e4373439165b28675f37e9bb2c8eb0725b2", 0x0, 0x100, 0x6, 0x0, 0x2, 0x1, 0x5, 0x9}) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05604, &(0x7f0000000080)={0x4, @vbi}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, &(0x7f00000000c0)) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000300)={r3, 0x3, 0x6, @local}, 0x10) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @link_local}, 0xfffffffffffffec7) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000002c0)={r3, 0x3, 0x6, @remote}, 0x10) 10:07:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x800002, 0x11, r1, 0x0) socket$pptp(0x18, 0x1, 0x2) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) [ 174.861207][T10008] device lo entered promiscuous mode [ 174.898921][T10013] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 174.906781][T10013] #PF: supervisor instruction fetch in kernel mode [ 174.913276][T10013] #PF: error_code(0x0010) - not-present page [ 174.919243][T10013] PGD 947aa067 P4D 947aa067 PUD a1a32067 PMD 0 [ 174.925484][T10013] Oops: 0010 [#1] PREEMPT SMP KASAN [ 174.930678][T10013] CPU: 0 PID: 10013 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 174.938198][T10013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.948247][T10013] RIP: 0010:0x0 [ 174.951717][T10013] Code: Bad RIP value. [ 174.955759][T10013] RSP: 0018:ffff88805bce7cd8 EFLAGS: 00010246 [ 174.961802][T10013] RAX: dffffc0000000000 RBX: ffffffff8992dda0 RCX: ffffc9000a779000 [ 174.969758][T10013] RDX: 0000000000000000 RSI: ffff88805bce7d40 RDI: ffff8880959f6100 [ 174.977714][T10013] RBP: ffff88805bce7da8 R08: ffff888095d21cd8 R09: 0000000000000000 [ 174.985679][T10013] R10: fffffbfff134b3b7 R11: ffff88808dd5c240 R12: ffff888095d21800 [ 174.993630][T10013] R13: ffff8880959f6100 R14: 0000000000000000 R15: ffff88805bce7d40 [ 175.001594][T10013] FS: 00007f20373f3700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 175.010526][T10013] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 175.017198][T10013] CR2: ffffffffffffffd6 CR3: 000000008c5e4000 CR4: 00000000001426f0 [ 175.025274][T10013] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 175.033231][T10013] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 175.041200][T10013] Call Trace: [ 175.044477][T10013] rds_bind+0x420/0x800 [ 175.048678][T10013] ? rds_remove_bound+0xd40/0xd40 [ 175.053703][T10013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 175.059951][T10013] ? security_socket_bind+0x8d/0xc0 [ 175.065139][T10013] __sys_bind+0x239/0x290 [ 175.069470][T10013] ? __ia32_sys_socketpair+0xf0/0xf0 [ 175.075104][T10013] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 175.081413][T10013] ? put_timespec64+0xda/0x140 [ 175.086162][T10013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 175.092468][T10013] ? __x64_sys_clock_gettime+0x16d/0x240 [ 175.098083][T10013] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 175.104130][T10013] __x64_sys_bind+0x73/0xb0 [ 175.108628][T10013] do_syscall_64+0xfd/0x6a0 [ 175.113130][T10013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.119010][T10013] RIP: 0033:0x4598e9 [ 175.122922][T10013] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.142513][T10013] RSP: 002b:00007f20373f2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 175.150930][T10013] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004598e9 [ 175.158883][T10013] RDX: 0000000000000010 RSI: 0000000020000300 RDI: 0000000000000007 [ 175.167105][T10013] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 175.175065][T10013] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20373f36d4 [ 175.183026][T10013] R13: 00000000004bfa2b R14: 00000000004d1608 R15: 00000000ffffffff [ 175.191143][T10013] Modules linked in: [ 175.195078][T10013] CR2: 0000000000000000 [ 175.203318][T10009] kobject: 'loop5' (00000000eee40a81): kobject_uevent_env [ 175.210582][T10013] ---[ end trace c53e451ce978f43e ]--- [ 175.212426][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 175.220080][T10013] RIP: 0010:0x0 [ 175.222083][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 175.225589][T10013] Code: Bad RIP value. [ 175.235778][T10009] kobject: 'loop5' (00000000eee40a81): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 175.237478][T10013] RSP: 0018:ffff88805bce7cd8 EFLAGS: 00010246 [ 175.263456][ T3909] kobject: 'loop5' (00000000eee40a81): kobject_uevent_env [ 175.272805][ T3909] kobject: 'loop5' (00000000eee40a81): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 175.302723][T10013] RAX: dffffc0000000000 RBX: ffffffff8992dda0 RCX: ffffc9000a779000 [ 175.324118][T10013] RDX: 0000000000000000 RSI: ffff88805bce7d40 RDI: ffff8880959f6100 [ 175.334710][T10013] RBP: ffff88805bce7da8 R08: ffff888095d21cd8 R09: 0000000000000000 [ 175.343338][T10013] R10: fffffbfff134b3b7 R11: ffff88808dd5c240 R12: ffff888095d21800 [ 175.355353][T10013] R13: ffff8880959f6100 R14: 0000000000000000 R15: ffff88805bce7d40 [ 175.363834][T10013] FS: 00007f20373f3700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 175.375053][T10013] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 175.381739][T10013] CR2: 00007f494202b000 CR3: 000000008c5e4000 CR4: 00000000001426e0 [ 175.390066][T10013] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 175.398337][T10013] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 175.406721][T10013] Kernel panic - not syncing: Fatal exception [ 175.412283][ T3909] kobject: 'loop3' (000000001f89416d): kobject_uevent_env [ 175.421117][T10013] Kernel Offset: disabled [ 175.425439][T10013] Rebooting in 86400 seconds..