[info] Using makefile-style concurrent boot in runlevel 2. [ 42.456675][ T26] audit: type=1800 audit(1574876957.671:21): pid=7521 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 42.491401][ T26] audit: type=1800 audit(1574876957.671:22): pid=7521 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.25' (ECDSA) to the list of known hosts. 2019/11/27 17:49:28 fuzzer started 2019/11/27 17:49:30 dialing manager at 10.128.0.105:36065 2019/11/27 17:49:33 syscalls: 2567 2019/11/27 17:49:33 code coverage: enabled 2019/11/27 17:49:33 comparison tracing: enabled 2019/11/27 17:49:33 extra coverage: extra coverage is not supported by the kernel 2019/11/27 17:49:33 setuid sandbox: enabled 2019/11/27 17:49:33 namespace sandbox: enabled 2019/11/27 17:49:33 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/27 17:49:33 fault injection: enabled 2019/11/27 17:49:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/27 17:49:33 net packet injection: enabled 2019/11/27 17:49:33 net device setup: enabled 2019/11/27 17:49:33 concurrency sanitizer: enabled 2019/11/27 17:49:33 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/27 17:49:40 adding functions to KCSAN blacklist: 'find_get_pages_range_tag' 'run_timer_softirq' 'blk_mq_sched_dispatch_requests' 'ext4_free_inodes_count' 'ext4_nonda_switch' 'blk_mq_run_hw_queue' 'icmp_global_allow' 'vm_area_dup' 'generic_write_end' 'do_nanosleep' 'taskstats_exit' 'dd_has_work' 'process_srcu' '__d_lookup_done' 'echo_char' '__delete_from_page_cache' 'kauditd_thread' 'pcpu_alloc' 'ep_poll' 'rcu_gp_fqs_check_wake' 'ext4_has_free_clusters' 'xas_clear_mark' 'do_syslog' 'p9_poll_workfn' 'tomoyo_supervisor' 'blk_mq_get_request' 'tick_do_update_jiffies64' 'ext4_free_inode' 'inet_dgram_connect' 'generic_fillattr' 'lruvec_lru_size' '__ext4_new_inode' 'blk_mq_dispatch_rq_list' 'add_timer' 'blk_stat_add' 'copy_process' '__hrtimer_run_queues' 'tick_nohz_idle_stop_tick' 'dput' 'mem_cgroup_select_victim_node' 'rcu_gp_fqs_loop' 'mod_timer' 'audit_log_start' 'tcp_add_backlog' 'find_next_bit' 'pipe_poll' 'wbt_done' 'pid_update_inode' 'tick_sched_do_timer' 'timer_clear_idle' 'alloc_empty_file' 17:50:30 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x8000, 0x4, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) readahead(r0, 0xea6, 0x2) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, 0x0, 0x0, 0x40000, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = dup3(r0, r0, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e24, 0x1, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000001a00)=ANY=[@ANYBLOB="0b00000073797a31ff0f000000000000000000000000000000000000000000000000000041f14d4cd00000000000000000000000000000000000000000000000000000000000000000dcea1523674e4fc200000000000000000000d450c3e2bf56e3a677e05feaf9ea76805045b00e1800000000000000c1414de148243f86e800000000008100000073797ab00000000000000000000004000000000000000008000000000000000000000000ebff000000000000000000000000df000000000073792358810a9179410798ff5e7a310000000000000000000000000000000000000000000000002a81d9c2ad0000000000000000000000000000040000000000000000000000000000000000e2b5be12fd5b2d0386b2cbb2c200b01d373dfe97d9000104000000000000090000004ba318b7369e3b0ba41947190acf170000000051f316c00bb05049ddb6864427dc4f21174d5afe551699d9c26de9edec7b4bae564fda8eaef1ee8d81da25fb9ca99941c219f47e90ec05778553a9341e9ee2a88f216bba214c5aea3b72f698c3183b651b43c24ef4c4b733a90fe4557110c7cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c515b2f7a74f98b54bbfeb1b477aed11f848076721be53fcc10a4ba20fdaeb214be240ad26221d85a1a6d8bb9362c5c1234595fb3d5c765276bf8c6574194e318b391a1c2756442450509912c53e3df0238ef004d1a92f1e901f103000000000000003cacf5707ccad93db71f9891b2f6792e4a0e0925407c3ec96741dfada2f3959826f0cd45d05d2299bd155563b102342e15b8a2a31c0ebd91129885c83192abdead2593a540ea03fdf74eaa5ef5c206cff3562420047ee2db86cf815e302c9092a722b61b18a3a9eea519d6cbb77bd05e5c0000d8f331330ceaff09acd954661c1d26aa6e8172b2a79f30b2e6eb4a34ac5d82f6ef5b18cccb8d984b954b4ee1e8f51417b7528c0b099c8293c59e4bec05110554a3263c083b86730a0ff070290500a80638bb8805365950ff1332db311466f868f357ed6d90110a3ebcbf187cda521ee7dc1d7f733a88c935c752ace235521c40f361cb57117220ed89ade069a4e28ba90e457d64e5ff0d02a3c1efe8b5e47e1cb807ed837a0000008000000000be264d9f17046508000000721532000000000000000099755663f3d259bdbe0500000000000043cced99a22f1d8a9b41bc1b4f57e668f6faeb63a0f17a8930e82a4ee9eabc89d77bea7599217011342db141d6880456376ea97274cb1548ae7670afa46874d973978f0e4b03c7f24c9eb009b8fa5fea219ca7c63ae76fae728abb8d708aa5af6b9047002bab36c3c654b9f3b14cb8c508f0041a09a0cdf2181b85710c790000001c427e83fd28f9cc4667592fa99071483052576200f0157f6454fa4a456c2c6f60620e48c4b13ff2296b10800a073d7535b73f74b0345ee736f25c7c63bb28593bf20f6eab890cf9614f151147edec823e55d0f66a050218d076d9e8bacaf515f4c74783c290b13f8f7aecb611dbe7174cbc6726bbe0d097cbaa6dc5a4db005f0e65ceec316df8618d20057d081fff99f5de4d55eeb470721b314361fe893d717f4a6e0e016c7e0277d65edff3f8900737861ce2a3f184e6bf34928da6a4f7ecdfd394d5c53c56a025a6dd5db09ae1be4fdacf7cb000000000b86ce867b2e36f0b543466dda63eb6cbae206638d7576985beba1dd2d585babff429b7f45c8d43f9b03d7feaf25b84f7b59593c777bbf1f1a67848daed6b19c510bce29af10b1e1836d1b555d2f927b20a8131f10d66f25b3887a916e9497046ab1fb7c0efbed829c60d3a3057b466a19eb5025172697977a036354d1f09e9135ab161f00a96d822c6bb05ee3a22c4c091eded743d68ec0466695186eacc1ba0bbf5b5d3baefe299d0ec17949234efc2ebfb27bc8271ac34fc32b2391ea9df81e30775fbc9ba7e0f9c8c18322e9a061694cda6bf27ccb560439f66860867789ce6b21c02c7e83e32a720ef7d02d3d5d98cd4fcf507f3be"], 0x1) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000005c0)) sendfile(r3, r4, 0x0, 0x8607) mkdir(&(0x7f00000006c0)='./file0/file0/file1\x00', 0x1000000000080) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000400), &(0x7f0000000180)=0x5) mount$bpf(0x20000000, &(0x7f0000000500)='./file0\x00', 0x0, 0x5004, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000340)={'caif0\x00', 0xdffffffffffffc00}) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x588e, 0x0) r5 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0x10) recvmmsg(r5, &(0x7f0000000240), 0x0, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000240)) 17:50:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0x0) syzkaller login: [ 115.330508][ T7695] IPVS: ftp: loaded support on port[0] = 21 [ 115.417267][ T7695] chnl_net:caif_netlink_parms(): no params data found [ 115.493686][ T7695] bridge0: port 1(bridge_slave_0) entered blocking state [ 115.515212][ T7695] bridge0: port 1(bridge_slave_0) entered disabled state [ 115.523017][ T7695] device bridge_slave_0 entered promiscuous mode [ 115.541790][ T7698] IPVS: ftp: loaded support on port[0] = 21 [ 115.548522][ T7695] bridge0: port 2(bridge_slave_1) entered blocking state [ 115.559941][ T7695] bridge0: port 2(bridge_slave_1) entered disabled state [ 115.568025][ T7695] device bridge_slave_1 entered promiscuous mode 17:50:30 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1) ioctl$KDADDIO(r0, 0x5412, 0x718000) [ 115.609395][ T7695] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 115.629770][ T7695] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 115.687620][ T7695] team0: Port device team_slave_0 added [ 115.694385][ T7695] team0: Port device team_slave_1 added [ 115.715414][ T7698] chnl_net:caif_netlink_parms(): no params data found 17:50:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000280)="c42263f64ca10bb8010000000f01c1c7442400c6000000c74424026b000000ff2c240f1813b90d0b0000b80f000000ba000000000f30c7442400f8000000c7442402e20d00e7c7442406000000000f011424c7442400f3000000c7442402d2990000c7442406000000000f011c2448b8429f0000000000000f23c80f21f8350800d0000f23f80f32f4", 0x89}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 115.857420][ T7695] device hsr_slave_0 entered promiscuous mode [ 115.906005][ T7695] device hsr_slave_1 entered promiscuous mode [ 116.008066][ T7703] IPVS: ftp: loaded support on port[0] = 21 [ 116.008272][ T7701] IPVS: ftp: loaded support on port[0] = 21 [ 116.020953][ T7698] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.042613][ T7698] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.083586][ T7698] device bridge_slave_0 entered promiscuous mode [ 116.155244][ T7698] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.162353][ T7698] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.185824][ T7698] device bridge_slave_1 entered promiscuous mode [ 116.234047][ T7698] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 116.336917][ T7698] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 116.366121][ T7695] bridge0: port 2(bridge_slave_1) entered blocking state [ 116.373202][ T7695] bridge0: port 2(bridge_slave_1) entered forwarding state 17:50:31 executing program 4: getpriority(0x2, 0x0) [ 116.380540][ T7695] bridge0: port 1(bridge_slave_0) entered blocking state [ 116.387605][ T7695] bridge0: port 1(bridge_slave_0) entered forwarding state [ 116.486125][ T7698] team0: Port device team_slave_0 added [ 116.535496][ T2963] bridge0: port 1(bridge_slave_0) entered disabled state [ 116.546475][ T2963] bridge0: port 2(bridge_slave_1) entered disabled state [ 116.597412][ T7698] team0: Port device team_slave_1 added [ 116.766929][ T7698] device hsr_slave_0 entered promiscuous mode [ 116.796739][ T7698] device hsr_slave_1 entered promiscuous mode [ 116.825192][ T7698] debugfs: Directory 'hsr0' with parent '/' already present! [ 116.880820][ T7730] IPVS: ftp: loaded support on port[0] = 21 [ 116.894468][ T7695] 8021q: adding VLAN 0 to HW filter on device bond0 [ 116.950851][ T7701] chnl_net:caif_netlink_parms(): no params data found [ 117.004833][ T7695] 8021q: adding VLAN 0 to HW filter on device team0 [ 117.046723][ T7703] chnl_net:caif_netlink_parms(): no params data found [ 117.077038][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 117.106838][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 117.186573][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 117.215719][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 117.247131][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.254218][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 117.347581][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 117.388032][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 117.415653][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.422730][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state 17:50:32 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x5, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x3, &(0x7f0000000180), 0x4) [ 117.506142][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 117.537614][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 117.596049][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 117.647798][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 117.698801][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 117.737993][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 117.778461][ T7695] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 117.825183][ T7695] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 117.917221][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 117.934360][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 117.971037][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 118.008429][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 118.028436][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 118.081426][ T7763] IPVS: ftp: loaded support on port[0] = 21 [ 118.097693][ T7695] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 118.105094][ T7701] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.131613][ T7701] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.155979][ T7701] device bridge_slave_0 entered promiscuous mode [ 118.182350][ T7703] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.195178][ T7703] bridge0: port 1(bridge_slave_0) entered disabled state [ 118.203028][ T7703] device bridge_slave_0 entered promiscuous mode [ 118.246230][ T7703] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.253363][ T7703] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.276068][ T7703] device bridge_slave_1 entered promiscuous mode [ 118.300576][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 118.335940][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 118.343378][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 118.407877][ T7701] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.414962][ T7701] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.451886][ T7701] device bridge_slave_1 entered promiscuous mode [ 118.562478][ T7698] 8021q: adding VLAN 0 to HW filter on device bond0 [ 118.581056][ T7703] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 118.623312][ T7698] 8021q: adding VLAN 0 to HW filter on device team0 [ 118.657962][ T2963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 118.665963][ T2963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 118.699048][ T7701] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 118.712676][ T7703] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 118.735779][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 118.749110][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 118.758695][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 118.765827][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 118.773956][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 118.784838][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 118.793352][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 118.800435][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 118.808257][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 118.817238][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 118.830523][ T7730] chnl_net:caif_netlink_parms(): no params data found [ 118.840572][ T7701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 118.859619][ T7703] team0: Port device team_slave_0 added [ 118.869109][ T7703] team0: Port device team_slave_1 added [ 118.875265][ T2963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 118.940277][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 118.949001][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 118.958282][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 118.967259][ T7701] team0: Port device team_slave_0 added [ 119.003222][ T7701] team0: Port device team_slave_1 added [ 119.045149][ C1] hrtimer: interrupt took 24801 ns [ 119.071467][ T7703] device hsr_slave_0 entered promiscuous mode [ 119.135557][ T7703] device hsr_slave_1 entered promiscuous mode [ 119.165473][ T7703] debugfs: Directory 'hsr0' with parent '/' already present! [ 119.174909][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 119.196295][ T7719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 119.215728][ T7730] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.222792][ T7730] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.231173][ T7730] device bridge_slave_0 entered promiscuous mode [ 119.254639][ T7698] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 119.283235][ T7698] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 119.299992][ T7730] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.315203][ T7730] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.323668][ T7730] device bridge_slave_1 entered promiscuous mode [ 119.335408][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 119.343624][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 119.353898][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 119.362587][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 119.390570][ T7763] chnl_net:caif_netlink_parms(): no params data found [ 119.457399][ T7701] device hsr_slave_0 entered promiscuous mode [ 119.475711][ T7701] device hsr_slave_1 entered promiscuous mode [ 119.527764][ T7701] debugfs: Directory 'hsr0' with parent '/' already present! [ 119.551319][ T7730] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 119.615962][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 119.670454][ T7730] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 119.703350][ T7698] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 119.721888][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 119.735428][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 119.829313][ T7730] team0: Port device team_slave_0 added [ 119.974531][ T7730] team0: Port device team_slave_1 added [ 120.096666][ T7763] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.103774][ T7763] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.139819][ T7763] device bridge_slave_0 entered promiscuous mode [ 120.236975][ T7763] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.244124][ T7763] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.285258][ T7763] device bridge_slave_1 entered promiscuous mode 17:50:35 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x8000, 0x4, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) readahead(r0, 0xea6, 0x2) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, 0x0, 0x0, 0x40000, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = dup3(r0, r0, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e24, 0x1, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000001a00)=ANY=[@ANYBLOB="0b00000073797a31ff0f000000000000000000000000000000000000000000000000000041f14d4cd00000000000000000000000000000000000000000000000000000000000000000dcea1523674e4fc200000000000000000000d450c3e2bf56e3a677e05feaf9ea76805045b00e1800000000000000c1414de148243f86e800000000008100000073797ab00000000000000000000004000000000000000008000000000000000000000000ebff000000000000000000000000df000000000073792358810a9179410798ff5e7a310000000000000000000000000000000000000000000000002a81d9c2ad0000000000000000000000000000040000000000000000000000000000000000e2b5be12fd5b2d0386b2cbb2c200b01d373dfe97d9000104000000000000090000004ba318b7369e3b0ba41947190acf170000000051f316c00bb05049ddb6864427dc4f21174d5afe551699d9c26de9edec7b4bae564fda8eaef1ee8d81da25fb9ca99941c219f47e90ec05778553a9341e9ee2a88f216bba214c5aea3b72f698c3183b651b43c24ef4c4b733a90fe4557110c7cffdc36009808c7c4ee3aa990dd262a2ded1c9c2097dc476067ef62c5d4cc612e3be0627edf3547297389fd6d3977aa1bb86c70c515b2f7a74f98b54bbfeb1b477aed11f848076721be53fcc10a4ba20fdaeb214be240ad26221d85a1a6d8bb9362c5c1234595fb3d5c765276bf8c6574194e318b391a1c2756442450509912c53e3df0238ef004d1a92f1e901f103000000000000003cacf5707ccad93db71f9891b2f6792e4a0e0925407c3ec96741dfada2f3959826f0cd45d05d2299bd155563b102342e15b8a2a31c0ebd91129885c83192abdead2593a540ea03fdf74eaa5ef5c206cff3562420047ee2db86cf815e302c9092a722b61b18a3a9eea519d6cbb77bd05e5c0000d8f331330ceaff09acd954661c1d26aa6e8172b2a79f30b2e6eb4a34ac5d82f6ef5b18cccb8d984b954b4ee1e8f51417b7528c0b099c8293c59e4bec05110554a3263c083b86730a0ff070290500a80638bb8805365950ff1332db311466f868f357ed6d90110a3ebcbf187cda521ee7dc1d7f733a88c935c752ace235521c40f361cb57117220ed89ade069a4e28ba90e457d64e5ff0d02a3c1efe8b5e47e1cb807ed837a0000008000000000be264d9f17046508000000721532000000000000000099755663f3d259bdbe0500000000000043cced99a22f1d8a9b41bc1b4f57e668f6faeb63a0f17a8930e82a4ee9eabc89d77bea7599217011342db141d6880456376ea97274cb1548ae7670afa46874d973978f0e4b03c7f24c9eb009b8fa5fea219ca7c63ae76fae728abb8d708aa5af6b9047002bab36c3c654b9f3b14cb8c508f0041a09a0cdf2181b85710c790000001c427e83fd28f9cc4667592fa99071483052576200f0157f6454fa4a456c2c6f60620e48c4b13ff2296b10800a073d7535b73f74b0345ee736f25c7c63bb28593bf20f6eab890cf9614f151147edec823e55d0f66a050218d076d9e8bacaf515f4c74783c290b13f8f7aecb611dbe7174cbc6726bbe0d097cbaa6dc5a4db005f0e65ceec316df8618d20057d081fff99f5de4d55eeb470721b314361fe893d717f4a6e0e016c7e0277d65edff3f8900737861ce2a3f184e6bf34928da6a4f7ecdfd394d5c53c56a025a6dd5db09ae1be4fdacf7cb000000000b86ce867b2e36f0b543466dda63eb6cbae206638d7576985beba1dd2d585babff429b7f45c8d43f9b03d7feaf25b84f7b59593c777bbf1f1a67848daed6b19c510bce29af10b1e1836d1b555d2f927b20a8131f10d66f25b3887a916e9497046ab1fb7c0efbed829c60d3a3057b466a19eb5025172697977a036354d1f09e9135ab161f00a96d822c6bb05ee3a22c4c091eded743d68ec0466695186eacc1ba0bbf5b5d3baefe299d0ec17949234efc2ebfb27bc8271ac34fc32b2391ea9df81e30775fbc9ba7e0f9c8c18322e9a061694cda6bf27ccb560439f66860867789ce6b21c02c7e83e32a720ef7d02d3d5d98cd4fcf507f3be"], 0x1) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000005c0)) sendfile(r3, r4, 0x0, 0x8607) mkdir(&(0x7f00000006c0)='./file0/file0/file1\x00', 0x1000000000080) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000400), &(0x7f0000000180)=0x5) mount$bpf(0x20000000, &(0x7f0000000500)='./file0\x00', 0x0, 0x5004, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000340)={'caif0\x00', 0xdffffffffffffc00}) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x588e, 0x0) r5 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0x10) recvmmsg(r5, &(0x7f0000000240), 0x0, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000240)) [ 120.397483][ T7730] device hsr_slave_0 entered promiscuous mode [ 120.425399][ T7730] device hsr_slave_1 entered promiscuous mode [ 120.468905][ T7730] debugfs: Directory 'hsr0' with parent '/' already present! [ 120.590159][ T7703] 8021q: adding VLAN 0 to HW filter on device bond0 [ 120.652524][ T7763] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 120.719891][ T7703] 8021q: adding VLAN 0 to HW filter on device team0 [ 120.847013][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.854810][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 17:50:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0x0) [ 120.946244][ T7763] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 121.102100][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 121.122239][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 121.196418][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.203839][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.339731][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 17:50:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0x0) [ 121.439326][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 121.506975][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.514166][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.621351][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 17:50:36 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x8000, 0x4, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) readahead(r0, 0xea6, 0x2) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, 0x0, 0x0, 0x40000, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = dup3(r0, r0, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e24, 0x1, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000001a00)=ANY=[@ANYBLOB="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"], 0x1) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000005c0)) sendfile(r3, r4, 0x0, 0x8607) mkdir(&(0x7f00000006c0)='./file0/file0/file1\x00', 0x1000000000080) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000400), &(0x7f0000000180)=0x5) mount$bpf(0x20000000, &(0x7f0000000500)='./file0\x00', 0x0, 0x5004, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000340)={'caif0\x00', 0xdffffffffffffc00}) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x588e, 0x0) r5 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0x10) recvmmsg(r5, &(0x7f0000000240), 0x0, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000240)) 17:50:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0x0) [ 121.726327][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 121.823131][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 121.895855][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 121.904532][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 122.035703][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 122.049807][ T7701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 122.119441][ T7703] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 17:50:37 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x8000, 0x4, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) readahead(r0, 0xea6, 0x2) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, 0x0, 0x0, 0x40000, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = dup3(r0, r0, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e24, 0x1, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000001a00)=ANY=[@ANYBLOB="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"], 0x1) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000005c0)) sendfile(r3, r4, 0x0, 0x8607) mkdir(&(0x7f00000006c0)='./file0/file0/file1\x00', 0x1000000000080) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000400), &(0x7f0000000180)=0x5) mount$bpf(0x20000000, &(0x7f0000000500)='./file0\x00', 0x0, 0x5004, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000340)={'caif0\x00', 0xdffffffffffffc00}) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x588e, 0x0) r5 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0x10) recvmmsg(r5, &(0x7f0000000240), 0x0, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000240)) [ 122.210209][ T7703] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 122.352716][ T7701] 8021q: adding VLAN 0 to HW filter on device team0 [ 122.409521][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 122.438415][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 122.545994][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 122.554275][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 122.707212][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 122.767070][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 122.846090][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 122.853798][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 122.946042][ T7763] team0: Port device team_slave_0 added [ 122.963169][ T7730] 8021q: adding VLAN 0 to HW filter on device bond0 [ 123.040382][ T7703] 8021q: adding VLAN 0 to HW filter on device batadv0 17:50:38 executing program 0: connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x8000, 0x4, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) readahead(r0, 0xea6, 0x2) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, 0x0, 0x0, 0x40000, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = dup3(r0, r0, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e24, 0x1, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000001a00)=ANY=[@ANYBLOB="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"], 0x1) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000005c0)) sendfile(r3, r4, 0x0, 0x8607) mkdir(&(0x7f00000006c0)='./file0/file0/file1\x00', 0x1000000000080) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000400), &(0x7f0000000180)=0x5) mount$bpf(0x20000000, &(0x7f0000000500)='./file0\x00', 0x0, 0x5004, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000340)={'caif0\x00', 0xdffffffffffffc00}) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x588e, 0x0) r5 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0x10) recvmmsg(r5, &(0x7f0000000240), 0x0, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000240)) [ 123.085679][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 123.093477][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 123.178685][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 123.225729][ T7741] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.232828][ T7741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.355783][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 123.379170][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 123.451729][ T7741] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.458848][ T7741] bridge0: port 2(bridge_slave_1) entered forwarding state 17:50:38 executing program 1: connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x42, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x8000, 0x4, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r1, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) lseek(r0, 0x0, 0x1) readahead(r0, 0xea6, 0x2) sendfile(r1, r1, &(0x7f0000000440), 0x20) sendfile(r1, r1, &(0x7f0000000100), 0x7f8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mount(0x0, 0x0, 0x0, 0x40000, 0x0) pivot_root(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='./file0/file0/file0\x00') r2 = dup3(r0, r0, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x4e24, 0x1, @dev, 0x5}, 0x1c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') write$UHID_CREATE2(r2, &(0x7f0000001a00)=ANY=[@ANYBLOB="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"], 0x1) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000005c0)) sendfile(r3, r4, 0x0, 0x8607) mkdir(&(0x7f00000006c0)='./file0/file0/file1\x00', 0x1000000000080) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000400), &(0x7f0000000180)=0x5) mount$bpf(0x20000000, &(0x7f0000000500)='./file0\x00', 0x0, 0x5004, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000700)='TIPC\x00') ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000340)={'caif0\x00', 0xdffffffffffffc00}) mount$bpf(0x20000000, &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x588e, 0x0) r5 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0x10) recvmmsg(r5, &(0x7f0000000240), 0x0, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000240)) [ 123.572579][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 123.638427][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 123.682305][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 123.705454][ T7741] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 123.721508][ T7763] team0: Port device team_slave_1 added [ 123.742618][ T7730] 8021q: adding VLAN 0 to HW filter on device team0 [ 123.775721][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 123.794130][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 123.838019][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.875690][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 123.919639][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 123.960410][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 124.006342][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 124.061885][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 124.109512][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 124.148587][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 124.189716][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 124.276613][ T7701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 124.327768][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 124.341179][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 124.383061][ T7734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 124.418771][ T7734] bridge0: port 1(bridge_slave_0) entered blocking state [ 124.425897][ T7734] bridge0: port 1(bridge_slave_0) entered forwarding state [ 124.442321][ T7925] ================================================================== [ 124.450483][ T7925] BUG: KCSAN: data-race in pipe_wait / put_pipe_info [ 124.457131][ T7925] [ 124.459445][ T7925] read to 0xffff8880b975134c of 4 bytes by task 7857 on cpu 0: [ 124.466978][ T7925] pipe_wait+0xd7/0x140 [ 124.471127][ T7925] pipe_read+0x3b1/0x5e0 [ 124.475367][ T7925] new_sync_read+0x389/0x4f0 [ 124.479986][ T7925] __vfs_read+0xb1/0xc0 [ 124.484125][ T7925] vfs_read+0x143/0x2c0 [ 124.488302][ T7925] ksys_read+0xd5/0x1b0 [ 124.492438][ T7925] __x64_sys_read+0x4c/0x60 [ 124.496928][ T7925] do_syscall_64+0xcc/0x370 [ 124.501417][ T7925] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 124.507282][ T7925] [ 124.509599][ T7925] write to 0xffff8880b975134c of 4 bytes by task 7925 on cpu 1: [ 124.517215][ T7925] put_pipe_info+0x4d/0xb0 [ 124.521615][ T7925] pipe_release+0x152/0x1b0 [ 124.526102][ T7925] __fput+0x1e1/0x520 [ 124.530069][ T7925] ____fput+0x1f/0x30 [ 124.534070][ T7925] task_work_run+0xf6/0x130 [ 124.538553][ T7925] exit_to_usermode_loop+0x2b4/0x2c0 [ 124.543851][ T7925] do_syscall_64+0x353/0x370 [ 124.548421][ T7925] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 124.554325][ T7925] [ 124.556633][ T7925] Reported by Kernel Concurrency Sanitizer on: [ 124.562804][ T7925] CPU: 1 PID: 7925 Comm: net.agent Not tainted 5.4.0-syzkaller #0 [ 124.570578][ T7925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.580702][ T7925] ================================================================== [ 124.588860][ T7925] Kernel panic - not syncing: panic_on_warn set ... [ 124.595431][ T7925] CPU: 1 PID: 7925 Comm: net.agent Not tainted 5.4.0-syzkaller #0 [ 124.603218][ T7925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.613249][ T7925] Call Trace: [ 124.616537][ T7925] dump_stack+0x11d/0x181 [ 124.620863][ T7925] panic+0x210/0x640 [ 124.624738][ T7925] ? vprintk_func+0x8d/0x140 [ 124.629312][ T7925] kcsan_report.cold+0xc/0xd [ 124.633883][ T7925] kcsan_setup_watchpoint+0x3fe/0x460 [ 124.639248][ T7925] __tsan_unaligned_write4+0xc4/0x100 [ 124.644597][ T7925] put_pipe_info+0x4d/0xb0 [ 124.649005][ T7925] pipe_release+0x152/0x1b0 [ 124.653487][ T7925] __fput+0x1e1/0x520 [ 124.657463][ T7925] ? put_pipe_info+0xb0/0xb0 [ 124.662036][ T7925] ____fput+0x1f/0x30 [ 124.666001][ T7925] task_work_run+0xf6/0x130 [ 124.670491][ T7925] exit_to_usermode_loop+0x2b4/0x2c0 [ 124.675757][ T7925] ? __x64_sys_dup2+0x76/0x160 [ 124.680514][ T7925] do_syscall_64+0x353/0x370 [ 124.685092][ T7925] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 124.690960][ T7925] RIP: 0033:0x7f9b9c3c89b7 [ 124.695362][ T7925] Code: 73 01 c3 48 8b 0d 81 44 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 b8 21 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 51 44 2b 00 31 d2 48 29 c2 64 [ 124.714964][ T7925] RSP: 002b:00007ffc2782a858 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 124.723356][ T7925] RAX: 0000000000000001 RBX: 0000000000000001 RCX: 00007f9b9c3c89b7 [ 124.731321][ T7925] RDX: 00000000004022f2 RSI: 0000000000000001 RDI: 000000000000000a [ 124.739282][ T7925] RBP: 0000000000622ae0 R08: 00007ffc2782a8a0 R09: 0000000000000000 [ 124.747234][ T7925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 124.755188][ T7925] R13: 00007ffc2782aa80 R14: 0000000000000000 R15: 0000000000000000 [ 124.764499][ T7925] Kernel Offset: disabled [ 124.768822][ T7925] Rebooting in 86400 seconds..