[info] Using makefile-style concurrent boot in runlevel 2. [ 42.153540][ T26] audit: type=1800 audit(1575874006.258:21): pid=7483 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 42.195235][ T26] audit: type=1800 audit(1575874006.258:22): pid=7483 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.133' (ECDSA) to the list of known hosts. 2019/12/09 06:46:57 fuzzer started 2019/12/09 06:46:59 dialing manager at 10.128.0.105:38631 2019/12/09 06:46:59 syscalls: 2689 2019/12/09 06:46:59 code coverage: enabled 2019/12/09 06:46:59 comparison tracing: enabled 2019/12/09 06:46:59 extra coverage: extra coverage is not supported by the kernel 2019/12/09 06:46:59 setuid sandbox: enabled 2019/12/09 06:46:59 namespace sandbox: enabled 2019/12/09 06:46:59 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/09 06:46:59 fault injection: enabled 2019/12/09 06:46:59 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/09 06:46:59 net packet injection: enabled 2019/12/09 06:46:59 net device setup: enabled 2019/12/09 06:46:59 concurrency sanitizer: enabled 2019/12/09 06:46:59 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 56.393723][ T7654] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/09 06:47:19 adding functions to KCSAN blacklist: 'rcu_gp_fqs_check_wake' '__splice_from_pipe' 'poll_schedule_timeout' '__skb_try_recv_from_queue' 'ext4_da_write_end' 'do_nanosleep' 'p9_poll_workfn' '__process_echoes' 'tick_sched_do_timer' 'ext4_ext_insert_extent' 'ext4_has_free_clusters' 'ext4_mark_iloc_dirty' '__skb_wait_for_more_packets' 'do_group_exit' 'ext4_free_inode' 'mem_cgroup_select_victim_node' '__writeback_single_inode' '__fsnotify_recalc_mask' 'shmem_getpage_gfp' 'pipe_poll' '__percpu_ref_switch_mode' 'shmem_add_to_page_cache' 'packet_sendmsg' 'ip_finish_output2' 'run_timer_softirq' '__remove_hrtimer' '__dev_queue_xmit' 'calc_timer_values' 'vti_tunnel_xmit' 'exit_signals' 'dput' '__dentry_kill' 'flush_old_exec' 'find_get_pages_range_tag' 'ext4_nonda_switch' 'generic_update_time' 'add_timer' 'd_instantiate_new' 'pipe_wait' 'yama_ptracer_del' 'ext4_setattr' 'tomoyo_supervisor' 'blk_mq_dispatch_rq_list' 'kauditd_thread' '__filemap_fdatawrite_range' 'ktime_get_seconds' 'snd_seq_timer_get_cur_tick' 'pollwake' 'blk_mq_sched_dispatch_requests' 'tick_nohz_idle_stop_tick' 'do_exit' 'futex_wait_queue_me' 'blk_stat_add' 'install_new_memslots' '__mark_inode_dirty' 'tick_do_update_jiffies64' 'xas_find_marked' 'snd_seq_prioq_cell_out' 'inactive_list_is_low' 'add_timer_on' 'echo_char' 'blk_mq_run_hw_queue' 'get_signal' 'watchdog' 'do_signal_stop' 'timer_clear_idle' 'blk_mq_get_request' 'sit_tunnel_xmit' 'sctp_poll' 'n_tty_receive_buf_common' '__wb_update_bandwidth' 'find_next_bit' 'copy_process' 'sync_inodes_sb' 'wbt_wait' 'ipip_tunnel_xmit' 'pcpu_alloc' '__snd_rawmidi_transmit_ack' 'generic_fillattr' 'do_syslog' 'inet_unhash' 'mm_update_next_owner' 'vfs_readlink' 'generic_write_end' '__find_get_block' 'lruvec_lru_size' '__add_to_page_cache_locked' 'batadv_tt_local_add' 'netlink_getname' 'relay_switch_subbuf' '__delete_from_page_cache' 'commit_echoes' '__hrtimer_run_queues' 'ep_insert' 'vm_area_dup' 'wbt_done' 'ext4_mb_good_group' 'shmem_file_read_iter' 'tcp_add_backlog' 'ep_poll' 'list_lru_count_one' 'pid_update_inode' '__ext4_new_inode' 'evict' 'mod_timer' 'process_srcu' 'filemap_map_pages' 'dd_has_work' 'audit_log_start' 'wbt_issue' 'kernfs_refresh_inode' '__anon_vma_prepare' 'hsr_forward_skb' 'do_mpage_readpage' 'taskstats_exit' 'ktime_get_real_seconds' 'page_counter_try_charge' '__perf_event_overflow' 'common_perm_cond' 'generic_file_read_iter' 'snd_seq_check_queue' 'balance_dirty_pages' '__rb_rotate_set_parents' 'ext4_free_inodes_count' 'rcu_gp_fqs_loop' 'kvm_mmu_notifier_invalidate_range_end' 06:51:16 executing program 0: r0 = socket$inet6(0xa, 0x4, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0x9, {{0xa, 0x4e23, 0x7fff, @rand_addr="30af4fe66a9117ce82237e65d5bf7a29", 0x23}}}, 0x88) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x370f, 0x8000) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x480, 0x0) getdents(r2, &(0x7f00000001c0)=""/72, 0x48) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0}, &(0x7f0000000280)=0x14) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e23, 0x48, 0x4e22, 0x9, 0x2, 0x20, 0x4066ed849bdb8432, 0x2, r4, r5}, {0x20, 0xd69a, 0x0, 0x7f, 0x0, 0x20, 0x1, 0x3}, {0xfffffffffffffff9, 0xfff, 0x7ff, 0x20}, 0x2, 0x6e6bb3, 0x1, 0x0, 0x1, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0x1b}, 0x4d3, 0x6c}, 0xa, @in=@remote, 0x3507, 0x3, 0x1, 0x81, 0x3, 0xfff, 0x3}}, 0xe8) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcsa\x00', 0x900, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f0000000480), &(0x7f00000004c0)=0x4) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000500)={'nat\x00'}, &(0x7f0000000580)=0x78) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) write$cgroup_pid(r6, &(0x7f0000000600)=r7, 0x12) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000680)={0x0, 0xffffffff, 0xf4, &(0x7f0000000640)=0xffff}) r8 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001b00)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl(r8, 0x20, &(0x7f0000001b40)="f9667d6545401754e89c0a3b5f5cbffbfc114a86bd842dc7a3158bd968b9f1fa01ef9695921f04500c8adb26658dabdf75357cb458465d1df6722256701fc2e8bf8ef9819e59d1bf4a0e90d46481843e00ff20c9f0b2449d862aacc5ab834e02faa721b673a480127f371677c61c9c820b93505521147ed6951ab742c98208f368cc15c33878fdbdb88a91de2caaf131540ace98d72f938179ddd3efcf40268b3fe06aaa825b165c360dffe4e70fea1facce3978cc8dea88107affa1f6652dca868fd355fa533a4a13e9c45c020f10328ff17549704b") r9 = getpid() ptrace$peek(0x4, r9, &(0x7f0000001c40)) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000001c80)={{0xa, 0x4e21, 0x8000, @remote, 0x6}, {0xa, 0x4e23, 0x1ff, @mcast1, 0x40}, 0x9, [0x563, 0x80000001, 0x3, 0x3, 0x5, 0x0, 0x100, 0x6]}, 0x5c) connect$inet(r6, &(0x7f0000001d00)={0x2, 0x4e20, @multicast1}, 0x10) r10 = socket$bt_hidp(0x1f, 0x3, 0x6) connect(r10, &(0x7f0000001d40)=@generic={0x4, "5cd2cc7961af6619037ca0f4c193ff508196864381a8cc61e3c9fea67893adc1f5c1e36ff61fb1bbb8c7408afcd7c41372ada9ac90d4499389a9304929c06b5c7adf6e11f1cee56bfc83096dbb87a7fc236be1fd4aeace1f1b84bcdfd49fe1c1ed6ec22ec02aa3063ec0410a15d5aa7f3cca78a037cee1482f9c086dc248"}, 0x80) r11 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) recvfrom(r11, &(0x7f0000001dc0)=""/185, 0xb9, 0x20, 0x0, 0x0) r12 = socket$inet6_dccp(0xa, 0x6, 0x0) fchmod(r12, 0x29a) getsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000001e80), &(0x7f0000001ec0)=0x4) 06:51:16 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x200000) fadvise64(r0, 0xfffffffffffff801, 0x4, 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x101101) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e21, 0xe638, @mcast2, 0x1}}, 0xdb, 0x6}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000003c0)={r2, @in6={{0xa, 0x4e20, 0xb24, @mcast2}}, [0x400, 0x200, 0x8, 0xcf, 0xfff, 0x40, 0x3ff, 0x0, 0x40, 0x80000001, 0x5e83, 0x101, 0x0, 0x100000001, 0x100000001]}, &(0x7f00000004c0)=0x100) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000500)={r3, 0x80, 0x5, [0x7, 0xffff, 0x6, 0x7fff, 0x9]}, &(0x7f0000000540)=0x12) r4 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r4) fstat(r1, &(0x7f0000000600)) connect$tipc(r1, &(0x7f0000000680)=@name={0x1e, 0x2, 0x0, {{0x40, 0x4}, 0x4}}, 0x10) r5 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r5, 0x0, &(0x7f0000000740)='/dev/vcs#\x00', &(0x7f0000000780)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000880)={0x2, 0x9c, &(0x7f00000007c0)="869273b1c4139b6261e07f0ffcebc5a0305887d59f5c47d42d8a7e94ede980f33b0e7298209c8fc736daa3c70b8a4375c4c3b71069a46f665a47bb918f52cde845bfa70b3716b973b2f775287506771799797bd208f7e4a043f9bbdfca2ab1bd686ce3e772df1f683c342ca8b61fe1b6b67567e6f279a49cd889b128f37381d5d2809422971db1ecc93d9cd81d8802b792b8e1508830a080f1ec272c"}) socket$inet6_sctp(0xa, 0x1, 0x84) r6 = openat$drirender128(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/dri/renderD128\x00', 0x50400, 0x0) r7 = syz_open_dev$vcsu(&(0x7f0000000900)='/dev/vcsu#\x00', 0x40, 0x511000) r8 = dup2(r6, 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000980)=0x14) setsockopt$inet6_IPV6_PKTINFO(r8, 0x29, 0x32, &(0x7f00000009c0)={@rand_addr="29822ddb0bb0f35db792c62a0e9641a4", r9}, 0x14) r10 = openat(0xffffffffffffffff, &(0x7f0000000a00)='./file0\x00', 0x0, 0x81) r11 = syz_genetlink_get_family_id$team(&(0x7f0000000a80)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b80)=0x14) recvmsg$can_raw(r7, &(0x7f00000020c0)={&(0x7f0000000bc0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002000)=[{&(0x7f0000000c40)=""/182, 0xb6}, {&(0x7f0000000d00)=""/17, 0x11}, {&(0x7f0000000d40)=""/12, 0xc}, {&(0x7f0000000d80)=""/46, 0x2e}, {&(0x7f0000000dc0)=""/161, 0xa1}, {&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/21, 0x15}, {&(0x7f0000001ec0)=""/112, 0x70}, {&(0x7f0000001f40)=""/45, 0x2d}, {&(0x7f0000001f80)=""/128, 0x80}], 0xa}, 0x12000) sendmsg$TEAM_CMD_OPTIONS_SET(r10, &(0x7f00000022c0)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000002280)={&(0x7f0000002100)={0x148, r11, 0x200, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r12}, {0x74, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffb}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r13}, {0xb0, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}]}, 0x148}, 0x1, 0x0, 0x0, 0x51}, 0x0) r14 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000002300)='/dev/dlm_plock\x00', 0x40143, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000002340)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r14, 0x84, 0x11, &(0x7f0000002380)={0x0, 0x4}, &(0x7f00000023c0)=0x8) r15 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000002400)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r15, 0x8933, &(0x7f0000002440)={'tunl0\x00', r16}) [ 312.842268][ T7658] IPVS: ftp: loaded support on port[0] = 21 [ 312.952900][ T7658] chnl_net:caif_netlink_parms(): no params data found [ 312.981958][ T7658] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.989251][ T7658] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.997350][ T7658] device bridge_slave_0 entered promiscuous mode [ 313.004955][ T7658] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.019699][ T7658] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.027547][ T7658] device bridge_slave_1 entered promiscuous mode [ 313.045025][ T7658] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 313.058470][ T7658] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 313.077928][ T7658] team0: Port device team_slave_0 added [ 313.080054][ T7662] IPVS: ftp: loaded support on port[0] = 21 [ 313.085276][ T7658] team0: Port device team_slave_1 added 06:51:17 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101480, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r0, 0xc2604111, &(0x7f0000000040)={0x7, [[0x7, 0x5d, 0x0, 0x7, 0x101, 0x5, 0x1, 0x5], [0x5, 0x1, 0x9, 0x1000, 0x100, 0x0, 0x4, 0x10dd], [0x101, 0x9, 0x2, 0x100, 0x8, 0x4, 0x9, 0x5]], [], [{0x9, 0x1, 0x6}, {0xff, 0x2, 0x3}, {0x7, 0x9, 0x4}, {0x280000, 0xffffffff, 0x3f}, {0x9, 0x2e8ff977, 0x1}, {0x2, 0x200, 0x97f}, {0xae5, 0x1ff, 0x8}, {0x5, 0x1f, 0x4859440b}, {0x0, 0x6008, 0x100}, {0x7, 0x3, 0xfffffffe}, {0x3, 0x0, 0xffffffff}, {0xfff, 0x1, 0x10001}], [], 0x2}) socketpair(0x10, 0x800, 0x2, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x84680}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)={0x120, 0x0, 0x20e, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0xf0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc66}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x20, @remote, 0xff}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth0_to_hsr\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x7091, @dev={0xfe, 0x80, [], 0x20}, 0x2abd9cdd}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) fallocate(r1, 0x0, 0xfffffffffffffffe, 0xf158) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r3, 0x4020565b, &(0x7f0000000540)={0x6, 0x855e, 0x3}) r4 = dup(r0) ioctl$VIDIOC_G_JPEGCOMP(r4, 0x808c563d, &(0x7f0000000580)) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000640)={0x100, 0x4, [0x2]}) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f0000000680)='veth0_to_hsr\x00', &(0x7f00000006c0)) r5 = syz_open_procfs(0x0, &(0x7f0000000700)='net/ip_vs_stats\x00') r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000780)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r5, &(0x7f00000008c0)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000880)={&(0x7f00000007c0)={0xbc, r6, 0x100, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfe}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffff}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4000}, 0x44040584) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000900)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000940)=@assoc_value={0x0}, &(0x7f0000000980)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f00000009c0)={r8, 0x5}, &(0x7f0000000a00)=0x8) r10 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ubi_ctrl\x00', 0x8280, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000a80)={r9, 0x43, "c557a608dd5aa3ff4ba0d26f9b7fa802592a8c9b7e99e1f8dbf021ce313da03eb2c959dda0a0138bdf004448c19843d3a60767f0b9b371e6b0db14dc01e4fe69f5d51a"}, &(0x7f0000000b00)=0x4b) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r10, 0x84, 0x6d, &(0x7f0000000b40)={r11, 0xc7, "de463451df16fe7ff79499ebc269b6c6b68c85bbe395d5fc87d3a3f9c706d4692c7a8c7ba54b9deeabc1993cd94d03739d6f35ee3126062d41ecc21471b5c554b6765d2bd690ed174f47d010ecd8e100b68a01d88e7b6e9c646d4570b6eb9682143a69987212f80aa940c0f7be0f33534ae575d2ffee10dd592be6aa881a6b147450fc96b47e1317baa0a0b89f54137cb4b2368cd50741c5755c32376669bc02cf39bb9eadb99108c20cb5ed2c0648c89c17e8393f4bdd412be54444dc3ada8e0e191dc169580f"}, &(0x7f0000000c40)=0xcf) socketpair(0x9, 0x80005, 0xff, &(0x7f00000011c0)={0xffffffffffffffff}) ioctl$PPPIOCSFLAGS(r12, 0x40047459, &(0x7f0000001200)=0x1000000) r13 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001240)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r13, 0xc08c5336, &(0x7f0000001280)={0x81, 0x10000, 0x6211, 'queue1\x00', 0x7d}) r14 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$IMDELTIMER(r14, 0x80044941, &(0x7f0000001340)=0x2) r15 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001380)='/dev/vsock\x00', 0x20000, 0x0) ioctl$KVM_RUN(r15, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000013c0)={0x0, @in={{0x2, 0x4e23, @broadcast}}, 0x2, 0x9, 0x40, 0x6, 0x3}, &(0x7f0000001480)=0x98) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000014c0)={r16, @in={{0x2, 0x4e22, @empty}}, [0x8, 0xb45, 0x29, 0xfffffffffffffff9, 0x4, 0x0, 0xffffffffffff7fff, 0xffffffff, 0x7fff, 0x10000, 0xefd, 0x6, 0x100, 0x0, 0xbb9]}, &(0x7f00000015c0)=0x100) [ 313.178601][ T7658] device hsr_slave_0 entered promiscuous mode [ 313.216886][ T7658] device hsr_slave_1 entered promiscuous mode [ 313.300795][ T7664] IPVS: ftp: loaded support on port[0] = 21 [ 313.407213][ T7658] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.414494][ T7658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.421858][ T7658] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.428934][ T7658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.452308][ T7662] chnl_net:caif_netlink_parms(): no params data found [ 313.618122][ T7658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.625141][ T7662] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.637610][ T7662] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.666921][ T7662] device bridge_slave_0 entered promiscuous mode 06:51:17 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x12000, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000040)={0x0, 0xd, "2f25612cf7b86d295daa5ff086"}) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = geteuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$ptys(0xc, 0x3, 0x1) r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vhci\x00', 0x80400) r6 = openat$vnet(0xffffffffffffff9c, 0xfffffffffffffffd, 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000480)={0x0, 0x0}) getresuid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) r9 = getgid() r10 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) r12 = getgid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000002380)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002400)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000002500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000025c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002600)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000002700)=0xe8) r18 = accept4$ax25(0xffffffffffffffff, &(0x7f0000002740)={{0x3, @default}, [@netrom, @netrom, @netrom, @bcast, @netrom, @rose, @remote, @null]}, &(0x7f00000027c0)=0x48, 0x80800) r19 = syz_open_dev$rtc(&(0x7f0000002800)='/dev/rtc#\x00', 0x3, 0x100) r20 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000002840)='/dev/video36\x00', 0x2, 0x0) r21 = socket$pptp(0x18, 0x1, 0x2) r22 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000002880)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r23 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000028c0)={{{@in=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f00000029c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a00)={0x0, 0x0, 0x0}, &(0x7f0000002a40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002a80)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002ac0)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000002bc0)=0xe8) getresgid(&(0x7f0000002c00), &(0x7f0000002c40), &(0x7f0000002c80)=0x0) r29 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002cc0)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000002dc0)=0xe8) stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003340)={0x0, 0x0}, &(0x7f0000003380)=0xc) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000033c0)={0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003440)={0x0, 0x0}, &(0x7f0000003480)=0xc) r35 = getegid() r36 = getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f00000034c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r38 = getgid() r39 = socket$bt_cmtp(0x1f, 0x3, 0x5) r40 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r41 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000003540)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) r42 = openat$null(0xffffffffffffff9c, &(0x7f0000003580)='/dev/null\x00', 0x20000, 0x0) r43 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r44 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000035c0)='/proc/self/attr/current\x00', 0x2, 0x0) r45 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000003600)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r46 = accept4$tipc(0xffffffffffffffff, &(0x7f0000003640), &(0x7f0000003680)=0x10, 0xc0400) r47 = socket$bt_cmtp(0x1f, 0x3, 0x5) r48 = openat$kvm(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/kvm\x00', 0x2000, 0x0) r49 = open_tree(r0, &(0x7f0000003700)='./file0\x00', 0x80000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000038c0)=0x0) stat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000039c0)='./file0\x00', &(0x7f0000003a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003a80)={0x0, 0x0}) stat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b80)={0x0, 0x0, 0x0}, &(0x7f0000003bc0)=0xc) r56 = syz_open_dev$ttys(0xc, 0x2, 0x1) r57 = socket$tipc(0x1e, 0x2, 0x0) r58 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000003c80)=0xffffffffffffffff, 0x4) r59 = syz_open_dev$loop(&(0x7f0000003cc0)='/dev/loop#\x00', 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000003d80)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000100)="dfa19a41f1f942d47bd1a322f0503894f63d057ea4ac3e6cb3799ace170ac034c1208616d5536d70ac5f7f0bbf11e3c906eb525e1227d8a10a73085ae24cc1e88f53fa199726359c2618bfbcfc3f58d6749a4f97f7f31b62bc2f41aafe00ee0c46", 0x61}, {&(0x7f0000000180)="af50e01825aae425ed1dffc43b69c3e62efb12bb1ca61640421d42799e1078a361347d6963ebf4ef89d4a7643ccff32c840e4d0cf7ad17eb62f4d12f609afb405239cc3c5134434162e0c944218f1b21a152e2", 0x53}], 0x2, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @rights={{0x1c, 0x1, 0x1, [r4, r5, r6]}}, @cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}], 0x80, 0x84}, {&(0x7f0000000780)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000800)="178774a3fe5281c10e83b9e298f290344bb9ebaf2884d9c4398703f2257dce600bf292166f2147454fdeedec19494e185ac97bd85c023e026fcf1a33af4404d57c36cfdf9956995a428c9fb357bfbc9120fd7c9543d6f591279c6501ebc3975ed444ae631c7f94fd35a4b3bd23adc90a59174365e3b065fdc4d870a12954127d01d28dc8c3b022ab3e548c35967f0a793e60ded9bda61398e2937ccd6becaa62affc478bee9ffeee518b04c582293372b77f892bc41e41ebebea25035837419aecdcebce982db0ffec8a5233d7ccca1cce4906435ffbfb6f15daac53d8b760bedad4ac468aa7534c598050a87b7161", 0xef}], 0x1, 0x0, 0x0, 0x4000}, {&(0x7f0000000940)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001d00)=[{&(0x7f00000009c0)="c1d479e4fb0f348b8e614752f06f1db523ea2b5c719dee2ef18b65a2095b161e14c6d0b0ad13bfd26a2ada008ea826e02c5ca543b139e78d75e765da6f4d543940ee4b3ca3e70d8bbceca57fd2579d7dc4222d66dd98335d3cfa274dbba67d55392e29ea8105f88a2a0ee09f1d003673b36b02e8097873226890b596af96528bc3bfc52448204bc58d61f3b0fb94fe3c401760fac6af4288d7955f85a0391f4fde0242d4052df87cba1b4d97e55467491d9d78cc69d0cf22f652823ab9f2d2871b92649856117eab9f0bd80e4f1ca22d92129e77810d39944b38aacecb5b2fc3a9ccf7b0a6e5b68c32952fd964cca468b4", 0xf1}, {&(0x7f0000000ac0)="8cff75936b2f79382118346148b2a3715b29e1464dd93ee74b7483eac9c24106bcfcc431860f6adbc94ef425c401acda5fd202a7653d20a98aeef0598478e7bf610dd8f49177c031b143521765380c476d9a7b858a61126b216ee2a4a3d7dd62c3178a0bde3dadb4028c3a356f54577820c8485ce216be60d4be98a3d3088f35dc131c67ab7253307e0bed4fbc01835cb18450d025a6922565c9ca02d0c894425a17ffe51c27bc353d9b4755fbfca880f74344855fcc268722053a0a1276601719b49014fb4e19833b98128bf6e7a7d2e4ad36b3d2", 0xd5}, {&(0x7f0000000bc0)="122a94fbdc2d10656be4da425bc1b61762dc5238ad9c8cddd760e7f63a5fd18d6147299bb0532fa6acee71a52b3084816469912791e8883e54152a3ab2ac1a6422461c8c988a4c", 0x47}, {&(0x7f0000000c40)="f77a74fdd82b729da85ab793df1050c240242c827e7fb676a1ccdd24c086af0b188d4eb9897929db966ccae6eec4cab984dd6a6fc6d0267271a06a20c1274c8277aead5bf5a2ae", 0x47}, {&(0x7f0000000cc0)="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", 0x1000}, {&(0x7f0000001cc0)="0c2585fa409a63788bfdaa9ce9f2254756a1e49f764304ef5448261e7379a4520339d212c8c864c556f0511eb92f827bda352f", 0x33}], 0x6, 0x0, 0x0, 0x4002000}, {&(0x7f0000001d80)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000002300)=[{&(0x7f0000001e00)="115555b2dfbd698ad529e4e124b17f7cc0473e973322574e389214a811143dcd7729158c4548e47a07f725a1d63c1495323fc6e268cc32765059be7ed101b9068d508d6af3739dbbbe1829c006b757d257b8649e941e37aae832c7339c1d2d068ca05e943e2769240116accc6f5c36eeabb7b353903cd18b654680974151", 0x7e}, {&(0x7f0000001e80)="1052fd6c7c8819e56e9c2f963aba2142e16a08ba3ae3b3c2f986d93d942b974a70e7f981fbb5e4ac12f6b0987a197ffefd3a83ba553e99b19e52d193c09a81e3d65ab9709eae43b386cffee1f1bad5f7892b1b71443a36213676401966bf3b37d3f269d84166551cf6ffdf8552e27bc0c2804b156ecdb334854fc8254fc5831b90bef55ad93c9dbfa4289ba3b2ba255fe089fd473fc63ba4f505ad4ed95ea7853d00a9603292f7016aa4a778f53607d5fa008bc48d112d4ef07ef3f9fbd6153d64e0cc39933b7ed36bdfe3f463cd1322886de89f8ebb4c5306", 0xd9}, {&(0x7f0000001f80)="c22846f6d2c415a53f80b8f7275ca55ae18b9056a660a872f1202539d662feaebfaf5071f69ed2fab6c5b0580dafabf8b513f517ec898c8e36f95b643c2a3adce4c6ed215067074b0d3807611115bcd4045277713af826e6b1e8e343c773d283347426d9d3edb0ed302bc0a1bc93caf52859cba6d90afc828da04a39a579f5ea747edaf9e5ed537b2d20a764ef2f23958b70f7755e", 0x95}, {&(0x7f0000002040)="d992152e0052755421b8090854ccdb2baf4442722ce84f31585bea0815d05858d26539475c8e1bc1ea095b09ff56cd0236930f62c2687e52a1dc97799805c90d268983482023d42af4d06c373637d695a0060d55e4e888a07bf56ad148206db4b3a30ca1ace4ca880ee1de68783b4ca60818917638e8db53143ee98d346af838fc8eb84a0bcf6eb998af02b96b32a6f1566b271c5f77383ac355e19038d9069e2c2d150a168b81acb1bba145a4577dff2bf1b7748dfd31f133b61ea585eefc2582b821392944b2da010bde18cfce364e4fd5eaf9", 0xd4}, {&(0x7f0000002140)="2fba231fdd8d267eedbebb91062153d51b324433dcf8d676790ba685b8d6d50f30a595c0bc64eda78d5fe1e2a0ebc86db8c123bb675c578bc689be3f2824b1ebf06da0b60742d787316a48f6e1c4fd7b0fcbda3fc163cf41f7071619c0175a700c7cbf00e4351ac8123c6db445d90381e511dc146b6c01de0a747ba6794800a9260c70902eb7824d4562533b92a4ac0dd765fe10fa903d7a47f05062b1c947877d423441bef175828b6c44bc867be537b4b1bcc4268eddca2acbf39023efb34764f09f84fdbaf6f7340383ba179a52713311d893467004129adaaa0080e9f97fe479c5", 0xe3}, {&(0x7f0000002240)="8df60bbb7845be2b2f92f31a7aacf0699a943ca53baf4896ce9f9465926185797840286e750fc05bef42a2de0a95157b5f2035b26e139eb6cc4c8a2f275b20658465ac72660ac2e311b1f3f692b611236b39b5c66642f3b6a89d720a3995f560833e3daf6c02069cf6342064937a8af4f3c4b75c2aeab2748ef2a369978019cb5f51ce98514fbe390c44e48a56b9e5d28896f532e3d2a474fc990d550951727538d5b89d89a9a6ccbe54cade1578e4fb93adfd", 0xb3}], 0x6, &(0x7f0000002ec0)=[@cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}, @cred={{0x1c, 0x1, 0x2, {r16, r17}}}, @rights={{0x28, 0x1, 0x1, [r0, r18, r19, r20, r21, r22]}}, @cred={{0x1c, 0x1, 0x2, {r23, r24, r25}}}, @cred={{0x1c, 0x1, 0x2, {r26, r27, r28}}}, @cred={{0x1c, 0x1, 0x2, {r29, r30, r31}}}], 0xc8, 0x10}, {&(0x7f0000002fc0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000032c0)=[{&(0x7f0000003040)="a9417311", 0x4}, {&(0x7f0000003080)}, {&(0x7f00000030c0)}, {&(0x7f0000003100)="19b0f186328682735addd1b427d3c1808370e04ab5a5b4a25e0b615f6c59c885b0f0eae9acc58b8e3d82d5eeeb76a37d4b0dfa59ec39763b18e025aa15a09815f4ec31c5c307161fcbe88aa043e0d36a63ddbb3363f72a96bf258c9e855a81756e5f6978d7c86506c4af556d1a4ead2cc1a9c73bde8b060bd2011cd8f763476323a91bf3c323fa208e6dee3f08e3e806c751091d5f5604a1d6945b35f71e2f373ad7fee730de6eccdd04be400322", 0xae}, {&(0x7f00000031c0)="dd2204f9d99aec67d1a992f1868ce7d852d4d94c44bcd9fe55ee4bc480e0ee38453c337b305d36890d2fdc5c1a083b650a54bf94c606d032093eaecb79e24ec48cd81355e51f11ae803b21423032fb18579a6d41c28cddca47db79efb38524bb5e957bddeb6c55fcf0d30398f978367d1c7d365307182adb33c3ffe91600954305bac8ff25aa8622ea7f5f94b1dd1d7129732ea9f35f4124af2ed2d4ad5fd9fafe5eb86301472cde43a1a91ceb60c1659cb54c7d995457eeaa1640edc10bc8394c9c9ed4ae839a965047907ef3edad4fb496f0b689676de98bc65abf4310ac17a638", 0xe2}], 0x5, &(0x7f0000003740)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r32, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r33, r34, r35}}}, @cred={{0x1c, 0x1, 0x2, {r36, r37, r38}}}, @rights={{0x34, 0x1, 0x1, [r39, r0, r40, r41, r42, r0, r43, r44, r45]}}, @rights={{0x24, 0x1, 0x1, [r46, r47, r48, r0, r49]}}], 0xc0, 0x4}, {&(0x7f0000003800)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003880), 0x0, &(0x7f0000003d00)=[@cred={{0x1c, 0x1, 0x2, {r50, r51, r52}}}, @cred={{0x1c, 0x1, 0x2, {r53, r54, r55}}}, @rights={{0x28, 0x1, 0x1, [r0, r56, r57, r0, r58, r59]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x80, 0x29050}], 0x6, 0x8000) [ 313.697094][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.709142][ T3019] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.749951][ T3019] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.779344][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 313.809253][ T7658] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.818940][ T7662] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.825985][ T7662] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.857385][ T7662] device bridge_slave_1 entered promiscuous mode [ 313.899785][ T7661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.928142][ T7661] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.935259][ T7661] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.978404][ T7661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.007985][ T7661] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.015153][ T7661] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.059156][ T7664] chnl_net:caif_netlink_parms(): no params data found [ 314.082921][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 314.098690][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 314.127511][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.164933][ T7658] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 314.197831][ T7658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 314.234967][ T7662] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 314.244669][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 314.255797][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 314.307295][ T7686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.359867][ T7694] IPVS: ftp: loaded support on port[0] = 21 [ 314.360360][ T7662] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 314.409254][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 314.426743][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 314.469862][ T7658] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.488824][ T7664] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.495901][ T7664] bridge0: port 1(bridge_slave_0) entered disabled state 06:51:18 executing program 4: r0 = getuid() fstat(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000000)='syz\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x205084, &(0x7f0000000140)={'trans=xen,', {[{@version_L='version=9p2000.L'}, {@loose='loose'}, {@access_user='access=user'}, {@mmap='mmap'}, {@fscache='fscache'}, {@dfltuid={'dfltuid', 0x3d, r0}}, {@cachetag={'cachetag', 0x3d, ')(&'}}, {@fscache='fscache'}], [{@obj_role={'obj_role', 0x3d, '[+'}}, {@euid_gt={'euid>', r1}}, {@context={'context', 0x3d, 'sysadm_u'}}]}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='.\x00', 0x200000, 0x200) recvfrom$x25(r2, &(0x7f0000000240)=""/86, 0x56, 0x100, 0x0, 0x0) write$P9_RMKNOD(r2, &(0x7f00000002c0)={0x14, 0x13, 0x2, {0x2, 0x0, 0x2}}, 0x14) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x4012830, r2, 0x0) r3 = open(&(0x7f0000000300)='./file0\x00', 0x200000, 0x20) r4 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x0, 0x80) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0x18) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x802, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r5, &(0x7f00000003c0)={0x20000000}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x140, 0x0) r7 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r7, &(0x7f0000000440)={0x3}) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) r8 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)="911b88820bc950f83092240d28049e52dd1a015854761f2a1d829d2ff2dd12d1f01fe3a3997ecd99d3deaf8918e8218f099bb4703378810b0a3922b4957a8f1cd4de52fe7fa24a821cb2af5f52ddfd1a275b3763e3a2716baf9d636f", 0x5c, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000580)={r8, 0x50, 0x7b}, 0x0, &(0x7f00000005c0)="05d395d6209bc14f1c672e6aae211cf9059f53b39d5961d0c83551d2131c0d73d816267ba9fb500c2a0e195acdef5335202536db12f65e8831975bf85235acb0aa85e8b90abe79b192a871494d9f9c34", &(0x7f0000000640)="e125c4d70bbaae6519c57d83f22654a09bcbbeeae6ad550fa4a3328485f884c9108e67e77b01d7b7678bc393e9c6392b929cc171fe8edea79e0a3b02b582421d49da74cb8404dd41ca152abc4d60f91b182fde77c457441ac1c29731060f2c4af95a59b4bf15f29c1711b328e227d452aba7437f6a57aa3d27b2c5") r9 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$XDP_STATISTICS(r9, 0x11b, 0x7, &(0x7f0000001900), &(0x7f0000001940)=0x18) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001980)='/dev/hwrng\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r10, &(0x7f00000019c0)={0x10000000}) write$P9_RRENAME(r10, &(0x7f0000001a00)={0x7, 0x15, 0x1}, 0x7) r11 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001a40)={0x0, 0x3, 0x20}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001c00)={r11, &(0x7f0000001a80)="3253be3a159bdbdafa0b0934567ea64c8dcf3bd27b4553af5bb446faf34d7cf6f777471053063c9fefd3acab86ceb700e4a80c9aac4edb566f6536a55c17d9f9091b003cfa3b72a86e1f6870f47467af86", &(0x7f0000001b00)=""/205, 0x4}, 0x20) r12 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001c40)='/dev/btrfs-control\x00', 0x20000, 0x0) ioctl$SG_SET_TIMEOUT(r12, 0x2201, &(0x7f0000001c80)=0x7fffffff) socket$kcm(0x29, 0x2, 0x0) r13 = openat$zero(0xffffffffffffff9c, &(0x7f0000001cc0)='/dev/zero\x00', 0x8000, 0x0) ioctl$PPPIOCSMRU(r13, 0x40047452, &(0x7f0000001d00)=0x3d76) [ 314.537526][ T7664] device bridge_slave_0 entered promiscuous mode [ 314.558730][ T7662] team0: Port device team_slave_0 added [ 314.582398][ T7664] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.596722][ T7664] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.609247][ T7664] device bridge_slave_1 entered promiscuous mode [ 314.654251][ T7662] team0: Port device team_slave_1 added [ 314.731059][ T7664] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 314.818561][ T7662] device hsr_slave_0 entered promiscuous mode [ 314.857087][ T7662] device hsr_slave_1 entered promiscuous mode [ 314.926728][ T7662] debugfs: Directory 'hsr0' with parent '/' already present! [ 314.950349][ T7664] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 314.972088][ T7708] IPVS: ftp: loaded support on port[0] = 21 06:51:19 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x20081, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x5, 0x6, 0x1}}, 0x30) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f00000000c0)={0xd9dd07c4d17ffc7f, 0x0, {0x9, 0x7ad3, 0x506d8cdfb1f234b6, 0x0, 0x9, 0x8, 0x0, 0x1}}) pipe(&(0x7f0000000140)={0xffffffffffffffff}) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000180)=@gcm_256={{0x608}, "7deeee3d8d7319fc", "4c6d2c42c93a9ed8c20e5ce99da4397a9efd97cecb59ff510251e7b02ff70618", "94b43891", "ff50ee2eff7e814d"}, 0x38) write$P9_RVERSION(0xffffffffffffffff, &(0x7f00000001c0)={0x13, 0x65, 0xffff, 0x1ff, 0x6, '9P2000'}, 0x13) set_robust_list(&(0x7f00000002c0)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x6, &(0x7f0000000280)}, 0x18) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) bind$alg(r3, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) r4 = openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x40000, 0x20) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000400), &(0x7f0000000440)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0xffffffff, 0x6, 0x7, 0x5, 0x50}, &(0x7f0000000540)=0x98) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/qat_adf_ctl\x00', 0x8081, 0x0) ioctl$VIDIOC_G_FBUF(r5, 0x8030560a, &(0x7f0000000640)={0x2, 0xa, &(0x7f00000005c0)="1d47205d4ba46b86d4b538b2aa6d123a6e9ccf66c2373074fe98ebdc0cc31ccfff61636e40941a266f186d819c34990cc913dfc324c78aa32c1735ad0a7d9c067c7b8aae99276350ab02c7af78135806b8003e51c393b03bc06cab275477521de8891426a1f7dc2303fd73ac7831ae4691b564f10f41dce69820b911e115", {0x8, 0x785, 0x510bf20a, 0x8, 0xb8f, 0x3, 0x6, 0x6}}) socket$inet_udplite(0x2, 0x2, 0x88) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000680)='/dev/autofs\x00', 0x480, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000006c0)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x8}}, 0x1, 0x9ad2, 0x3, 0x9, 0x5}, &(0x7f0000000780)=0x98) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f00000007c0)={r7, @in={{0x2, 0x4e20, @local}}, 0x4, 0x2}, 0x90) recvmsg$can_bcm(r4, &(0x7f00000009c0)={&(0x7f0000000880)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000900)=""/119, 0x77}], 0x1}, 0x1) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000a00)={0x0, 0x3}, &(0x7f0000000a40)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r8, 0x84, 0x79, &(0x7f0000000a80)={r9, 0x3, 0xffff}, 0x8) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000bc0)=0xe8) r11 = syz_open_dev$vcsu(&(0x7f0000000c00)='/dev/vcsu#\x00', 0x8, 0x410000) write$P9_RLOPEN(r11, &(0x7f0000000c40)={0x18, 0xd, 0x2, {{0x80, 0x3, 0x5}, 0x1}}, 0x18) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/dlm-control\x00', 0x624100, 0x0) r12 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/dlm_plock\x00', 0x400, 0x0) sendmsg$nl_route(r12, &(0x7f0000000e80)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000e40)={&(0x7f0000000d40)=@ipv4_delroute={0xd4, 0x19, 0x8, 0x70bd2c, 0x25dfdbff, {0x2, 0x20, 0x20, 0x7, 0x0, 0x1, 0xfd, 0xa, 0x600}, [@RTA_PREFSRC={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0x2b}}, @RTA_FLOW={0x8, 0xb, 0x1}, @RTA_ENCAP={0xc, 0x16, @typed={0x8, 0x2b, @ipv4=@loopback}}, @RTA_ENCAP={0x10, 0x16, @typed={0xc, 0xe, @u64=0x301}}, @RTA_UID={0x8, 0x19, r10}, @RTA_METRICS={0x84, 0x8, "9d193fa4d366cb12fd2ca07ec4781e82618027e558ba934174cfff37c5aae393dfe1cbcdd704de10f9c3a5b450fd45036017266c82ddf4d5918ca4e7879636840393e759f00e39b7d8dee30c3f4457b7036fe5e380c1271b5f816a1254a04858be7ca892f3083893968536fa833b3b31d10a429c29e7f63cda41e91caa3bf5"}]}, 0xd4}, 0x1, 0x0, 0x0, 0x1}, 0x20004880) r13 = syz_open_dev$sndmidi(&(0x7f0000000ec0)='/dev/snd/midiC#D#\x00', 0x1, 0x400) sendfile(r13, r8, &(0x7f0000000f00)=0x4, 0x36c) [ 315.129109][ T7664] team0: Port device team_slave_0 added [ 315.205020][ T7694] chnl_net:caif_netlink_parms(): no params data found [ 315.262445][ T7664] team0: Port device team_slave_1 added [ 315.359330][ T7694] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.376822][ T7694] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.407508][ T7694] device bridge_slave_0 entered promiscuous mode [ 315.420841][ T7694] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.456675][ T7694] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.467551][ T7694] device bridge_slave_1 entered promiscuous mode [ 315.539156][ T7664] device hsr_slave_0 entered promiscuous mode [ 315.579010][ T7664] device hsr_slave_1 entered promiscuous mode [ 315.598545][ T7664] debugfs: Directory 'hsr0' with parent '/' already present! [ 315.639523][ T7694] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 315.668230][ T7694] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 315.722199][ T7742] IPVS: ftp: loaded support on port[0] = 21 [ 315.764719][ T7662] 8021q: adding VLAN 0 to HW filter on device bond0 [ 315.799648][ T7694] team0: Port device team_slave_0 added [ 315.834440][ T7708] chnl_net:caif_netlink_parms(): no params data found [ 315.863287][ T7694] team0: Port device team_slave_1 added [ 315.988680][ T7694] device hsr_slave_0 entered promiscuous mode [ 316.026955][ T7694] device hsr_slave_1 entered promiscuous mode [ 316.046890][ T7694] debugfs: Directory 'hsr0' with parent '/' already present! [ 316.064594][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 316.127273][ T3019] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 06:51:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xfffffd1b}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748", 0x43}], 0x1000022f, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe6a, 0x0, 0x231, 0x0, 0xfffffffffffffee5}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x2e, r0, 0x96, 0x0) [ 316.190025][ T7662] 8021q: adding VLAN 0 to HW filter on device team0 [ 316.332166][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 316.366626][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 316.421609][ T2927] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.428807][ T2927] bridge0: port 1(bridge_slave_0) entered forwarding state 06:51:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x64000000) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x410040, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000000c0)={0x41, 0x2, 0x3}, 0x10) [ 316.517347][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 316.525999][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 316.626857][ T2927] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.634039][ T2927] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.719785][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 316.740029][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 316.756488][ T7781] IPVS: ftp: loaded support on port[0] = 21 [ 316.818246][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 316.859782][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 316.910127][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 316.960705][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 316.992162][ T7708] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.005906][ T7708] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.053100][ T7708] device bridge_slave_0 entered promiscuous mode [ 317.110136][ T7708] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.151264][ T7708] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.199140][ T7708] device bridge_slave_1 entered promiscuous mode [ 317.311696][ T7662] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 317.362280][ T7662] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 317.460575][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 317.476742][ C0] hrtimer: interrupt took 34504 ns [ 317.484059][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 317.533260][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 317.543535][ T7780] IPVS: ftp: loaded support on port[0] = 21 [ 317.589272][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 317.642836][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 317.692373][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 317.860810][ T7708] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 317.893473][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 317.920687][ T7664] 8021q: adding VLAN 0 to HW filter on device bond0 [ 317.964779][ T7708] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 318.007357][ T7662] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 318.052977][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 318.071839][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 318.162846][ T7664] 8021q: adding VLAN 0 to HW filter on device team0 [ 318.220456][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 318.238899][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 318.297392][ T7742] chnl_net:caif_netlink_parms(): no params data found [ 318.398103][ T7694] 8021q: adding VLAN 0 to HW filter on device bond0 [ 318.449979][ T7708] team0: Port device team_slave_0 added [ 318.489699][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 318.519095][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 318.570214][ T7783] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.577404][ T7783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.637830][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 318.671046][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 318.715254][ T7783] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.722903][ T7783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.755834][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 318.780098][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 318.806544][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 318.829256][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 318.863389][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 318.894495][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 318.954117][ T7708] team0: Port device team_slave_1 added [ 318.966273][ T7664] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 318.988519][ T7664] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 319.054386][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 319.070971][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 319.106344][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 319.135830][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 319.164722][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 319.191043][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 319.224195][ T7742] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.234643][ T7742] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.253328][ T7742] device bridge_slave_0 entered promiscuous mode [ 319.282028][ T7694] 8021q: adding VLAN 0 to HW filter on device team0 [ 319.307734][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 319.325585][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 319.348846][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.378777][ T7742] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.398107][ T7742] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.420693][ T7742] device bridge_slave_1 entered promiscuous mode 06:51:23 executing program 1: mkdir(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r3, r2}, &(0x7f00000000c0)=""/83, 0xffffffffffffffc9, 0x0) r4 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x200, 0x100, r4) r5 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r4) r6 = request_key(&(0x7f0000000640)='cifs.spnego\x00', &(0x7f0000000680)={'syz', 0x3}, &(0x7f00000006c0)='vboxnet0security@md5sumposix_acl_access]^\x00', r5) keyctl$instantiate_iov(0x14, r2, &(0x7f0000000140)=[{&(0x7f0000000100)='Pl', 0x1}, {&(0x7f00000001c0)="1812775bec65ab0a9f47b755d365e21ca1ed3c715947a534835cd7bcc8f1d8fa96b02d777a2a2699549fd4e7ec6704bde65bfdf0def350896919312696bfe0101200fb733a0643c69096a51fb7e6f6cd0a5b40fae0c65648bd590ca25bb119e705761605e5c2", 0x1e0}, {&(0x7f00000002c0)="bec28118b5819680ca57b7376547172d57e6c88bca91cb02ef3ed25008a24584224d644fb3ef573d781c21a327211efd31701980a09740fea37a01abea46c0f4a8e14f069b2c35c0cb07ed", 0x3e}, {&(0x7f0000000340)="c71531c368115c6b542accc9fa34e30d1b5d2567f22e39d104b6f139542625f220335d897d9b76d3c0ee0375cff7e617acd266dcec32427525e90091e30f19361511b5376195bbcdbb19ee7527321ed51dd20beda4", 0x55}], 0x4, r6) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f0000000340), 0x41395527) r9 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x420140, 0x0) setsockopt$IP_VS_SO_SET_DEL(r9, 0x0, 0x484, &(0x7f0000000540)={0x4f, @empty, 0x4e23, 0x3, 'sed\x00', 0x4, 0x3, 0x19}, 0x2c) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$SIOCX25SCAUSEDIAG(0xffffffffffffffff, 0x89ec, &(0x7f00000004c0)={0x1d, 0x2f}) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) r11 = socket(0x1, 0x1, 0x0) fcntl$dupfd(r11, 0x0, r11) bind$inet(r7, &(0x7f00000005c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}, 0xfffffcac) r12 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = open(0x0, 0x0, 0x0) fcntl$setlease(r13, 0x400, 0x0) geteuid() fcntl$getownex(r12, 0x10, &(0x7f0000000780)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), 0x0) fstat(r13, 0x0) getresgid(&(0x7f0000001600), &(0x7f0000000200), 0x0) getresuid(&(0x7f0000001700), &(0x7f0000001740), 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000001840), &(0x7f0000001880)=0xc) getgid() listen(0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) r14 = fcntl$dupfd(r10, 0x406, 0xffffffffffffffff) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r14, 0x110, 0x5, &(0x7f0000000580)=[0x2, 0x1], 0x2) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r10, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r10, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac60cded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) [ 319.508673][ T7708] device hsr_slave_0 entered promiscuous mode [ 319.527026][ T7708] device hsr_slave_1 entered promiscuous mode [ 319.586812][ T7708] debugfs: Directory 'hsr0' with parent '/' already present! [ 319.597611][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 319.610705][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 319.618986][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 319.628604][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 319.637189][ T2927] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.644321][ T2927] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.652700][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 319.661972][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 319.671890][ T2927] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.679097][ T2927] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.688087][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 319.698959][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 319.709110][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 319.718403][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 319.729375][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 319.739597][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 319.808599][ T7664] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 319.859527][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 319.888353][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 319.903823][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 319.913951][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 319.958672][ T7742] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 320.007495][ T7694] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 320.033518][ T7694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 320.128187][ T7742] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 320.160740][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 320.177895][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.231458][ T7742] team0: Port device team_slave_0 added [ 320.272063][ T7742] team0: Port device team_slave_1 added [ 320.305770][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 320.334212][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 06:51:24 executing program 1: mkdir(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r3, r2}, &(0x7f00000000c0)=""/83, 0xffffffffffffffc9, 0x0) r4 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$reject(0x13, 0x0, 0x200, 0x100, r4) r5 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r4) r6 = request_key(&(0x7f0000000640)='cifs.spnego\x00', &(0x7f0000000680)={'syz', 0x3}, &(0x7f00000006c0)='vboxnet0security@md5sumposix_acl_access]^\x00', r5) keyctl$instantiate_iov(0x14, r2, &(0x7f0000000140)=[{&(0x7f0000000100)='Pl', 0x1}, {&(0x7f00000001c0)="1812775bec65ab0a9f47b755d365e21ca1ed3c715947a534835cd7bcc8f1d8fa96b02d777a2a2699549fd4e7ec6704bde65bfdf0def350896919312696bfe0101200fb733a0643c69096a51fb7e6f6cd0a5b40fae0c65648bd590ca25bb119e705761605e5c2", 0x1e0}, {&(0x7f00000002c0)="bec28118b5819680ca57b7376547172d57e6c88bca91cb02ef3ed25008a24584224d644fb3ef573d781c21a327211efd31701980a09740fea37a01abea46c0f4a8e14f069b2c35c0cb07ed", 0x3e}, {&(0x7f0000000340)="c71531c368115c6b542accc9fa34e30d1b5d2567f22e39d104b6f139542625f220335d897d9b76d3c0ee0375cff7e617acd266dcec32427525e90091e30f19361511b5376195bbcdbb19ee7527321ed51dd20beda4", 0x55}], 0x4, r6) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f0000000340), 0x41395527) r9 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x420140, 0x0) setsockopt$IP_VS_SO_SET_DEL(r9, 0x0, 0x484, &(0x7f0000000540)={0x4f, @empty, 0x4e23, 0x3, 'sed\x00', 0x4, 0x3, 0x19}, 0x2c) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$SIOCX25SCAUSEDIAG(0xffffffffffffffff, 0x89ec, &(0x7f00000004c0)={0x1d, 0x2f}) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) r11 = socket(0x1, 0x1, 0x0) fcntl$dupfd(r11, 0x0, r11) bind$inet(r7, &(0x7f00000005c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}, 0xfffffcac) r12 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = open(0x0, 0x0, 0x0) fcntl$setlease(r13, 0x400, 0x0) geteuid() fcntl$getownex(r12, 0x10, &(0x7f0000000780)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), 0x0) fstat(r13, 0x0) getresgid(&(0x7f0000001600), &(0x7f0000000200), 0x0) getresuid(&(0x7f0000001700), &(0x7f0000001740), 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000001840), &(0x7f0000001880)=0xc) getgid() listen(0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x20000000) r14 = fcntl$dupfd(r10, 0x406, 0xffffffffffffffff) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r14, 0x110, 0x5, &(0x7f0000000580)=[0x2, 0x1], 0x2) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r10, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r10, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac60cded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a750fbf746bec66ba", 0xfe6a, 0xe, 0x0, 0xfffffffffffffe2b) [ 320.478889][ T7742] device hsr_slave_0 entered promiscuous mode [ 320.526938][ T7742] device hsr_slave_1 entered promiscuous mode [ 320.556981][ T7742] debugfs: Directory 'hsr0' with parent '/' already present! [ 320.565898][ T7694] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 320.802940][ T7708] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.936379][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 320.959892][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.020637][ T7892] Unknown ioctl 44672 [ 321.038707][ T7708] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.099799][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.117779][ T7892] Unknown ioctl 44672 [ 321.133487][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 321.189834][ T7741] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.196946][ T7741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.306388][ T7742] 8021q: adding VLAN 0 to HW filter on device bond0 06:51:25 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r1 = getpgrp(0xffffffffffffffff) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x2532, 0x5, 0x0, 0x0, 0x3f}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb, 0x200}, 0x0) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r5, &(0x7f0000000b80)=ANY=[@ANYBLOB="23024089d3f495ffcf5a9abfbe726ff1a83dd858d2540c7e90d409ac18d9903b6e9f171b9593753c1c867b5d9b750d3dc268a1e10c105e3eaa3731d57d999c70c9787b744edc5bef1c14f46d94ba60e841f95ef82bfbbb2ec794f96ea6ac69cdb9f22a612b674217a52b411cf3c9133f7651da5c756f7fbd75c4f6854c32f7c4625751083a544e2ed52767eee23606179b351dcdce49653758cf9725352da96697fad646eaff8be47e68ced624ccc39405cd27922170b8c56fbd09abe35d8fb4fe581991e28907dfbdf591d2cfa31e662c3f58574d78dc25c9714fb3aff6fd705ad79e1df4fc120000000000000027e49ba78aafefd775a53607bb3da5afbacb5b33d7005fc65718eacb3be731d415e9abe8a76efd45cc0f2fb23e3a6f80d147317dbc9249000000"], 0x128) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000480), 0xfffffffffffffdce, 0x0, 0x0, 0x150) dup(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000180)) [ 321.422835][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 321.467840][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 321.476521][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 06:51:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$VIDIOC_G_ENC_INDEX(0xffffffffffffffff, 0x8818564c, 0x0) r1 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0xb9002, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x1, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r4, 0xc0305615, &(0x7f0000000100)={0x0, {0x5a, 0x6669}}) [ 321.595916][ T7783] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.603029][ T7783] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.711247][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 321.745838][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 321.806511][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 321.865353][ T7783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 321.943512][ T7742] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.987467][ T7708] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 322.088869][ T7708] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 322.166830][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 322.175220][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 322.252769][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.321904][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.381282][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 06:51:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000240)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f0000000500)={'L+', 0x7}, 0x28, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000100)='./file1\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x76656f) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x11) fchdir(0xffffffffffffffff) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x5900, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) io_setup(0x3, &(0x7f0000000180)=0x0) io_submit(r5, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x900000000000010, 0xc00000000000000, 0x80000000000000, 0x1, 0x0, r4, &(0x7f0000000000), 0x377140be6b5ef4c7}]) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) geteuid() sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0x0}, 0x60000910) sendto(r2, &(0x7f0000000380)="4e95e8eb6a8a5db3bee9a9e425051c0b7d2e8fe7460746f611155499aee214772e98299c2a7f3d441de417d71f67627cac3b7192ddb38fc2f614e900af7b39720a5c17e5264ef49a9a4a8ac172ec356d0ee65fab9ccbd3e4e43fe2622e78b776896ee92f7ce10a885a315304f801cffc308eee88ea", 0x75, 0x20, 0x0, 0x0) getpid() pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000400)={'security\x00'}, &(0x7f0000000300)=0x54) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) [ 322.441941][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.528431][ T7694] ================================================================== [ 322.536599][ T7694] BUG: KCSAN: data-race in get_task_mm / ns_capable_common [ 322.543821][ T7694] [ 322.546154][ T7694] read to 0xffff8880a8d580e4 of 4 bytes by task 7860 on cpu 0: [ 322.553702][ T7694] get_task_mm+0x4f/0xa0 [ 322.557961][ T7694] proc_pid_status+0x4a/0x1000 [ 322.562720][ T7694] proc_single_show+0x89/0xe0 [ 322.570461][ T7694] seq_read+0x350/0x960 [ 322.574611][ T7694] __vfs_read+0x67/0xc0 [ 322.578903][ T7694] vfs_read+0x143/0x2c0 [ 322.583074][ T7694] ksys_read+0xd5/0x1b0 [ 322.587233][ T7694] __x64_sys_read+0x4c/0x60 [ 322.591795][ T7694] do_syscall_64+0xcc/0x370 [ 322.596313][ T7694] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 322.602193][ T7694] [ 322.604528][ T7694] write to 0xffff8880a8d580e4 of 4 bytes by task 7694 on cpu 1: [ 322.612273][ T7694] ns_capable_common+0x9f/0xc0 [ 322.617033][ T7694] ns_capable+0x29/0x40 [ 322.621191][ T7694] do_ip6t_get_ctl+0x63/0x640 [ 322.625861][ T7694] nf_getsockopt+0x71/0xb0 [ 322.630275][ T7694] ipv6_getsockopt+0x17c/0x1d0 [ 322.635229][ T7694] tcp_getsockopt+0x7c/0xc0 [ 322.643655][ T7694] sock_common_getsockopt+0x67/0x90 [ 322.648849][ T7694] __sys_getsockopt+0xf1/0x210 [ 322.653606][ T7694] __x64_sys_getsockopt+0x70/0x90 [ 322.658627][ T7694] do_syscall_64+0xcc/0x370 [ 322.663219][ T7694] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 322.669099][ T7694] [ 322.671420][ T7694] Reported by Kernel Concurrency Sanitizer on: [ 322.677569][ T7694] CPU: 1 PID: 7694 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 322.685790][ T7694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.695859][ T7694] ================================================================== [ 322.703995][ T7694] Kernel panic - not syncing: panic_on_warn set ... [ 322.710580][ T7694] CPU: 1 PID: 7694 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 322.718802][ T7694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.728852][ T7694] Call Trace: [ 322.732157][ T7694] dump_stack+0x11d/0x181 [ 322.736487][ T7694] panic+0x210/0x640 [ 322.740378][ T7694] ? vprintk_func+0x8d/0x140 [ 322.744967][ T7694] kcsan_report.cold+0xc/0xd [ 322.749562][ T7694] kcsan_setup_watchpoint+0x3fe/0x460 [ 322.754928][ T7694] __tsan_unaligned_write4+0xc4/0x100 [ 322.760300][ T7694] ns_capable_common+0x9f/0xc0 [ 322.765067][ T7694] ns_capable+0x29/0x40 [ 322.769227][ T7694] do_ip6t_get_ctl+0x63/0x640 [ 322.773906][ T7694] ? try_module_get+0x2f/0x40 [ 322.778586][ T7694] ? mutex_unlock+0x41/0x50 [ 322.783094][ T7694] ? nf_sockopt_find.constprop.0+0x1a4/0x1c0 [ 322.789080][ T7694] nf_getsockopt+0x71/0xb0 [ 322.793507][ T7694] ipv6_getsockopt+0x17c/0x1d0 [ 322.798282][ T7694] tcp_getsockopt+0x7c/0xc0 [ 322.802794][ T7694] sock_common_getsockopt+0x67/0x90 [ 322.808006][ T7694] __sys_getsockopt+0xf1/0x210 [ 322.812862][ T7694] __x64_sys_getsockopt+0x70/0x90 [ 322.817891][ T7694] do_syscall_64+0xcc/0x370 [ 322.822409][ T7694] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 322.828304][ T7694] RIP: 0033:0x45d20a [ 322.832204][ T7694] Code: b8 34 01 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 8d 8b fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6a 8b fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 322.851833][ T7694] RSP: 002b:00007ffdd9e37068 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 322.860241][ T7694] RAX: ffffffffffffffda RBX: 00007ffdd9e37090 RCX: 000000000045d20a [ 322.868204][ T7694] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 322.876175][ T7694] RBP: 0000000000717cc0 R08: 00007ffdd9e3708c R09: 0000000000004000 [ 322.884143][ T7694] R10: 00007ffdd9e37090 R11: 0000000000000246 R12: 0000000000000003 [ 322.892111][ T7694] R13: 0000000000000000 R14: 0000000000000029 R15: 0000000000716880 [ 322.901592][ T7694] Kernel Offset: disabled [ 322.905918][ T7694] Rebooting in 86400 seconds..