Warning: Permanently added '10.128.0.15' (ECDSA) to the list of known hosts. 2019/08/28 09:23:31 fuzzer started 2019/08/28 09:23:34 dialing manager at 10.128.0.26:41553 2019/08/28 09:23:34 syscalls: 2332 2019/08/28 09:23:34 code coverage: enabled 2019/08/28 09:23:34 comparison tracing: enabled 2019/08/28 09:23:34 extra coverage: extra coverage is not supported by the kernel 2019/08/28 09:23:34 setuid sandbox: enabled 2019/08/28 09:23:34 namespace sandbox: enabled 2019/08/28 09:23:34 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/28 09:23:34 fault injection: enabled 2019/08/28 09:23:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/28 09:23:34 net packet injection: enabled 2019/08/28 09:23:34 net device setup: enabled 09:25:35 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22, @remote}}}, &(0x7f0000000100)=0x84) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r1, 0x4) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000180)=""/140, &(0x7f0000000240)=0x8c) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={r1, 0x2, 0x1, [0x5]}, &(0x7f00000002c0)=0xa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x3, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x4, 0x1}, 0x0, 0x0, &(0x7f0000000380)={0x5, 0xf, 0x81, 0x8}, &(0x7f00000003c0)=0x3ff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x4}}, 0x10) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000540)={0x8, "08efaa43e70873bf749d2bec3e486ea1196c409e14c2bc52706b8d82b9f93ec8", 0x3, 0x20, 0x3, 0x400e0, 0x10000, 0x2}) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f00000005c0)={0x8, 0x6ac4, 0xaf8d, 0x9}) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000600)) accept4$tipc(r0, &(0x7f0000000640), &(0x7f0000000680)=0x10, 0x80000) write$UHID_INPUT2(r0, &(0x7f00000006c0), 0x6) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000700)={0xfd, 0x3}) socket$alg(0x26, 0x5, 0x0) write$P9_RRENAMEAT(r0, &(0x7f0000000740)={0x7, 0x4b, 0x2}, 0x7) r3 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000007c0)={{0x9, 0x3, 0x5, 0x4, 'syz1\x00', 0x2}, 0x3, 0x200, 0xc2, r3, 0x1, 0x401, 'syz0\x00', &(0x7f0000000780)=['systemvmnet0\x00'], 0xd, [], [0x1, 0x3, 0x6, 0x5]}) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000900)={{0xff, @local, 0x4e21, 0x3, 'sh\x00', 0x1, 0xf01, 0x22}, {@multicast2, 0x4e24, 0x3, 0xa98f, 0x8, 0xe593}}, 0x44) r4 = syz_open_dev$vcsa(&(0x7f0000000980)='/dev/vcsa#\x00', 0x4, 0x2) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f00000009c0)=0x7, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000a00)={0x20, 0x7, 0x8, 'queue0\x00', 0x3189}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000ac0)={0x7fff, 0x7f, 0x20, 0x4, 0x2}, 0x14) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000b40)={0x0, 0x0}, &(0x7f0000000b80)=0xc) sendmsg$nl_generic(r0, &(0x7f0000000dc0)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000d80)={&(0x7f0000000bc0)={0x184, 0x12, 0x1, 0x70bd27, 0x25dfdbfd, {0x13}, [@generic="4ca84c304c762cacc6d9788d248a4ae4581d276ca39a24c9918a2d852bcbc1eab6a478fafaa476b114c1548b8d872656674e4234b8612461a819c5e265c9c304738988d8ca7e7b4a26c3eec2a5fad4e158d53279e78dfcfca7e9ee97f48e4edc1b1a83c7423189f89bfccc9c69722d9ea09604ec0d62adff6b528429b321c17335a82be1da9dba2e042702df87668424c3a42332315cf3dfa93d341c505e287bca453d61f2fb67d0023f776674c211cb2ec09079dfc80c0b", @generic="c73d846b18a2c12b8113706d08cf8670687be08eed75122ff242739311ff0a5bf079a5c64654073ccbee1f69b74616342d076c1ae68e9c1fb28ad67fffed1199d04bf4b774cc370aa723b8cfc9424f84a3ec69dba03065c38fb7687799d5b4a87671a9dc492209e36a204f1b522d866b717dd80e08951c4a9dfd608f5dcdb6045b5b3f860e4bef312dd8f8e5b8e1ae64dc46a9", @nested={0x1c, 0x4e, [@typed={0x8, 0x35, @pid=r3}, @typed={0x8, 0x16, @uid=r5}, @typed={0x8, 0x28, @u32=0x7}]}, @typed={0x8, 0x64, @u32=0xfff}]}, 0x184}, 0x1, 0x0, 0x0, 0x200000d0}, 0x40) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000e00)={0x1, {{0x2, 0x4e24, @remote}}}, 0x88) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000ec0)='/proc/self/net/pfkey\x00', 0x10000, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000f40)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r6, &(0x7f00000011c0)={&(0x7f0000000f00)={0x10, 0x0, 0x0, 0x45849b2aa7cd1bdd}, 0xc, &(0x7f0000001180)={&(0x7f0000000f80)={0x1ec, r7, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x100, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xba1d, @remote, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xd}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2, @empty, 0xaee}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5c}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xaab6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}]}]}]}, 0x1ec}, 0x1, 0x0, 0x0, 0x20044080}, 0x11) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000001200)={r2, 0x7ff, 0x3c24, 0x14e}, &(0x7f0000001240)=0x10) ioctl$KVM_RUN(r6, 0xae80, 0x0) syzkaller login: [ 198.600670][ T9899] IPVS: ftp: loaded support on port[0] = 21 09:25:35 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x40, 0x80) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x0) preadv(r0, &(0x7f00000013c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/54, 0x36}, {&(0x7f0000001100)=""/118, 0x76}, {&(0x7f0000001180)=""/107, 0x6b}, {&(0x7f0000001200)=""/174, 0xae}, {&(0x7f00000012c0)=""/58, 0x3a}, {&(0x7f0000001300)=""/140, 0x8c}], 0x7, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000001440)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000001480)={0x6, 0x1, 0x2, 0x20, 0x3, [{0x24000000000000, 0x7, 0x6, 0x0, 0x0, 0xa9d9af81e8e45d40}, {0x1f, 0x8, 0x8, 0x0, 0x0, 0x1400}, {0x5, 0xc26f, 0x0, 0x0, 0x0, 0x200}]}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000001580)={0x0, 0x615}, &(0x7f00000015c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000001600)={0x333272ec80000, 0x208, 0x3, 0x40, r1}, 0x10) r2 = openat(r0, &(0x7f0000001640)='./file0\x00', 0xc2002, 0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001700)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000016c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000001740)={0x1, 0x10, 0xfa00, {&(0x7f0000001680), r3}}, 0x18) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f0000001780)={0x800, 0x0, 0x300d, 0xd8f2, 0x0, 0x66, 0x1f}) connect$l2tp(r2, &(0x7f00000017c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x0, 0x2, 0x1, 0x2, {0xa, 0x4e21, 0x6, @loopback, 0x2}}}, 0x3a) vmsplice(r0, &(0x7f0000001840)=[{&(0x7f0000001800)="03ad96965142e687682304980498fe068e7b32f7548aadd4ce2f79da684a", 0x1e}], 0x1, 0xa) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000001880)={r1, 0xfffffffffffffff8, 0x80, 0x2}, 0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000018c0)={r1, 0x17, "205a342cda6234091c0e4e567cdb67ffab57759b21547d"}, &(0x7f0000001900)=0x1f) r4 = shmget(0x3, 0x4000, 0x100, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000001940)=""/209) shmget(0x0, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000001a40)) r5 = pkey_alloc(0x0, 0x0) pkey_free(r5) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000001a80)=""/4096) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000002ac0)={0x1, 0x10, 0xfa00, {&(0x7f0000002a80), r3}}, 0x18) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) r6 = socket$vsock_stream(0x28, 0x1, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000002b40)={0x10, 0x30, 0xfa00, {&(0x7f0000002b00), 0x3, {0xa, 0x4e23, 0x2, @mcast2, 0x7ff}, r3}}, 0x38) fcntl$getown(r6, 0x9) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000002b80)={{0x0, @local, 0x4e22, 0x2, 'nq\x00', 0x14, 0x0, 0x4}, {@broadcast, 0x4e20, 0x10000, 0x508d787d, 0x878, 0x4}}, 0x44) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000002c00)='/proc/capi/capi20ncci\x00', 0x800, 0x0) [ 198.692821][ T9899] chnl_net:caif_netlink_parms(): no params data found [ 198.752590][ T9899] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.768389][ T9902] IPVS: ftp: loaded support on port[0] = 21 [ 198.771010][ T9899] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.782687][ T9899] device bridge_slave_0 entered promiscuous mode [ 198.802655][ T9899] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.809726][ T9899] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.817653][ T9899] device bridge_slave_1 entered promiscuous mode [ 198.839371][ T9899] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 198.851761][ T9899] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 198.884165][ T9899] team0: Port device team_slave_0 added [ 198.891548][ T9899] team0: Port device team_slave_1 added 09:25:35 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x200) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x42) r1 = getegid() ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={r2, r3, r1}, 0xc) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f00000002c0)=0xcd) connect$pptp(r0, &(0x7f0000000300)={0x18, 0x2, {0x0, @empty}}, 0x1e) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000440)={'nat\x00', 0x0, 0x4, 0x5b, [], 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000003c0)=""/91}, &(0x7f00000004c0)=0x78) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000500)={0x0, 0x95, "eaa1134791da995bcb931c340b22acaeb0febdfd64fce957bfd79c04ea88d4708f258cd2d10717a7e18f76a809eb56884f1c7c4a842a3fa9422a6455c7c0b3f47e8bf1647f5eb1d7c9d18f41f5b6aa230ee0bca0f82354590d407e01f5571e331c8fc90ede38fe0d17cdcc2ed71a39a0ab546a853854992dd87fe6245ee5d14f26bbc3b237edc28c489fff4623824f0c5ccc1d7363"}, &(0x7f00000005c0)=0x9d) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000600)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000640)=0x20) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000680)={r4, 0x7f, 0x4, 0x2, 0xfffffffffffffe00, 0x3, 0x1, 0x6, {r5, @in={{0x2, 0x4e24, @multicast2}}, 0x0, 0x80e4, 0x7f, 0x100, 0xfffffffffffffff7}}, &(0x7f0000000740)=0xb0) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000780)=0x9e8b) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000004, 0x80010, r0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000007c0)) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000800)='/dev/cachefiles\x00', 0x200001, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f00000008c0)={{&(0x7f0000000840)=""/19, 0x13}, &(0x7f0000000880), 0x1}, 0x20) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f0000000900)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000940)=[@in6={0xa, 0x4e23, 0x7fff, @mcast2, 0x7fffffff}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, @in6={0xa, 0x4e21, 0x7fff, @empty, 0x1}, @in={0x2, 0x4e24, @empty}], 0x58) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000009c0)={r0, r6}) connect$unix(r6, &(0x7f0000000a00)=@abs={0x1, 0x0, 0x4e20}, 0x6e) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000a80)={0x7, 0x80, [0x9153, 0xffff, 0xfffffffffffff0e4, 0x9, 0x24], 0x101}) ioctl$SCSI_IOCTL_SYNC(r6, 0x4) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000ac0)={0x4000000000000000, 0x4, 0x6, 0x0, 0xd}) getsockname(r0, &(0x7f0000000b00)=@pppol2tpin6, &(0x7f0000000b80)=0x80) getsockopt$sock_int(r6, 0x1, 0x1f, &(0x7f0000000bc0), &(0x7f0000000c00)=0x4) [ 198.957903][ T9902] chnl_net:caif_netlink_parms(): no params data found [ 199.024340][ T9899] device hsr_slave_0 entered promiscuous mode [ 199.033064][ T9905] IPVS: ftp: loaded support on port[0] = 21 [ 199.061229][ T9899] device hsr_slave_1 entered promiscuous mode 09:25:36 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000024c0)='/dev/btrfs-control\x00', 0x841, 0x0) sendmsg$nl_netfilter(r0, &(0x7f00000025c0)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000002580)={&(0x7f0000002540)={0x1c, 0x13, 0x0, 0x100, 0x70bd2a, 0x25dfdbfb, {0x2, 0x0, 0x4}, [@typed={0x8, 0x21, @ipv4=@local}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) poll(&(0x7f0000002600)=[{r0, 0x400}, {r0, 0x60}, {r0, 0x1123}, {r0}, {r0, 0x572}], 0x5, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x10, &(0x7f0000002640)=0xba4, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) readahead(r0, 0x1f, 0x2) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000002680)='syz1\x00') setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f00000026c0)=0x1, 0x4) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000002740)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000029c0)={&(0x7f0000002700)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002980)={&(0x7f0000002780)={0x1c4, r1, 0xcd13ba45bfdb049b, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x120, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xdee}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff615f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x507}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffff0000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffff801}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f51}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}]}]}, @TIPC_NLA_LINK={0x4c, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x84c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffff9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f0000002a00)={0x3ff}) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000002a80)={0x0, 0x2, 0x3000, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002bc0)={r0, &(0x7f0000002ac0)="74917fddf65d3ed48033350d4ea1a5c9a4b474b4bac11d1130205a8fc8c8fb58dd2ae329a08a5a4c899e1bde7e576b7c8d33b1636d1c9579b9fdd0a45f1b", &(0x7f0000002b00)=""/133}, 0x18) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000002c00)={0xffffffffffffff04, 0xae1c, 0x5, 0x80, 0x2, 0x8, 0x1, 0x0, 0x1, 0x101, 0x6f, 0x2}) r2 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000002d00)={&(0x7f0000002c40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002cc0)={&(0x7f0000002c80)={0x18, r1, 0x10, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x800}, 0x8000) shmget(0x3, 0x1000, 0x54000000, &(0x7f0000ffd000/0x1000)=nil) fcntl$getownex(r0, 0x10, &(0x7f0000002d40)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000002dc0)={{0x5, 0x6, 0x2, 0x7, 'syz1\x00', 0x77c9}, 0x4, 0x30, 0x2, r3, 0x1, 0x5, 'syz0\x00', &(0x7f0000002d80)=['syz1\x00'], 0x5, [], [0x0, 0x100000000, 0x1c72, 0x4]}) lgetxattr(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40)=@random={'user.', '\x00'}, &(0x7f0000002f80)=""/14, 0xe) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003000)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000030c0)={&(0x7f0000002fc0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000003080)={&(0x7f0000003040)={0x28, r4, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xd5}, 0x4000000) r5 = open_tree(r0, &(0x7f0000003100)='./file0\x00', 0x88901) mkdirat(r5, &(0x7f0000003140)='./file0\x00', 0xb1) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000003180)) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f00000031c0)=0x3) syz_genetlink_get_family_id$ipvs(&(0x7f0000003200)='IPVS\x00') r6 = syz_open_dev$media(&(0x7f0000003240)='/dev/media#\x00', 0xd66, 0x400000) fsetxattr$trusted_overlay_nlink(r6, &(0x7f0000003280)='trusted.overlay.nlink\x00', &(0x7f00000032c0)={'U+', 0x8}, 0x28, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003500)={r0, 0xc0, &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003300)=0xf0, 0x0, 0x0, 0x0, &(0x7f0000003340)={0x1, 0x5}, 0x0, 0x0, &(0x7f0000003380)={0x3, 0xf, 0xf62}, &(0x7f00000033c0)=0x3ff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003400)=0x8}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003540)=r7, 0x4) [ 199.187458][ T9902] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.211799][ T9902] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.226726][ T9902] device bridge_slave_0 entered promiscuous mode [ 199.237868][ T9899] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.245068][ T9899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.252404][ T9899] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.259622][ T9899] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.268906][ T9907] IPVS: ftp: loaded support on port[0] = 21 [ 199.290093][ T9902] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.298412][ T9902] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.307186][ T9902] device bridge_slave_1 entered promiscuous mode 09:25:36 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)=0x6) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f00000000c0)=0x5) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000100)={r0, 0x5, 0x56146a5a, "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"}) syz_genetlink_get_family_id$ipvs(&(0x7f0000001140)='IPVS\x00') ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000001180)=@buf) r1 = getgid() ioctl(0xffffffffffffffff, 0x8f, &(0x7f00000011c0)="915097be99f7a3de12f5679ffda0171d0f47a5199dac37b78bd63ae9324659b7c22960f6af9f59a709450ee0448eb8b6e6c9241949cbf3") fsetxattr$security_selinux(r0, &(0x7f0000001200)='security.selinux\x00', &(0x7f0000001240)='system_u:object_r:systemd_logger_exec_t:s0\x00', 0x2b, 0x2) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000001280)=0x1, 0x4) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000012c0)) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000001300)={0x3, [0x7, 0x7ff, 0x3]}, &(0x7f0000001340)=0xa) sysfs$2(0x2, 0x321c0, &(0x7f0000001380)=""/109) fcntl$setstatus(r0, 0x4, 0x44000) r2 = syz_open_dev$usbmon(&(0x7f0000001400)='/dev/usbmon#\x00', 0x5, 0x600000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000001440)='+systemeth17\x00') prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000001480)) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000002740)={0x5, 0x0, [{0x3000, 0x1000, &(0x7f00000014c0)=""/4096}, {0x4, 0xd7, &(0x7f00000024c0)=""/215}, {0x10000, 0x1e, &(0x7f00000025c0)=""/30}, {0xf000, 0xdd, &(0x7f0000002600)=""/221}, {0xf000, 0x9, &(0x7f0000002700)=""/9}]}) fsync(r2) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000002800)) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000002840)={0x6176, 0x1}) lstat(&(0x7f0000002880)='./file0\x00', &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = dup(r0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000002940), &(0x7f0000002980)=0x4) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000029c0)=r0) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f0000002a00)=0x8) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000002a80)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f0000002b80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002b40)={&(0x7f0000002ac0)={0x68, r5, 0x8, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x5, @media='udp\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x4000800) fchownat(r4, &(0x7f0000002bc0)='./file0\x00', r3, r1, 0x800) [ 199.369417][ T9902] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.410678][ T9902] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.428624][ T9899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 199.494086][ T9911] IPVS: ftp: loaded support on port[0] = 21 [ 199.531629][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 09:25:36 executing program 5: r0 = shmget$private(0x0, 0x14000, 0x20, &(0x7f0000fea000/0x14000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/26) recvmmsg(0xffffffffffffffff, &(0x7f0000004f80)=[{{&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000011c0)=[{&(0x7f00000000c0)=""/178, 0xb2}, {&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/22, 0x16}], 0x3, &(0x7f0000001200)=""/249, 0xf9}, 0x7}, {{&(0x7f0000001300)=@ipx, 0x80, &(0x7f00000035c0)=[{&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/204, 0xcc}, {&(0x7f0000002480)=""/4096, 0x1000}, {&(0x7f0000003480)=""/27, 0x1b}, {&(0x7f00000034c0)=""/82, 0x52}, {&(0x7f0000003540)=""/55, 0x37}, {&(0x7f0000003580)=""/35, 0x23}], 0x7, &(0x7f0000003640)=""/109, 0x6d}, 0x1}, {{&(0x7f00000036c0)=@can, 0x80, &(0x7f0000003ac0)=[{&(0x7f0000003740)=""/171, 0xab}, {&(0x7f0000003800)=""/156, 0x9c}, {&(0x7f00000038c0)=""/189, 0xbd}, {&(0x7f0000003980)=""/69, 0x45}, {&(0x7f0000003a00)=""/167, 0xa7}], 0x5, &(0x7f0000003b40)=""/4096, 0x1000}, 0x1f}, {{&(0x7f0000004b40)=@nfc, 0x80, &(0x7f0000004e80)=[{&(0x7f0000004bc0)=""/115, 0x73}, {&(0x7f0000004c40)=""/159, 0x9f}, {&(0x7f0000004d00)=""/115, 0x73}, {&(0x7f0000004d80)=""/24, 0x18}, {&(0x7f0000004dc0)=""/137, 0x89}], 0x5, &(0x7f0000004f00)=""/80, 0x50}, 0x7}], 0x4, 0x100, &(0x7f0000005080)={0x0, 0x1c9c380}) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000050c0)=0x200, 0x4) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000005140)=@filter={'filter\x00', 0xe, 0x4, 0x368, 0x110, 0x110, 0x210, 0x210, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x2d0, 0x2d0, 0x4, &(0x7f0000005100), {[{{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0xab7, 0x1ff}}, @common=@socket0={0x20, 'socket\x00'}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x2}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@set={0x40, 'set\x00', 0x0, {{0x9, [0x80, 0x8001, 0x7, 0xfffffffffffeffff, 0x2, 0x1], 0x200, 0x8}}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}, {{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000005540)={0xc, @multicast1, 0x4e22, 0x4, 'none\x00', 0x10, 0x1f, 0x65}, 0x2c) getsockname$packet(r1, &(0x7f0000005580), &(0x7f00000055c0)=0x14) r2 = epoll_create1(0x80000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000005600)=@assoc_value={0x0}, &(0x7f0000005640)=0x8) r4 = fcntl$dupfd(r1, 0x0, r2) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000005680)=0x8, 0x4) r5 = socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000056c0)={r3}, &(0x7f0000005700)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000005740)=@int=0x3, 0x4) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r4, 0x3) ioctl$SG_SET_COMMAND_Q(r4, 0x2271, &(0x7f0000005780)=0x1) futimesat(r4, &(0x7f00000057c0)='./file0\x00', &(0x7f0000005800)={{0x0, 0x7530}, {0x77359400}}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000005840)=0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000058c0)={0xffffffffffffffff, r4, 0x0, 0x7, &(0x7f0000005880)='REJECT\x00', 0xffffffffffffffff}, 0x30) r7 = syz_open_procfs(r6, &(0x7f0000005900)='attr/current\x00') ioctl$BLKREPORTZONE(r7, 0xc0101282, &(0x7f0000005940)={0x20, 0x2, 0x0, [{0x0, 0x9, 0x9a, 0x6, 0xffffffff, 0x3, 0x4}, {0x3e, 0x8, 0x2, 0x17cc, 0x711b, 0x7, 0x1}]}) r8 = open(&(0x7f0000005a00)='./file0\x00', 0x440, 0x10) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000005a40)={'nat\x00', 0xb3, "d7c68bce4e43db511adea0bfabb445a0e4a5d7c23062ebe90e84cd665913e025057e53d65d3190fba0fab8ff851a748e6aaabc6fc2783a79d51fc1b49cc8150ace3e26aca354e58808a40d09c0ba9d978a3cd4b96052f01ac6477db3267d0d4d86296665b44cf8ed4fb20c8a03990b24885a3fa15fe90ca1a2cb58be44e838c60af9860e57bf630a03024cf0fa65261a54fa4dee062b785fb9f6a43d1b9685527c4d512e8caaf617924c0e8a8b35f56cec8093"}, &(0x7f0000005b40)=0xd7) write$capi20_data(r5, &(0x7f0000005b80)={{0x10, 0xd, 0x88, 0x82, 0x5, 0xfffffffffffffffd}, 0xc0, "18a836b6f61b50afe8b6a8560526c92ac5a628166dd9063346bd768363ebd0a2dbacd40ee0bed072d1ac897e6cfd3a1d6d522431b21ac618425d7e08d9b396e5d445b6708cc929972ff2034c5e49e7106f388fbd585460f184dec65dd68fde0dd345eb35c8906f30baa3451ffae7ca107d454280d454cc4f32656c8398716af418546e3c509a7edffe6e7bb5eed31fc0257f80a0e72704595cdab675a79e80a8052ee9d5663e2abd3812ce8c87ccf59d3cadc47e174258429fabdb5e157fd2d9"}, 0xd2) ioctl$EVIOCSKEYCODE_V2(r8, 0x40284504, &(0x7f0000005c80)={0x1, 0x6, 0x7fffffff, 0x3, "b48667b097cd8afe52f47804a5e4cc24a376472b23d24801065a8bcdcbd2c0fa"}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r4, 0x111, 0x1, 0x8, 0x4) ioctl$LOOP_SET_STATUS(r7, 0x4c02, &(0x7f0000005cc0)={0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x10, 0x10, "41a669346e586d0c3920fe65a352238616a293592b4fe7990668c397d76212d678a43d8d05b0ff7857a33cb93d97ae7bd78d5d63d1f4ec9b8e09bd99627bd114", "979233ab1b581d80a848d5b24f0bb4c408b4dd343f55a12fd0679efd58ec277f", [0x5]}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r8, 0x4040534e, &(0x7f0000005d80)={0x101, @tick=0x4d, 0xff, {0x9, 0x100}, 0x4ea5e7c, 0x0, 0x9}) ioctl$TCSETSW(r4, 0x5403, &(0x7f0000005e00)={0x4, 0x3, 0x7, 0x3, 0x6, 0x3, 0x100, 0x3f, 0x9, 0x3e, 0x20, 0x1}) r9 = syz_genetlink_get_family_id$fou(&(0x7f0000005e80)='fou\x00') sendmsg$FOU_CMD_ADD(r4, &(0x7f0000005f80)={&(0x7f0000005e40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000005f40)={&(0x7f0000005ec0)={0x4c, r9, 0x2, 0x70bd2d, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @loopback}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @remote}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000840) [ 199.552364][ T3517] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.570308][ T3517] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.578518][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 199.590440][ T9902] team0: Port device team_slave_0 added [ 199.613625][ T9899] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.641526][ T9902] team0: Port device team_slave_1 added [ 199.656760][ T9907] chnl_net:caif_netlink_parms(): no params data found [ 199.693886][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.703519][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.712337][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.714488][ T9916] IPVS: ftp: loaded support on port[0] = 21 [ 199.719389][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.733491][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.742525][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.751038][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.758080][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.832950][ T9902] device hsr_slave_0 entered promiscuous mode [ 199.871298][ T9902] device hsr_slave_1 entered promiscuous mode [ 199.911046][ T9902] debugfs: Directory 'hsr0' with parent '/' already present! [ 199.936239][ T9907] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.943689][ T9907] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.951764][ T9907] device bridge_slave_0 entered promiscuous mode [ 199.959187][ T9905] chnl_net:caif_netlink_parms(): no params data found [ 199.968481][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.989919][ T9907] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.997684][ T9907] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.005569][ T9907] device bridge_slave_1 entered promiscuous mode [ 200.029795][ T9899] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 200.040791][ T9899] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 200.052561][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 200.061527][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 200.069949][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 200.078469][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 200.087189][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 200.095531][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 200.103735][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 200.112150][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 200.120521][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 200.129027][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 200.136755][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 200.148877][ T9907] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.163658][ T9907] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.224157][ T9905] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.232141][ T9905] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.239872][ T9905] device bridge_slave_0 entered promiscuous mode [ 200.264616][ T9907] team0: Port device team_slave_0 added [ 200.275390][ T9907] team0: Port device team_slave_1 added [ 200.281786][ T9905] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.289007][ T9905] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.296666][ T9905] device bridge_slave_1 entered promiscuous mode [ 200.312709][ T9905] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.325697][ T9905] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.337652][ T9911] chnl_net:caif_netlink_parms(): no params data found [ 200.423344][ T9907] device hsr_slave_0 entered promiscuous mode [ 200.462449][ T9907] device hsr_slave_1 entered promiscuous mode [ 200.501143][ T9907] debugfs: Directory 'hsr0' with parent '/' already present! [ 200.533891][ T9905] team0: Port device team_slave_0 added [ 200.540782][ T9899] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.555754][ T9916] chnl_net:caif_netlink_parms(): no params data found [ 200.570225][ T9905] team0: Port device team_slave_1 added [ 200.603309][ T9907] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.610395][ T9907] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.617760][ T9907] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.624846][ T9907] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.683574][ T9905] device hsr_slave_0 entered promiscuous mode [ 200.731240][ T9905] device hsr_slave_1 entered promiscuous mode [ 200.771097][ T9905] debugfs: Directory 'hsr0' with parent '/' already present! [ 200.785486][ T9911] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.792652][ T9911] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.800206][ T9911] device bridge_slave_0 entered promiscuous mode [ 200.810097][ T9911] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.819989][ T9911] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.828317][ T9911] device bridge_slave_1 entered promiscuous mode [ 200.840515][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.848872][ T22] bridge0: port 2(bridge_slave_1) entered disabled state 09:25:37 executing program 0: r0 = msgget(0x0, 0x204) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') msgrcv(r0, &(0x7f0000000340)={0x0, ""/4096}, 0x1008, 0x1, 0x1800) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x14, r2, 0x1, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) [ 200.882885][ T9902] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.922078][ T9911] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 09:25:37 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101100, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000080)=0xc, 0x4) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000100)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$inet_int(r1, 0x10d, 0x1, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 200.939470][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.947397][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.960588][ T9902] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.975553][ T9916] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.983051][ T9916] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.994726][ T9916] device bridge_slave_0 entered promiscuous mode [ 201.003877][ T9911] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.023375][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.032030][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.040848][ T9931] do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app [ 201.049567][ T3015] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.056656][ T3015] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.065059][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.073600][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.082605][ T3015] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.089631][ T3015] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.097665][ T9916] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.105448][ T9916] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.108152][ T9931] do_dccp_getsockopt: sockopt(PACKET_SIZE) is deprecated: fix your app [ 201.121755][ T9916] device bridge_slave_1 entered promiscuous mode [ 201.140836][ T9916] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.160591][ T9902] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 201.171219][ T9902] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 201.183908][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.196707][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.205439][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.216192][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.225171][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.233676][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.242372][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.250743][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.259019][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.267227][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.275592][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.283923][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 09:25:38 executing program 0: ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, &(0x7f0000000080)={0x1, 0x0, 0x1000, 0x1f, &(0x7f0000000000)="5f10afa15d7fd3f1f4fde40c9710dccbbb24e696a18d03704f7e3afb055e12", 0x0, 0x0, 0x0}) r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x8982, &(0x7f0000000000)={0x6, 0x0, {0x0, @link_local, 'veth0_to_team\x00'}}) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xeeb6e51350298536}, 'syz_tun\x00'}}, 0x1e) [ 201.291705][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.303778][ T9916] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.335755][ T9911] team0: Port device team_slave_0 added [ 201.355286][ T9907] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.370665][ T9911] team0: Port device team_slave_1 added [ 201.385569][ T9916] team0: Port device team_slave_0 added 09:25:38 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) [ 201.403926][ T9916] team0: Port device team_slave_1 added [ 201.413222][ T9902] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.424394][ T9907] 8021q: adding VLAN 0 to HW filter on device team0 09:25:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000140)=0xe, 0x4) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000100)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000180)=0x8, 0x4) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f00000000c0)=@req={0x30a, 0x0, 0x0, 0x7}, 0x10) [ 201.452388][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.471329][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.488272][ T9905] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.553650][ T9911] device hsr_slave_0 entered promiscuous mode [ 201.593027][ T9911] device hsr_slave_1 entered promiscuous mode [ 201.631224][ T9911] debugfs: Directory 'hsr0' with parent '/' already present! [ 201.643122][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.652222][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.660618][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.667811][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 09:25:38 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_emit_ethernet(0x300cce, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000008100000086dd60656bd43343a3becdb409000008000002024300800080000000ffffe0000002ff0200000000000000000000000000012f0090780007040060b680fa000000000000000040000000000000ffffac14ffbb00"/114], 0x0) [ 201.675553][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.684909][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.693368][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.700447][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.717429][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 09:25:38 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f0000005100)=[{{0x0, 0x2e0, 0x0, 0x158, &(0x7f0000000000)=ANY=[@ANYRES16], 0x429}}], 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) r0 = syz_open_dev$midi(&(0x7f0000000980)='/dev/midi#\x00', 0x1, 0xa2401) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000a00)=@assoc_value={0x0, 0x10000}, &(0x7f0000000a40)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000b40)={r1, 0xa4, &(0x7f0000000a80)=[@in6={0xa, 0x4e23, 0x401, @ipv4={[], [], @remote}, 0x2}, @in6={0xa, 0x4e22, 0xfffffffffffffff8, @mcast1, 0x7}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xd}}, @in6={0xa, 0x4e21, 0x0, @empty, 0x100000001}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000b80)=0x10) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f00000009c0)={0x1, 0x0, {0x7, 0x0, 0x81}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000940)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000040)) setsockopt$inet6_int(r2, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 201.729169][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.745495][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.754538][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.770861][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.791080][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.800419][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.816876][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.828791][ T9907] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 09:25:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000012c0)={'filter\x00'}, &(0x7f0000000000)=0x54) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x7, 0x200) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0xa, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000001c0)={r2, 0x3}) socketpair(0x9, 0x6, 0xff, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000080)=0x5, 0x1) [ 201.840724][ T9907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.865834][ T9905] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.923296][ T9916] device hsr_slave_0 entered promiscuous mode [ 201.962203][ T9916] device hsr_slave_1 entered promiscuous mode [ 201.991438][ T9916] debugfs: Directory 'hsr0' with parent '/' already present! [ 202.000126][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.008442][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.017124][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.025518][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.033619][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.059114][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.068164][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.077592][ T3517] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.084774][ T3517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.100830][ T9907] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.108141][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.115974][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.124670][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.133049][ T3517] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.140118][ T3517] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.168301][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.177214][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.186058][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.194507][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.202946][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.211412][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.219838][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.234330][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.243660][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.255298][ T9905] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.267496][ T9905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.285845][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.294692][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.316940][ T9911] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.334674][ T9911] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.356155][ T9905] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.374119][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.382273][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.401217][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.409768][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.418575][ T3517] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.425716][ T3517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.434086][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.442896][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.451291][ T3517] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.458453][ T3517] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.466254][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.475286][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.483913][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.492986][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.501590][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.509503][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.519773][ T9916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.536496][ T9911] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 202.549800][ T9911] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.574487][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.595631][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.616384][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 09:25:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(0xffffffffffffffff, 0xc040564a, 0x0) r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x0, 0x2000) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000140)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$mouse(0x0, 0x3ff, 0x80000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000440)=""/144) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000780)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) readv(r2, &(0x7f00000018c0), 0x0) bind$xdp(r1, 0x0, 0x0) close(r2) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x0) umount2(&(0x7f0000000980)='./file0\x00', 0x2) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000500)={0x0, {0x8, 0x9, 0x0, 0xb2aa}}) r3 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000640)={0x4, 0x0, [{0x1000, 0xf8, &(0x7f0000000540)=""/248}, {0x10000, 0x0, &(0x7f00000000c0)}, {0x1000, 0x1000, &(0x7f00000009c0)=""/4096}, {0x10000, 0xc0, &(0x7f0000000240)=""/192}]}) openat$usbmon(0xffffffffffffff9c, 0x0, 0x2002, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) 09:25:39 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) socket$bt_rfcomm(0x1f, 0x3, 0x3) r0 = fanotify_init(0x10, 0x101000) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/mnt\x00') ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0xb703) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x4000, 0x0) syz_open_pts(r3, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x5, 0x311000) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f00000000c0)=0x1, 0x4) [ 202.625279][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.634504][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.653695][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 202.684036][ T3015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.718255][ T9911] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.746950][ T9916] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.757564][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.768743][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.790284][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.799628][ T3517] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.812208][ T3517] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.819348][ T3517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.851975][ T9916] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 202.862686][ T9916] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.874341][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.889168][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.898388][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.907144][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.914227][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.922335][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.930940][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.939633][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.948289][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.956856][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.965546][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.974120][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.982663][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.990826][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.999299][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.008740][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.016735][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 203.041718][ T9916] 8021q: adding VLAN 0 to HW filter on device batadv0 09:25:40 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="060000000000000000000000010000009500000000000049541a27f689919d435f5511860d538ab7e712d1d89400cd"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getpgrp(0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) prctl$PR_GET_PDEATHSIG(0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) setfsuid(0x0) sendto$inet(r1, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4800, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f00000000c0)={0x0, 0x5, 0x7ff, 0x1}) 09:25:40 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a5eac21a120000001a170fc05cc71ebca02503e13a5db0950e58b0e38aba401e2a9cf2284f9d619f81e08b49fdde56e09cf2abd8fbad5f17f28e1508c5061a10", "b0534be5a87cbb6f03b8d49394688e77aa140bda57a83d803f805c75ac2784f2"}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000100)={0x1000000, 0x9}, 0x2) 09:25:40 executing program 0: r0 = socket$inet(0x2, 0x5, 0x81) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000200)=0x44) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x2000) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000040)=0x49, 0x4) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) 09:25:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="05000000000000000000010000000000000007410000004c00180000006075647000"/98], 0x68}}, 0x0) fcntl$getflags(r0, 0x3fe87deb177e4cf7) 09:25:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace$setopts(0x4206, r1, 0x6, 0x2) connect$inet(r0, &(0x7f0000000200)={0x2, 0xfffffffffffffffc, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) getpeername(r0, 0x0, &(0x7f00000001c0)) 09:25:40 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x800000000145082) memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1a, 0x0, "71f3573b7b4b470b3db50b2f6e8cd68f0de29197b3dc7ffd2dee93d5d98356cb51ca23979c3675818b78116e39215526c0dab3773269056c6d69766b6c8a1d15", "0853c15335f30d2c0cbf107344bb3bb57c3091d5258954b6ce998e7549f28cae2e72bb207cb45c2ab8bed654ae472c9d712f7a0992af011e75c8043c54d4bc17", "0a3b312646ce558689f9fe9ae0a9f10dafa19cfb0cb24cfc3614216b79049d6c"}) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000100)=@v1={0x2, "d8a581774bfa77dbf06feef00b9ae18c26"}, 0x12, 0x2) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "d5c664460eb51b4750655695045e7a1109cbde48a35f6d7e3a5df08e7cf0362c766bf10646fb32d706ea70bb04dc645d573e32e49d334af78e88694212185782", "5012a18cbd03b599f45422cfe7d80901156969d706bc99fe72d23b09a23692e063a6dad5fb264119b482b642570b330baf7a8e9579658541d0a34287a2eeacc9", "acb622e943eac563db819e737c14ada6bbd7745b29e060de3096ee535dea9744"}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x40000, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(r1, 0x1, 0x0, 0x0) 09:25:40 executing program 5: ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x9, 0x3}) getdents64(0xffffffffffffffff, 0x0, 0xfffffd7e) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) r0 = dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) prctl$PR_GET_FP_MODE(0x2e) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000240), 0xfffffffffffffef9) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000500)) umount2(&(0x7f0000000080)='./bus\x00', 0x2) semget(0x2, 0x4, 0x8) r2 = semget$private(0x0, 0x0, 0x11) semctl$GETNCNT(r2, 0x1, 0xe, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x77}) prctl$PR_GET_FP_MODE(0x2e) sigaltstack(&(0x7f000038c000/0x1000)=nil, &(0x7f0000000180)) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r1, 0x0, 0x1, 0x0, &(0x7f0000000040)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000640)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @rand_addr="c2fc702e1f3fd6121edd3d7d9a7206ac", 0x0, 0x9, 0x0, 0x100, 0x1000, 0x100, r3}) creat(&(0x7f0000000700)='./bus\x00', 0x0) keyctl$clear(0x7, 0x0) 09:25:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x6b4, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000040)=0x400) r1 = request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r2, 0x300, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x810}, 0x40) [ 203.289247][ C1] hrtimer: interrupt took 26691 ns 09:25:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x10000, 0x0) r5 = geteuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x2, &(0x7f0000000380)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x6ee5140a61fcdfcf}}, {@max_read={'max_read', 0x3d, 0x4}}, {@max_read={'max_read', 0x3d, 0x9}}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@dont_hash='dont_hash'}, {@fowner_gt={'fowner>', r7}}, {@appraise='appraise'}]}}) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, 0x0, 0x0) connect$unix(r2, &(0x7f000057eff8)=@abs, 0xfffffefa) r8 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0xeb8461054df2b839, 0x0) ppoll(&(0x7f0000000300)=[{r2, 0x100010040}, {r1, 0x400}, {r2, 0x420}, {r0, 0x2296}, {r8, 0x4000}, {r4, 0x400}, {r3, 0x2}], 0x2000000000000198, 0x0, 0x0, 0x0) 09:25:40 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000040)=0x5) [ 348.321211][ T1056] INFO: task syz-executor.2:9976 blocked for more than 143 seconds. [ 348.329682][ T1056] Not tainted 5.3.0-rc6+ #147 [ 348.335482][ T1056] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 348.344623][ T1056] syz-executor.2 D25560 9976 9905 0x00004004 [ 348.351333][ T1056] Call Trace: [ 348.354916][ T1056] __schedule+0x755/0x1580 [ 348.359569][ T1056] ? __sched_text_start+0x8/0x8 [ 348.364664][ T1056] ? prepare_to_wait_event+0x12b/0x730 [ 348.370254][ T1056] ? rwlock_bug.part.0+0x90/0x90 [ 348.375394][ T1056] schedule+0xd9/0x260 [ 348.379651][ T1056] synchronize_rcu_expedited+0x544/0x5b0 [ 348.385625][ T1056] ? rcu_exp_wait_wake+0x450/0x450 [ 348.391543][ T1056] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 348.397628][ T1056] ? finish_wait+0x260/0x260 [ 348.402454][ T1056] ? debug_object_deactivate+0x320/0x320 [ 348.408310][ T1056] ? bdi_unregister+0x162/0x5b0 [ 348.413377][ T1056] ? __kasan_check_read+0x11/0x20 [ 348.418586][ T1056] ? __kasan_check_write+0x14/0x20 [ 348.423822][ T1056] ? lock_downgrade+0x920/0x920 [ 348.429391][ T1056] ? bdi_unregister+0x162/0x5b0 [ 348.434356][ T1056] ? trace_hardirqs_on+0x67/0x240 [ 348.440303][ T1056] ? bdi_unregister+0x162/0x5b0 [ 348.446006][ T1056] ? __local_bh_enable_ip+0x15a/0x270 [ 348.451454][ T1056] bdi_unregister+0x167/0x5b0 [ 348.456476][ T1056] ? wb_blkcg_offline+0x120/0x120 [ 348.461813][ T1056] ? refcount_dec_not_one+0x1f0/0x1f0 [ 348.467323][ T1056] ? rwlock_bug.part.0+0x90/0x90 [ 348.472456][ T1056] ? generic_shutdown_super+0x194/0x370 [ 348.478128][ T1056] bdi_put+0x15e/0x190 [ 348.482313][ T1056] generic_shutdown_super+0x2b0/0x370 [ 348.488024][ T1056] kill_anon_super+0x3e/0x60 [ 348.493072][ T1056] fuse_kill_sb_anon+0x1e/0x30 [ 348.498539][ T1056] deactivate_locked_super+0x95/0x100 [ 348.504260][ T1056] deactivate_super+0x1b2/0x1d0 [ 348.509558][ T1056] ? do_raw_spin_unlock+0x57/0x270 [ 348.516411][ T1056] ? mount_bdev+0x3c0/0x3c0 [ 348.522334][ T1056] ? dput+0x38/0xde0 [ 348.526262][ T1056] ? dput+0x1f2/0xde0 [ 348.530433][ T1056] ? mnt_get_writers.isra.0+0xf9/0x150 [ 348.536682][ T1056] cleanup_mnt+0x351/0x4b0 [ 348.541344][ T1056] ? trace_hardirqs_on+0x67/0x240 [ 348.546540][ T1056] ? __kasan_check_read+0x11/0x20 [ 348.551705][ T1056] __cleanup_mnt+0x16/0x20 [ 348.556288][ T1056] task_work_run+0x145/0x1c0 [ 348.561245][ T1056] exit_to_usermode_loop+0x316/0x380 [ 348.566831][ T1056] do_syscall_64+0x5a9/0x6a0 [ 348.571653][ T1056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.577798][ T1056] RIP: 0033:0x459879 [ 348.581822][ T1056] Code: 30 48 c7 44 24 38 00 00 00 00 48 c7 44 24 40 00 00 00 00 48 c7 44 24 48 00 00 00 00 e8 b0 67 ff ff 48 8b 44 24 50 48 8b 4c 24 <58> 48 89 01 48 8b 6c 24 60 48 83 c4 68 c3 e8 14 06 fd ff 0f 0b e8 [ 348.603860][ T1056] RSP: 002b:00007f55778a4c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 348.613007][ T1056] RAX: ffffffffffffffea RBX: 0000000000000005 RCX: 0000000000459879 [ 348.621416][ T1056] RDX: 0000000020000080 RSI: 0000000020000040 RDI: 0000000000000000 [ 348.629760][ T1056] RBP: 000000000075bf20 R08: 00000000200001c0 R09: 0000000000000000 [ 348.651558][ T1056] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55778a56d4 [ 348.659855][ T1056] R13: 00000000004c5e8b R14: 00000000004da9d8 R15: 00000000ffffffff [ 348.684479][ T1056] INFO: lockdep is turned off. [ 348.700316][ T1056] NMI backtrace for cpu 0 [ 348.705322][ T1056] CPU: 0 PID: 1056 Comm: khungtaskd Not tainted 5.3.0-rc6+ #147 [ 348.713316][ T1056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.723474][ T1056] Call Trace: [ 348.726838][ T1056] dump_stack+0x172/0x1f0 [ 348.731515][ T1056] nmi_cpu_backtrace.cold+0x70/0xb2 [ 348.736967][ T1056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 348.743596][ T1056] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 348.749826][ T1056] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 348.755943][ T1056] arch_trigger_cpumask_backtrace+0x14/0x20 [ 348.762479][ T1056] watchdog+0x9d0/0xef0 [ 348.766832][ T1056] kthread+0x361/0x430 [ 348.771698][ T1056] ? reset_hung_task_detector+0x30/0x30 [ 348.778538][ T1056] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 348.785271][ T1056] ret_from_fork+0x24/0x30 [ 348.789848][ T1056] Sending NMI from CPU 0 to CPUs 1: [ 348.795419][ C1] NMI backtrace for cpu 1 [ 348.795428][ C1] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 5.3.0-rc6+ #147 [ 348.795432][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.795434][ C1] RIP: 0010:reschedule_interrupt+0x0/0x20 [ 348.795445][ C1] Code: 66 2e 0f 1f 84 00 00 00 00 00 68 03 ff ff ff e8 b6 f0 ff ff e8 c1 23 00 00 e9 ab f1 ff ff 66 90 66 2e 0f 1f 84 00 00 00 00 00 <68> 02 ff ff ff e8 96 f0 ff ff e8 e1 1e 00 00 e9 8b f1 ff ff 66 90 [ 348.795448][ C1] RSP: 0018:ffff8880a98dfd38 EFLAGS: 00000086 [ 348.795453][ C1] RAX: 1ffffffff11a5e8d RBX: ffff8880a98c6340 RCX: 1ffffffff134b5de [ 348.795457][ C1] RDX: dffffc0000000000 RSI: ffffffff8177f03e RDI: ffffffff873db36c [ 348.795460][ C1] RBP: ffff8880a98dfd98 R08: ffff8880a98c6340 R09: ffffed1015318c69 [ 348.795463][ C1] R10: ffffed1015318c68 R11: ffff8880a98c6347 R12: dffffc0000000000 [ 348.795466][ C1] R13: ffffffff89a57cf8 R14: 0000000000000000 R15: 0000000000000001 [ 348.795470][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 348.795473][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 348.795476][ C1] CR2: ffffffffff600400 CR3: 0000000090e40000 CR4: 00000000001406e0 [ 348.795480][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 348.795483][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 348.795485][ C1] Call Trace: [ 348.795487][ C1] ? native_safe_halt+0xe/0x10 [ 348.795489][ C1] ? default_idle+0x4e/0x360 [ 348.795491][ C1] arch_cpu_idle+0xa/0x10 [ 348.795493][ C1] default_idle_call+0x84/0xb0 [ 348.795495][ C1] do_idle+0x413/0x760 [ 348.795497][ C1] ? arch_cpu_idle_exit+0x80/0x80 [ 348.795500][ C1] cpu_startup_entry+0x1b/0x20 [ 348.795502][ C1] start_secondary+0x315/0x430 [ 348.795504][ C1] ? set_cpu_sibling_map+0x2180/0x2180 [ 348.795507][ C1] secondary_startup_64+0xa4/0xb0 [ 348.796672][ T1056] Kernel panic - not syncing: hung_task: blocked tasks [ 348.989545][ T1056] CPU: 0 PID: 1056 Comm: khungtaskd Not tainted 5.3.0-rc6+ #147 [ 348.997469][ T1056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.007812][ T1056] Call Trace: [ 349.011195][ T1056] dump_stack+0x172/0x1f0 [ 349.015522][ T1056] panic+0x2dc/0x755 [ 349.019422][ T1056] ? add_taint.cold+0x16/0x16 [ 349.024186][ T1056] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 349.029872][ T1056] ? ___preempt_schedule+0x16/0x20 [ 349.035175][ T1056] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 349.041550][ T1056] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 349.048770][ T1056] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 349.055168][ T1056] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 349.062252][ T1056] watchdog+0x9e1/0xef0 [ 349.066642][ T1056] kthread+0x361/0x430 [ 349.070798][ T1056] ? reset_hung_task_detector+0x30/0x30 [ 349.076610][ T1056] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 349.082864][ T1056] ret_from_fork+0x24/0x30 [ 349.088901][ T1056] Kernel Offset: disabled [ 349.093412][ T1056] Rebooting in 86400 seconds..