[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 60.366659][ T27] audit: type=1800 audit(1575344931.320:25): pid=8727 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 60.389988][ T27] audit: type=1800 audit(1575344931.320:26): pid=8727 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 60.439737][ T27] audit: type=1800 audit(1575344931.320:27): pid=8727 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.132' (ECDSA) to the list of known hosts. 2019/12/03 03:49:03 fuzzer started 2019/12/03 03:49:04 dialing manager at 10.128.0.26:44481 2019/12/03 03:49:04 syscalls: 2694 2019/12/03 03:49:04 code coverage: enabled 2019/12/03 03:49:04 comparison tracing: enabled 2019/12/03 03:49:04 extra coverage: enabled 2019/12/03 03:49:04 setuid sandbox: enabled 2019/12/03 03:49:04 namespace sandbox: enabled 2019/12/03 03:49:04 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/03 03:49:04 fault injection: enabled 2019/12/03 03:49:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/03 03:49:04 net packet injection: enabled 2019/12/03 03:49:04 net device setup: enabled 2019/12/03 03:49:04 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/03 03:49:04 devlink PCI setup: PCI device 0000:00:10.0 is not available 03:51:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) r1 = dup(r0) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, 0x0) 03:51:09 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x10) syzkaller login: [ 198.401186][ T8896] IPVS: ftp: loaded support on port[0] = 21 [ 198.564873][ T8896] chnl_net:caif_netlink_parms(): no params data found [ 198.616922][ T8896] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.625722][ T8896] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.634540][ T8896] device bridge_slave_0 entered promiscuous mode [ 198.644141][ T8896] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.651758][ T8896] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.660119][ T8896] device bridge_slave_1 entered promiscuous mode [ 198.686969][ T8896] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 198.690917][ T8899] IPVS: ftp: loaded support on port[0] = 21 [ 198.702275][ T8896] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:51:09 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)="7083222a475dbb", 0x7) r0 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(r1, &(0x7f0000000500)={0x7}, 0xb2) [ 198.736470][ T8896] team0: Port device team_slave_0 added [ 198.752975][ T8896] team0: Port device team_slave_1 added [ 198.813576][ T8896] device hsr_slave_0 entered promiscuous mode [ 198.869327][ T8896] device hsr_slave_1 entered promiscuous mode [ 198.947401][ T8901] IPVS: ftp: loaded support on port[0] = 21 03:51:10 executing program 3: r0 = socket$inet6(0xa, 0x100000003, 0x3a) recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="c93d8159", 0x4, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, 0x1c) [ 199.023608][ T8896] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 199.134965][ T8896] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 199.191944][ T8899] chnl_net:caif_netlink_parms(): no params data found [ 199.214617][ T8896] netdevsim netdevsim0 netdevsim2: renamed from eth2 03:51:10 executing program 4: perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x80000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000027000)={0x1}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 199.263045][ T8896] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 199.395614][ T8904] IPVS: ftp: loaded support on port[0] = 21 [ 199.447159][ T8896] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.454452][ T8896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.462279][ T8896] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.469356][ T8896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.586092][ T8899] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.601085][ T8899] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.610646][ T8899] device bridge_slave_0 entered promiscuous mode [ 199.626716][ T8906] IPVS: ftp: loaded support on port[0] = 21 03:51:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/239, 0xef}], 0x1) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x34, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) r3 = dup(r1) fcntl$dupfd(r1, 0x0, r3) recvfrom$inet(r2, 0x0, 0xcebf, 0x6, 0x0, 0x800e00519) shutdown(r2, 0x0) [ 199.637041][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.646731][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.684507][ T8899] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.694240][ T8899] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.702645][ T8899] device bridge_slave_1 entered promiscuous mode [ 199.759959][ T8901] chnl_net:caif_netlink_parms(): no params data found [ 199.801910][ T8899] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.822580][ T8899] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.867657][ T8901] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.875003][ T8901] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.882797][ T8901] device bridge_slave_0 entered promiscuous mode [ 199.893068][ T8901] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.901135][ T8901] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.908783][ T8901] device bridge_slave_1 entered promiscuous mode [ 199.926981][ T8910] IPVS: ftp: loaded support on port[0] = 21 [ 199.938734][ T8899] team0: Port device team_slave_0 added [ 199.946707][ T8899] team0: Port device team_slave_1 added [ 199.975224][ T8901] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.049914][ T8901] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.112169][ T8899] device hsr_slave_0 entered promiscuous mode [ 200.169358][ T8899] device hsr_slave_1 entered promiscuous mode [ 200.230918][ T8899] debugfs: Directory 'hsr0' with parent '/' already present! [ 200.245048][ T8904] chnl_net:caif_netlink_parms(): no params data found [ 200.271263][ T8901] team0: Port device team_slave_0 added [ 200.279555][ T8901] team0: Port device team_slave_1 added [ 200.361036][ T8901] device hsr_slave_0 entered promiscuous mode [ 200.389230][ T8901] device hsr_slave_1 entered promiscuous mode [ 200.428998][ T8901] debugfs: Directory 'hsr0' with parent '/' already present! [ 200.537094][ T8901] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 200.591053][ T8906] chnl_net:caif_netlink_parms(): no params data found [ 200.610436][ T8901] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 200.671601][ T8904] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.678687][ T8904] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.687266][ T8904] device bridge_slave_0 entered promiscuous mode [ 200.695892][ T8899] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 200.768268][ T8901] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 200.817029][ T8904] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.824371][ T8904] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.832604][ T8904] device bridge_slave_1 entered promiscuous mode [ 200.841296][ T8899] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 200.906844][ T8899] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 200.975055][ T8901] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 201.048247][ T8899] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 201.105021][ T8906] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.113201][ T8906] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.123693][ T8906] device bridge_slave_0 entered promiscuous mode [ 201.151048][ T8904] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.169459][ T8906] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.176540][ T8906] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.187039][ T8906] device bridge_slave_1 entered promiscuous mode [ 201.205657][ T8896] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.213855][ T8904] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.232296][ T8910] chnl_net:caif_netlink_parms(): no params data found [ 201.243341][ T8906] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.277972][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.286277][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.296386][ T8906] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.330593][ T8904] team0: Port device team_slave_0 added [ 201.337861][ T8896] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.356404][ T8906] team0: Port device team_slave_0 added [ 201.364953][ T8904] team0: Port device team_slave_1 added [ 201.397360][ T8906] team0: Port device team_slave_1 added [ 201.461030][ T8906] device hsr_slave_0 entered promiscuous mode [ 201.509393][ T8906] device hsr_slave_1 entered promiscuous mode [ 201.552175][ T8906] debugfs: Directory 'hsr0' with parent '/' already present! [ 201.602253][ T8904] device hsr_slave_0 entered promiscuous mode [ 201.629236][ T8904] device hsr_slave_1 entered promiscuous mode [ 201.669045][ T8904] debugfs: Directory 'hsr0' with parent '/' already present! [ 201.686338][ T8910] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.693946][ T8910] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.704968][ T8910] device bridge_slave_0 entered promiscuous mode [ 201.718298][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.727185][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.736269][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.743408][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.752295][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.760985][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.769967][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.776992][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.815404][ T8910] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.824667][ T8910] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.833534][ T8910] device bridge_slave_1 entered promiscuous mode [ 201.856653][ T8906] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 201.946794][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.956465][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.968570][ T8906] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 202.025434][ T8906] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 202.102197][ T8910] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 202.119869][ T8910] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 202.136704][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.145359][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.154356][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.163059][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.171663][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.180029][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.191677][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.209994][ T8906] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 202.275142][ T8896] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.288192][ T8896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.310159][ T8910] team0: Port device team_slave_0 added [ 202.317367][ T8904] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 202.386499][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.395080][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.413497][ T8910] team0: Port device team_slave_1 added [ 202.433590][ T8904] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 202.476778][ T8904] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 202.560430][ T8899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.602675][ T8910] device hsr_slave_0 entered promiscuous mode [ 202.649449][ T8910] device hsr_slave_1 entered promiscuous mode [ 202.689122][ T8910] debugfs: Directory 'hsr0' with parent '/' already present! [ 202.696719][ T8904] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 202.773203][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 202.780737][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 202.791242][ T8901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.805828][ T8896] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.840344][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.847967][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.855974][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.863959][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.878612][ T8901] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.908803][ T8899] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.975527][ T8910] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 203.011077][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.024671][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.035365][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.042498][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.051280][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.060070][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.068415][ T12] bridge0: port 2(bridge_slave_1) entered blocking state 03:51:14 executing program 0: gettid() sched_setattr(0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x35) open(0x0, 0x0, 0x0) pipe(0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) [ 203.075515][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.083890][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.094259][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.103211][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.110577][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.119243][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.132555][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.140858][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.173795][ T8910] netdevsim netdevsim5 netdevsim1: renamed from eth1 03:51:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @broadcast}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) socket(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e000, 0x1, &(0x7f0000000140), 0x2100020, 0x0) open(&(0x7f0000001780)='./file0\x00', 0x0, 0x111) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3e0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x260}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'eql\x00', r6}) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') gettid() sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg(r0, &(0x7f0000005d40)=[{{0x0, 0x0, &(0x7f0000001900)}}], 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="021600000a00000000000000000000000800120000000080000000000000000006000000000000000000000000000000ff010000000000000000000000000001ac1414aa00"/80], 0x50}}, 0x0) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, &(0x7f0000000280)=r8) [ 203.225872][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.235341][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.244251][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.251393][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.268387][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.277249][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.310721][ T8910] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 203.336222][ C0] hrtimer: interrupt took 27868 ns [ 203.351439][ T8910] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 203.379360][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.389640][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.398519][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.430336][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.443715][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.454520][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.465490][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.527789][ T8935] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 203.529632][ T8930] EXT4-fs (sda1): re-mounted. Opts: [ 203.558686][ T8906] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.589742][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.597696][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.606021][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.634221][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.655039][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.664042][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.680223][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.688654][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.697444][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.706183][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.730699][ T8906] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.745242][ T8901] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 203.756459][ T8901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 203.765766][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 203.777768][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.786263][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.794942][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.804670][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.883811][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.892943][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.901708][ T3134] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.908764][ T3134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.916992][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.925782][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.934258][ T3134] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.941382][ T3134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.949654][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.962610][ T8904] 8021q: adding VLAN 0 to HW filter on device bond0 03:51:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @broadcast}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) socket(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e000, 0x1, &(0x7f0000000140), 0x2100020, 0x0) open(&(0x7f0000001780)='./file0\x00', 0x0, 0x111) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3e0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x260}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'eql\x00', r6}) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') gettid() sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg(r0, &(0x7f0000005d40)=[{{0x0, 0x0, &(0x7f0000001900)}}], 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="021600000a00000000000000000000000800120000000080000000000000000006000000000000000000000000000000ff010000000000000000000000000001ac1414aa00"/80], 0x50}}, 0x0) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, &(0x7f0000000280)=r8) [ 203.979123][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 204.047545][ T8904] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.065378][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 204.073538][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 204.081491][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 204.089096][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 204.096532][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.104634][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.112479][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.121592][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.130706][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.153765][ T8899] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.340049][ T8901] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.354584][ T8910] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.365520][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 204.374030][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.384114][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.392580][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.399666][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.407254][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.416036][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.426901][ T8907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 204.434899][ T8907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.443522][ T8907] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 204.452404][ T8907] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.459496][ T8907] bridge0: port 2(bridge_slave_1) entered forwarding state 03:51:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @broadcast}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) socket(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e000, 0x1, &(0x7f0000000140), 0x2100020, 0x0) open(&(0x7f0000001780)='./file0\x00', 0x0, 0x111) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3e0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x260}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'eql\x00', r6}) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') gettid() sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg(r0, &(0x7f0000005d40)=[{{0x0, 0x0, &(0x7f0000001900)}}], 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="021600000a00000000000000000000000800120000000080000000000000000006000000000000000000000000000000ff010000000000000000000000000001ac1414aa00"/80], 0x50}}, 0x0) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, &(0x7f0000000280)=r8) [ 204.576375][ T8913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 204.589044][ T8913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.597593][ T8913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 204.615996][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.666426][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 204.682206][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 03:51:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @broadcast}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) socket(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e000, 0x1, &(0x7f0000000140), 0x2100020, 0x0) open(&(0x7f0000001780)='./file0\x00', 0x0, 0x111) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3e0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x260}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'eql\x00', r6}) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') gettid() sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg(r0, &(0x7f0000005d40)=[{{0x0, 0x0, &(0x7f0000001900)}}], 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="021600000a00000000000000000000000800120000000080000000000000000006000000000000000000000000000000ff010000000000000000000000000001ac1414aa00"/80], 0x50}}, 0x0) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$sock_FIOSETOWN(r7, 0x8901, &(0x7f0000000280)=r8) [ 204.711749][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.741133][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 03:51:15 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)="7083222a475dbb", 0x7) r0 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(r1, &(0x7f0000000500)={0x7}, 0xb2) [ 204.770860][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.783757][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.792942][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.801421][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.817039][ T8906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 204.854214][ T8910] 8021q: adding VLAN 0 to HW filter on device team0 03:51:15 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)="7083222a475dbb", 0x7) r0 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(r1, &(0x7f0000000500)={0x7}, 0xb2) [ 205.194491][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.218689][ T8904] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 205.231177][ T8904] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 205.259449][ T8916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.268130][ T8916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.277526][ T8916] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.286598][ T8916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.339363][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.347823][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 205.356080][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 205.379411][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 03:51:16 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$llc(r1, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x10) 03:51:16 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)="7083222a475dbb", 0x7) r0 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(r1, &(0x7f0000000500)={0x7}, 0xb2) [ 205.388092][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.445040][ T3134] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.452226][ T3134] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.462955][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.472188][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.491140][ T3134] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.498270][ T3134] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.538724][ T8906] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 205.561073][ T8904] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 205.780289][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.790187][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 205.797601][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 205.807993][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.817067][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.837062][ T8913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.845941][ T8913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.855634][ T8913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.878864][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.887591][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.899766][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.908235][ T3134] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.936084][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.958749][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.977309][ T8910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 03:51:17 executing program 3: r0 = syz_open_dev$tty(&(0x7f0000000040)='/dev/tty1#\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5412, &(0x7f0000000100)={0x16}) [ 206.158034][ T8910] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.190771][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 206.190908][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 03:51:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x0, @local}, 0x8, {0x2, 0x0, @loopback}}) [ 206.619236][ T105] tipc: TX() has been purged, node left! 03:51:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fb], 0x1f004}) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:51:17 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)="7083222a475dbb", 0x7) r0 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r1 = dup2(r0, r0) write$P9_RLINK(r1, &(0x7f0000000500)={0x7}, 0xb2) 03:51:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x20}}, 0x20}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x31b, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x40824}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$bt_hidp(0x1f, 0x3, 0x6) dup(r5) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000b00)={0x1c, 0x17, 0x101, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') r7 = socket(0x10, 0x0, 0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs$namespace(r9, &(0x7f0000000140)='ns/net\x00') connect$inet6(r8, &(0x7f00000000c0)={0xa, 0x4e21, 0x9ce1, @rand_addr="29fca6c782682862cef57f8d39fdda4e", 0xffff}, 0x1c) sendfile(r7, r6, 0x0, 0xf0d) syz_open_dev$loop(0x0, 0x7, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x20000000) 03:51:17 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000009c0)='\xce\x8f*\xf7\x00', 0x67514c7366170ade, 0x0) write$fb(r0, &(0x7f0000000000)="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", 0x43e4) ioctl$FBIOBLANK(r0, 0x40305839, 0x4ed000) write$fb(r0, &(0x7f0000000280)="da", 0x1) 03:51:17 executing program 4: syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@barrier='barrier'}]}) [ 206.839240][ T9046] gfs2: not a GFS2 filesystem [ 206.942420][ T9046] gfs2: not a GFS2 filesystem [ 207.056916][ T9057] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 207.859847][ T9068] IPVS: ftp: loaded support on port[0] = 21 [ 208.278053][ T9068] chnl_net:caif_netlink_parms(): no params data found [ 208.310244][ T9068] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.317367][ T9068] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.325378][ T9068] device bridge_slave_0 entered promiscuous mode [ 208.334580][ T9068] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.342479][ T9068] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.350711][ T9068] device bridge_slave_1 entered promiscuous mode [ 208.374175][ T9068] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.385861][ T9068] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 208.412634][ T9068] team0: Port device team_slave_0 added [ 208.420822][ T9068] team0: Port device team_slave_1 added [ 208.483298][ T9068] device hsr_slave_0 entered promiscuous mode [ 208.539441][ T9068] device hsr_slave_1 entered promiscuous mode [ 208.579173][ T9068] debugfs: Directory 'hsr0' with parent '/' already present! [ 208.671225][ T9068] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.678280][ T9068] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.685656][ T9068] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.692728][ T9068] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.744383][ T9068] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.757835][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 208.767966][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.777045][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.786195][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 208.802892][ T9068] 8021q: adding VLAN 0 to HW filter on device team0 [ 208.814600][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.823252][ T8914] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.830372][ T8914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.919521][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 208.928398][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.935539][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 208.961528][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.971493][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 208.979944][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 208.989148][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 209.003911][ T9068] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 209.015629][ T9068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 209.025041][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 209.053371][ T9068] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 209.066311][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 209.075058][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 209.154635][ T9068] BUG: sleeping function called from invalid context at mm/page_alloc.c:4681 [ 209.164740][ T9068] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 9068, name: syz-executor.0 [ 209.174215][ T9068] 2 locks held by syz-executor.0/9068: [ 209.179709][ T9068] #0: ffffffff89a3ff20 (pcpu_alloc_mutex){+.+.}, at: pcpu_alloc+0xb89/0x1380 [ 209.188574][ T9068] #1: ffffffff89a51ad8 (vmap_area_lock){+.+.}, at: pcpu_get_vm_areas+0x3b27/0x3f00 [ 209.198071][ T9068] Preemption disabled at: [ 209.198083][ T9068] [] pcpu_get_vm_areas+0x3b27/0x3f00 [ 209.209779][ T9068] CPU: 1 PID: 9068 Comm: syz-executor.0 Not tainted 5.4.0-next-20191202-syzkaller #0 [ 209.219226][ T9068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.229276][ T9068] Call Trace: [ 209.232569][ T9068] dump_stack+0x197/0x210 [ 209.236916][ T9068] ? pcpu_get_vm_areas+0x3b27/0x3f00 [ 209.242217][ T9068] ___might_sleep.cold+0x1fb/0x23e [ 209.247428][ T9068] __might_sleep+0x95/0x190 [ 209.251916][ T9068] __alloc_pages_nodemask+0x523/0x910 [ 209.257436][ T9068] ? get_info+0x152/0x570 [ 209.261766][ T9068] ? do_ip6t_get_ctl+0x17d/0x960 [ 209.266706][ T9068] ? __alloc_pages_slowpath+0x2900/0x2900 [ 209.272415][ T9068] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.278509][ T9068] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.284576][ T9068] ? __kasan_check_read+0x11/0x20 [ 209.289591][ T9068] ? __lock_acquire+0x16f2/0x4a00 [ 209.294593][ T9068] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 209.300848][ T9068] alloc_pages_current+0x107/0x210 [ 209.305950][ T9068] __get_free_pages+0xc/0x40 [ 209.310522][ T9068] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 209.316139][ T9068] apply_to_page_range+0x445/0x700 [ 209.321244][ T9068] ? memset+0x40/0x40 [ 209.325231][ T9068] kasan_populate_vmalloc+0x68/0x90 [ 209.330438][ T9068] pcpu_get_vm_areas+0x3c77/0x3f00 [ 209.335550][ T9068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.341818][ T9068] pcpu_create_chunk+0x24e/0x7f0 [ 209.346746][ T9068] pcpu_alloc+0x10f3/0x1380 [ 209.351240][ T9068] ? kfree+0x10a/0x2c0 [ 209.355287][ T9068] ? pcpu_alloc_area+0x820/0x820 [ 209.360218][ T9068] ? ip6table_mangle_table_init.part.0+0x49/0x70 [ 209.366532][ T9068] ? ip6table_mangle_table_init+0x58/0x70 [ 209.372238][ T9068] ? xt_find_table_lock+0x293/0x430 [ 209.377414][ T9068] ? xt_request_find_table_lock+0x2c/0xe0 [ 209.383116][ T9068] ? get_info+0x152/0x570 [ 209.387433][ T9068] ? do_ip6t_get_ctl+0x17d/0x960 [ 209.392351][ T9068] ? nf_getsockopt+0x7a/0xd0 [ 209.396939][ T9068] ? ipv6_getsockopt+0x205/0x280 [ 209.401872][ T9068] ? tcp_getsockopt+0x8f/0xe0 [ 209.406536][ T9068] ? sock_common_getsockopt+0x94/0xd0 [ 209.411891][ T9068] ? __sys_getsockopt+0x16d/0x310 [ 209.416930][ T9068] ? __x64_sys_getsockopt+0xbe/0x150 [ 209.422232][ T9068] __alloc_percpu+0x25/0x30 [ 209.426733][ T9068] xt_percpu_counter_alloc+0x13c/0x1b0 [ 209.432199][ T9068] find_check_entry.isra.0+0xba/0x9d0 [ 209.437558][ T9068] ? trace_hardirqs_off+0x62/0x240 [ 209.442669][ T9068] ? __do_replace+0x950/0x950 [ 209.447333][ T9068] ? kfree+0x226/0x2c0 [ 209.451379][ T9068] ? kvfree+0x61/0x70 [ 209.455354][ T9068] ? kfree+0x226/0x2c0 [ 209.459413][ T9068] ? lockdep_hardirqs_on+0x421/0x5e0 [ 209.464694][ T9068] ? trace_hardirqs_on+0x67/0x240 [ 209.469723][ T9068] ? kvfree+0x61/0x70 [ 209.473700][ T9068] translate_table+0xd15/0x1860 [ 209.478536][ T9068] ? compat_do_ip6t_get_ctl+0x9a0/0x9a0 [ 209.484071][ T9068] ? memset+0x32/0x40 [ 209.488044][ T9068] ip6t_register_table+0x11b/0x310 [ 209.493140][ T9068] ? translate_table+0x1860/0x1860 [ 209.498235][ T9068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.504462][ T9068] ? ip6t_alloc_initial_table+0x58b/0x690 [ 209.510175][ T9068] ip6table_mangle_table_init.part.0+0x49/0x70 [ 209.516304][ T9068] ip6table_mangle_table_init+0x58/0x70 [ 209.521842][ T9068] xt_find_table_lock+0x293/0x430 [ 209.526864][ T9068] xt_request_find_table_lock+0x2c/0xe0 [ 209.532396][ T9068] get_info+0x152/0x570 [ 209.536535][ T9068] ? compat_table_info+0x500/0x500 [ 209.541633][ T9068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.547865][ T9068] ? apparmor_capable+0x497/0x900 [ 209.552874][ T9068] ? apparmor_cred_prepare+0x7b0/0x7b0 [ 209.558429][ T9068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.564674][ T9068] ? cap_capable+0x205/0x270 [ 209.569335][ T9068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.575581][ T9068] ? security_capable+0x95/0xc0 [ 209.580458][ T9068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 209.586710][ T9068] ? ns_capable_common+0x93/0x100 [ 209.591722][ T9068] do_ip6t_get_ctl+0x17d/0x960 [ 209.596467][ T9068] ? mutex_trylock+0x2f0/0x2f0 [ 209.601225][ T9068] ? cache_grow_begin.cold+0x1e/0x2f [ 209.606502][ T9068] ? alloc_counters.isra.0+0x680/0x680 [ 209.611954][ T9068] ? __might_fault+0x12b/0x1e0 [ 209.616710][ T9068] ? wait_for_completion+0x440/0x440 [ 209.621996][ T9068] ? mutex_unlock+0x1b/0x30 [ 209.626488][ T9068] ? nf_sockopt_find.constprop.0+0x226/0x290 [ 209.632444][ T9068] nf_getsockopt+0x7a/0xd0 [ 209.636853][ T9068] ipv6_getsockopt+0x205/0x280 [ 209.641617][ T9068] ? do_ipv6_getsockopt.isra.0+0x2580/0x2580 [ 209.647604][ T9068] ? lock_downgrade+0x920/0x920 [ 209.652441][ T9068] tcp_getsockopt+0x8f/0xe0 [ 209.656931][ T9068] sock_common_getsockopt+0x94/0xd0 [ 209.662128][ T9068] __sys_getsockopt+0x16d/0x310 [ 209.666986][ T9068] ? kernel_accept+0x310/0x310 [ 209.671726][ T9068] ? handle_mm_fault+0x4ab/0xa50 [ 209.676641][ T9068] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 209.682085][ T9068] ? do_syscall_64+0x26/0x790 [ 209.686749][ T9068] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.692795][ T9068] ? do_syscall_64+0x26/0x790 [ 209.697454][ T9068] __x64_sys_getsockopt+0xbe/0x150 [ 209.702554][ T9068] do_syscall_64+0xfa/0x790 [ 209.707063][ T9068] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.712953][ T9068] RIP: 0033:0x45d18a [ 209.716826][ T9068] Code: b8 34 01 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 8d 8b fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6a 8b fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 209.736433][ T9068] RSP: 002b:00007ffdcca76b28 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 209.744833][ T9068] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045d18a [ 209.752796][ T9068] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 209.760751][ T9068] RBP: 0000000000000029 R08: 00007ffdcca76b4c R09: 0000000000000428 [ 209.768710][ T9068] R10: 0000000000716888 R11: 0000000000000246 R12: 00000000004cbe1c [ 209.776674][ T9068] R13: 0000000000717cc0 R14: 0000000000716888 R15: 0000000000716880 [ 209.925509][ T9088] EXT4-fs (sda1): re-mounted. Opts: [ 209.996536][ T9088] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:51:21 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x1b, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x322}], 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r2, &(0x7f00000017c0), 0x315, 0x0) 03:51:21 executing program 4: syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@barrier='barrier'}]}) 03:51:21 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000009c0)='\xce\x8f*\xf7\x00', 0x67514c7366170ade, 0x0) write$fb(r0, &(0x7f0000000000)="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", 0x43e4) ioctl$FBIOBLANK(r0, 0x40305839, 0x4ed000) write$fb(r0, &(0x7f0000000280)="da", 0x1) 03:51:21 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)="7083222a475dbb", 0x7) r0 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r1 = dup2(r0, r0) write$P9_RLINK(r1, &(0x7f0000000500)={0x7}, 0xb2) 03:51:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x36a5d521b3c05f96, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000280)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fb], 0x1f004}) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:51:21 executing program 5: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nlmon0\x00', 0x1}, 0xfffffe20) getsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000080)=""/28, &(0x7f0000001400)=0x1c) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @multicast2}}) ioctl(r0, 0x80000000008936, &(0x7f0000000000)) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2009000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) syz_open_procfs(0x0, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x1bdd307, 0x0) 03:51:21 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000009c0)='\xce\x8f*\xf7\x00', 0x67514c7366170ade, 0x0) write$fb(r0, &(0x7f0000000000)="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", 0x43e4) ioctl$FBIOBLANK(r0, 0x40305839, 0x4ed000) write$fb(r0, &(0x7f0000000280)="da", 0x1) [ 210.222597][ T9103] gfs2: not a GFS2 filesystem 03:51:21 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)="7083222a475dbb", 0x7) r0 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r1 = dup2(r0, r0) write$P9_RLINK(r1, &(0x7f0000000500)={0x7}, 0xb2) 03:51:21 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000009c0)='\xce\x8f*\xf7\x00', 0x67514c7366170ade, 0x0) write$fb(r0, &(0x7f0000000000)="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", 0x43e4) ioctl$FBIOBLANK(r0, 0x40305839, 0x4ed000) write$fb(r0, &(0x7f0000000280)="da", 0x1) 03:51:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x2}, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r2, 0x0, 0xedc0) 03:51:21 executing program 4: syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@barrier='barrier'}]}) 03:51:21 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)="7083222a475dbb", 0x7) syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0xb2) [ 210.619621][ T9132] gfs2: not a GFS2 filesystem [ 210.899743][ T9125] syz-executor.1 (9125) used greatest stack depth: 21848 bytes left 03:51:22 executing program 0: r0 = memfd_create(&(0x7f000088f000)='b\n\x00', 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fstatfs(r0, &(0x7f0000000880)=""/4096) 03:51:22 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000009c0)='\xce\x8f*\xf7\x00', 0x67514c7366170ade, 0x0) write$fb(r0, &(0x7f0000000000)="112b605d22599709a94949f48a30332c71965a47599bff819218d8510e519fac99af77c111ddb5dba2d3367cae2132048f5221ce8cae670cd5e9dd7e309e0dee827b7a8c41933efb5ea19cab96d954f02aa27d0182ff570090cea916dfeacc170c45ccd286ef001e4f5c41ad195085f378db815b2d9d4a80630807d0df220fc0d29f1dd4d5660e6db87984f3281aab1d6176cc330400000000000000c7f5b0d55f52c8a5a2889120f0cdda3037d926be4ed1f02acd48c43fedfc0c1dbfc43769f919ff1813f634cc8900aec4d434fc384cfc490732388dae09ffdb9ab43998149476f83a64d3aaf6eb9e2a75f23ff0fe7a3253934611aa7ed3f3e557ebdfba2252c5a96e23ed3b128bc1db19ed35cae3428d74d567dad2adffef5c7d91cf180d614e7f01a20af54edcaaa6d2d97d175a17fb979b405fc013d409cc4240edf05bebf141f8570cf5be70dc438b4f037a28f28728a335ce1e8cb71ce1f63b56d6305477daec1c7e708a207c1c84b6a5276cb2fef622555ee64391b666bb31e0771a14c41558144a79e7e9fad683c2529547c8579af614cb4810557070c8b1726ac82d25703544c60d304b0000000000000000a25211656fb48b3a54276d596849a3d84eb509a4d0bd172b12b9c47e49f591349cb4629a4425d61734b2e1207322c5fcbed3d390bdcc92f306bbcc6fb7169c716edf1aea40c12e633938814bb5a11e11229ce1ea5079cb88d7cc8cc6c6dbab8d6b99dc8eb33361ec5d678a3b5a641d55ecc217698b8efc5a831353a551d4b8c62aaa8bcacf442adf946fb9967b19cd2e69c061311dc8591d6fd58ddcd07461c181f9700b8a2b3afbc43833c86549a7a3bf4a22a8140dcae7690b3bbb", 0x43e4) write$fb(r0, &(0x7f0000000280)="da", 0x1) 03:51:22 executing program 4: syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@barrier='barrier'}]}) 03:51:22 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)="7083222a475dbb", 0x7) syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0xb2) 03:51:22 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x2}, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r5, 0x0, 0xedc0) [ 211.197408][ T9152] gfs2: not a GFS2 filesystem 03:51:22 executing program 5: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nlmon0\x00', 0x1}, 0xfffffe20) getsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000080)=""/28, &(0x7f0000001400)=0x1c) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @multicast2}}) ioctl(r0, 0x80000000008936, &(0x7f0000000000)) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2009000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) syz_open_procfs(0x0, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x1bdd307, 0x0) 03:51:22 executing program 4: syz_mount_image$gfs2(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@barrier='barrier'}]}) 03:51:22 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)="7083222a475dbb", 0x7) syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0xb2) 03:51:22 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000009c0)='\xce\x8f*\xf7\x00', 0x67514c7366170ade, 0x0) write$fb(r0, &(0x7f0000000280)="da", 0x1) 03:51:22 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x1420000a77, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="20000000110001"], 0x1}}, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 03:51:22 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)="7083222a475dbb", 0x7) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(r0, &(0x7f0000000500)={0x7}, 0xb2) 03:51:22 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_int(r0, 0x29, 0x16, 0x0, 0x2) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 03:51:22 executing program 4: syz_mount_image$gfs2(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@barrier='barrier'}]}) 03:51:22 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000009c0)='\xce\x8f*\xf7\x00', 0x67514c7366170ade, 0x0) write$fb(r0, &(0x7f0000000280)="da", 0x1) 03:51:22 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)="7083222a475dbb", 0x7) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(r0, &(0x7f0000000500)={0x7}, 0xb2) 03:51:22 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000009c0)='\xce\x8f*\xf7\x00', 0x67514c7366170ade, 0x0) write$fb(r0, &(0x7f0000000280)="da", 0x1) 03:51:23 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)="7083222a475dbb", 0x7) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(r0, &(0x7f0000000500)={0x7}, 0xb2) 03:51:23 executing program 5: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nlmon0\x00', 0x1}, 0xfffffe20) getsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000080)=""/28, &(0x7f0000001400)=0x1c) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @multicast2}}) ioctl(r0, 0x80000000008936, &(0x7f0000000000)) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2009000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) syz_open_procfs(0x0, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x1bdd307, 0x0) 03:51:23 executing program 4: syz_mount_image$gfs2(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@barrier='barrier'}]}) 03:51:23 executing program 3: write$fb(0xffffffffffffffff, &(0x7f0000000000)="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", 0x43e4) write$fb(0xffffffffffffffff, &(0x7f0000000280)="da", 0x1) 03:51:23 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(r1, &(0x7f0000000500)={0x7}, 0xb2) 03:51:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="d800000018008109e00f80ecdb4cb9040a0265ef0b007c05e87c55a1bc000900b8000699030000000500150003008178a8000500400001400200000003ac060000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a468888786f9e5fd3e4f6d0200003f5aeb4edbb57a500365ca9e00360db798262f3d40fae04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f2726", 0xd8}], 0x1}, 0x0) 03:51:23 executing program 3: write$fb(0xffffffffffffffff, &(0x7f0000000000)="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", 0x43e4) write$fb(0xffffffffffffffff, &(0x7f0000000280)="da", 0x1) [ 212.603979][ T105] device bridge_slave_1 left promiscuous mode [ 212.612236][ T105] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.713661][ T105] device bridge_slave_0 left promiscuous mode [ 212.745310][ T105] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.911150][ T105] device hsr_slave_0 left promiscuous mode [ 214.949028][ T105] device hsr_slave_1 left promiscuous mode [ 215.005138][ T105] team0 (unregistering): Port device team_slave_1 removed [ 215.019790][ T105] team0 (unregistering): Port device team_slave_0 removed [ 215.033823][ T105] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 215.084269][ T105] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 215.228268][ T105] bond0 (unregistering): Released all slaves [ 215.383737][ T9231] IPv6: NLM_F_CREATE should be specified when creating new route [ 215.396181][ T9231] IPv6: Can't replace route, no match found [ 215.417155][ T9241] IPVS: ftp: loaded support on port[0] = 21 [ 215.589374][ T9241] chnl_net:caif_netlink_parms(): no params data found [ 215.620277][ T9241] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.627404][ T9241] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.635357][ T9241] device bridge_slave_0 entered promiscuous mode [ 215.644118][ T9241] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.651656][ T9241] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.659851][ T9241] device bridge_slave_1 entered promiscuous mode [ 215.679494][ T9241] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 215.692718][ T9241] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 215.714155][ T9241] team0: Port device team_slave_0 added [ 215.722431][ T9241] team0: Port device team_slave_1 added [ 215.781260][ T9241] device hsr_slave_0 entered promiscuous mode [ 215.830273][ T9241] device hsr_slave_1 entered promiscuous mode [ 215.905137][ T9241] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.912263][ T9241] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.919649][ T9241] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.926695][ T9241] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.984687][ T9241] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.001670][ T8913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.012502][ T8913] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.021858][ T8913] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.038564][ T9241] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.054932][ T8913] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.064203][ T8913] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.071317][ T8913] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.091785][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.101247][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.108331][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.131462][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.140609][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.149135][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.163754][ T9241] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 216.176801][ T9241] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.186479][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.195202][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.221904][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.230892][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.241953][ T9241] 8021q: adding VLAN 0 to HW filter on device batadv0 03:51:27 executing program 4: syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@barrier='barrier'}]}) 03:51:27 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(r1, &(0x7f0000000500)={0x7}, 0xb2) 03:51:27 executing program 3: write$fb(0xffffffffffffffff, &(0x7f0000000000)="112b605d22599709a94949f48a30332c71965a47599bff819218d8510e519fac99af77c111ddb5dba2d3367cae2132048f5221ce8cae670cd5e9dd7e309e0dee827b7a8c41933efb5ea19cab96d954f02aa27d0182ff570090cea916dfeacc170c45ccd286ef001e4f5c41ad195085f378db815b2d9d4a80630807d0df220fc0d29f1dd4d5660e6db87984f3281aab1d6176cc330400000000000000c7f5b0d55f52c8a5a2889120f0cdda3037d926be4ed1f02acd48c43fedfc0c1dbfc43769f919ff1813f634cc8900aec4d434fc384cfc490732388dae09ffdb9ab43998149476f83a64d3aaf6eb9e2a75f23ff0fe7a3253934611aa7ed3f3e557ebdfba2252c5a96e23ed3b128bc1db19ed35cae3428d74d567dad2adffef5c7d91cf180d614e7f01a20af54edcaaa6d2d97d175a17fb979b405fc013d409cc4240edf05bebf141f8570cf5be70dc438b4f037a28f28728a335ce1e8cb71ce1f63b56d6305477daec1c7e708a207c1c84b6a5276cb2fef622555ee64391b666bb31e0771a14c41558144a79e7e9fad683c2529547c8579af614cb4810557070c8b1726ac82d25703544c60d304b0000000000000000a25211656fb48b3a54276d596849a3d84eb509a4d0bd172b12b9c47e49f591349cb4629a4425d61734b2e1207322c5fcbed3d390bdcc92f306bbcc6fb7169c716edf1aea40c12e633938814bb5a11e11229ce1ea5079cb88d7cc8cc6c6dbab8d6b99dc8eb33361ec5d678a3b5a641d55ecc217698b8efc5a831353a551d4b8c62aaa8bcacf442adf946fb9967b19cd2e69c061311dc8591d6fd58ddcd07461c181f9700b8a2b3afbc43833c86549a7a3bf4a22a8140dcae7690b3bbb", 0x43e4) write$fb(0xffffffffffffffff, &(0x7f0000000280)="da", 0x1) 03:51:27 executing program 5: perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nlmon0\x00', 0x1}, 0xfffffe20) getsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000080)=""/28, &(0x7f0000001400)=0x1c) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @multicast2}}) ioctl(r0, 0x80000000008936, &(0x7f0000000000)) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket(0x200000000000011, 0x4000000000080002, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000540)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2009000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) syz_open_procfs(0x0, 0x0) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x1bdd307, 0x0) 03:51:27 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x2a7) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_int(r0, 0x29, 0x16, 0x0, 0x2) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 03:51:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0009ff", 0x2e}], 0x1}, 0x0) 03:51:27 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x67514c7366170ade, 0x0) write$fb(r0, &(0x7f0000000000)="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", 0x43e4) write$fb(r0, &(0x7f0000000280)="da", 0x1) 03:51:27 executing program 4: syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@barrier='barrier'}]}) 03:51:27 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(r1, &(0x7f0000000500)={0x7}, 0xb2) 03:51:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0009ff", 0x2e}], 0x1}, 0x0) 03:51:27 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x67514c7366170ade, 0x0) write$fb(r0, &(0x7f0000000000)="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", 0x43e4) write$fb(r0, &(0x7f0000000280)="da", 0x1) 03:51:28 executing program 2: socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540)="7083222a475dbb", 0x7) r0 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r1 = dup2(r0, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}) write$P9_RLINK(r1, &(0x7f0000000500)={0x7}, 0xb2) 03:51:28 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, 0x0, 0x67514c7366170ade, 0x0) write$fb(r0, &(0x7f0000000000)="112b605d22599709a94949f48a30332c71965a47599bff819218d8510e519fac99af77c111ddb5dba2d3367cae2132048f5221ce8cae670cd5e9dd7e309e0dee827b7a8c41933efb5ea19cab96d954f02aa27d0182ff570090cea916dfeacc170c45ccd286ef001e4f5c41ad195085f378db815b2d9d4a80630807d0df220fc0d29f1dd4d5660e6db87984f3281aab1d6176cc330400000000000000c7f5b0d55f52c8a5a2889120f0cdda3037d926be4ed1f02acd48c43fedfc0c1dbfc43769f919ff1813f634cc8900aec4d434fc384cfc490732388dae09ffdb9ab43998149476f83a64d3aaf6eb9e2a75f23ff0fe7a3253934611aa7ed3f3e557ebdfba2252c5a96e23ed3b128bc1db19ed35cae3428d74d567dad2adffef5c7d91cf180d614e7f01a20af54edcaaa6d2d97d175a17fb979b405fc013d409cc4240edf05bebf141f8570cf5be70dc438b4f037a28f28728a335ce1e8cb71ce1f63b56d6305477daec1c7e708a207c1c84b6a5276cb2fef622555ee64391b666bb31e0771a14c41558144a79e7e9fad683c2529547c8579af614cb4810557070c8b1726ac82d25703544c60d304b0000000000000000a25211656fb48b3a54276d596849a3d84eb509a4d0bd172b12b9c47e49f591349cb4629a4425d61734b2e1207322c5fcbed3d390bdcc92f306bbcc6fb7169c716edf1aea40c12e633938814bb5a11e11229ce1ea5079cb88d7cc8cc6c6dbab8d6b99dc8eb33361ec5d678a3b5a641d55ecc217698b8efc5a831353a551d4b8c62aaa8bcacf442adf946fb9967b19cd2e69c061311dc8591d6fd58ddcd07461c181f9700b8a2b3afbc43833c86549a7a3bf4a22a8140dcae7690b3bbb", 0x43e4) write$fb(r0, &(0x7f0000000280)="da", 0x1) 03:51:28 executing program 4: syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)={[{@barrier='barrier'}]}) 03:51:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x6c040054) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffc61) 03:51:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0009ff", 0x2e}], 0x1}, 0x0)