[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 53.975299][ T26] audit: type=1800 audit(1573026281.627:25): pid=8522 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 53.995154][ T26] audit: type=1800 audit(1573026281.627:26): pid=8522 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 54.048490][ T26] audit: type=1800 audit(1573026281.637:27): pid=8522 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.59' (ECDSA) to the list of known hosts. 2019/11/06 07:44:53 fuzzer started 2019/11/06 07:44:54 dialing manager at 10.128.0.26:46669 2019/11/06 07:44:54 syscalls: 2566 2019/11/06 07:44:54 code coverage: enabled 2019/11/06 07:44:54 comparison tracing: enabled 2019/11/06 07:44:54 extra coverage: enabled 2019/11/06 07:44:54 setuid sandbox: enabled 2019/11/06 07:44:54 namespace sandbox: enabled 2019/11/06 07:44:54 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/06 07:44:54 fault injection: enabled 2019/11/06 07:44:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/06 07:44:54 net packet injection: enabled 2019/11/06 07:44:54 net device setup: enabled 2019/11/06 07:44:54 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/06 07:44:54 devlink PCI setup: PCI device 0000:00:10.0 is not available 07:47:00 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1081082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x1081806) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r4, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2000005) 07:47:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x3, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x2c}}, &(0x7f0000000080)='GPL\x80', 0x5, 0xc8, &(0x7f00000000c0)=""/200, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) syzkaller login: [ 192.584343][ T8688] IPVS: ftp: loaded support on port[0] = 21 07:47:00 executing program 2: mknod(&(0x7f0000000140)='./file0\x00', 0xe8c0fa3105cc17f6, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 192.723098][ T8691] IPVS: ftp: loaded support on port[0] = 21 [ 192.779357][ T8688] chnl_net:caif_netlink_parms(): no params data found [ 192.867808][ T8688] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.890840][ T8688] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.899042][ T8688] device bridge_slave_0 entered promiscuous mode [ 192.923176][ T8688] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.930302][ T8688] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.938424][ T8688] device bridge_slave_1 entered promiscuous mode [ 192.996180][ T8693] IPVS: ftp: loaded support on port[0] = 21 07:47:00 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x3, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x30}}, &(0x7f0000000080)='GPL\x80', 0x5, 0xc8, &(0x7f00000000c0)=""/200, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 193.056088][ T8688] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.091914][ T8688] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.117775][ T8688] team0: Port device team_slave_0 added [ 193.154464][ T8688] team0: Port device team_slave_1 added [ 193.160397][ T8691] chnl_net:caif_netlink_parms(): no params data found [ 193.253973][ T8688] device hsr_slave_0 entered promiscuous mode 07:47:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) socket(0x10, 0x80002, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000140)) r1 = syz_open_dev$swradio(0x0, 0x0, 0x2) mmap$usbfs(&(0x7f00001ed000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000200)) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000380)={0x2, 0x9, 0x9, 0x8001, 0x100}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000006005b000000ff01080000ffffffffffffffe2000001e0006bf000000000800000000000000000000000000000000a00002e00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000fbbccf810000000000000000fd85d16e79bad40ac3794899000000000000000000000000000000d94bfeadbfce0d4ed6f71b242b42000000ea0000000000000000000000000000000000000500000000000000000000000000000000000000e6010000000100000000002000"], 0xb8}}, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x80) write$FUSE_NOTIFY_DELETE(r2, &(0x7f00000000c0)={0x32, 0x6, 0x0, {0x6, 0x0, 0x9, 0x0, '^cpuset$#'}}, 0x32) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x100000000000000, 0x80, &(0x7f0000000000)=@broute={'broute\x00\x00\xff\x01\x00P\xe0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x60, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000100], 0x2, 0x0, &(0x7f0000000100)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) r5 = fcntl$dupfd(r4, 0x605, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r3) sendmsg$TIPC_NL_PUBL_GET(r3, &(0x7f0000001940)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001900)={&(0x7f0000000640)=ANY=[@ANYRES32=0x0], 0x1}}, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x40000000000000b, 0x1}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000008c0)={0xffffffffffffffff, r3, 0x0, 0x2}, 0x10) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000a40)) r6 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r6) [ 193.342437][ T8688] device hsr_slave_1 entered promiscuous mode [ 193.428045][ T8696] IPVS: ftp: loaded support on port[0] = 21 [ 193.479240][ T8691] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.491792][ T8691] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.510809][ T8691] device bridge_slave_0 entered promiscuous mode 07:47:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='setgroups\x00') sendfile(r0, r0, 0x0, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket(0x40000000015, 0x805, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) [ 193.594295][ T8691] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.603011][ T8691] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.613522][ T8691] device bridge_slave_1 entered promiscuous mode [ 193.630463][ T8698] IPVS: ftp: loaded support on port[0] = 21 [ 193.716091][ T8693] chnl_net:caif_netlink_parms(): no params data found [ 193.741844][ T8691] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.756502][ T8691] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.785113][ T8702] IPVS: ftp: loaded support on port[0] = 21 [ 193.838423][ T8691] team0: Port device team_slave_0 added [ 193.896768][ T8691] team0: Port device team_slave_1 added [ 193.905393][ T8693] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.913336][ T8693] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.921179][ T8693] device bridge_slave_0 entered promiscuous mode [ 193.936525][ T8696] chnl_net:caif_netlink_parms(): no params data found [ 193.967072][ T8693] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.974916][ T8693] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.983654][ T8693] device bridge_slave_1 entered promiscuous mode [ 194.010486][ T8696] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.019865][ T8696] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.027694][ T8696] device bridge_slave_0 entered promiscuous mode [ 194.038365][ T8696] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.045701][ T8696] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.053826][ T8696] device bridge_slave_1 entered promiscuous mode [ 194.067201][ T8693] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.086203][ T8693] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.152678][ T8691] device hsr_slave_0 entered promiscuous mode [ 194.190992][ T8691] device hsr_slave_1 entered promiscuous mode [ 194.230817][ T8691] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.273186][ T8693] team0: Port device team_slave_0 added [ 194.282443][ T8698] chnl_net:caif_netlink_parms(): no params data found [ 194.294967][ T8696] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.305613][ T8696] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.325189][ T8693] team0: Port device team_slave_1 added [ 194.432741][ T8693] device hsr_slave_0 entered promiscuous mode [ 194.470998][ T8693] device hsr_slave_1 entered promiscuous mode [ 194.510788][ T8693] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.534208][ T8696] team0: Port device team_slave_0 added [ 194.562611][ T8702] chnl_net:caif_netlink_parms(): no params data found [ 194.572113][ T8696] team0: Port device team_slave_1 added [ 194.588749][ T8698] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.596479][ T8698] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.604749][ T8698] device bridge_slave_0 entered promiscuous mode [ 194.618483][ T8698] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.625755][ T8698] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.633619][ T8698] device bridge_slave_1 entered promiscuous mode [ 194.714208][ T8696] device hsr_slave_0 entered promiscuous mode [ 194.752481][ T8696] device hsr_slave_1 entered promiscuous mode [ 194.781316][ T8696] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.820092][ T8698] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.846006][ T8698] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.855764][ T8702] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.856539][ T8688] netdevsim: probe of netdevsim0 failed with error -17 [ 194.864052][ T8702] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.878448][ T8702] device bridge_slave_0 entered promiscuous mode [ 194.886332][ T8702] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.893931][ T8702] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.901905][ T8702] device bridge_slave_1 entered promiscuous mode [ 194.946279][ T8702] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.957306][ T8702] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.975295][ T8698] team0: Port device team_slave_0 added [ 194.984460][ T8698] team0: Port device team_slave_1 added [ 195.001808][ T8702] team0: Port device team_slave_0 added [ 195.023603][ T8702] team0: Port device team_slave_1 added [ 195.066011][ T8698] device hsr_slave_0 entered promiscuous mode [ 195.121187][ T8698] device hsr_slave_1 entered promiscuous mode [ 195.170875][ T8698] debugfs: Directory 'hsr0' with parent '/' already present! [ 195.283427][ T8702] device hsr_slave_0 entered promiscuous mode [ 195.333323][ T8702] device hsr_slave_1 entered promiscuous mode [ 195.370867][ T8702] debugfs: Directory 'hsr0' with parent '/' already present! [ 195.423225][ T8688] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.455939][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.464798][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.475228][ T8688] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.485242][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.494049][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.505918][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.513078][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.525975][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.535851][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.544683][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.556830][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.563923][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.591048][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.599594][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.611060][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.619792][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.628434][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.636972][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.645535][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.653916][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.663459][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.673631][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.681996][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.702600][ T8688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.716756][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 195.724635][ T8710] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 195.736735][ T8688] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 195.982101][ T8691] netdevsim: probe of netdevsim1 failed with error -17 [ 196.041667][ T8693] netdevsim: probe of netdevsim2 failed with error -17 [ 196.079957][ T8691] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.111578][ T8691] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.118495][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.127312][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.168977][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.171441][ T8696] netdevsim: probe of netdevsim3 failed with error -17 [ 196.178271][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.198019][ T3609] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.205131][ T3609] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.218856][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.228106][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.242759][ T3609] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.249827][ T3609] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.263567][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.327155][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.335954][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.352245][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.368651][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.377403][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.394148][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.438145][ T8691] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 196.459237][ T8691] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.481905][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.490294][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.509661][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.529474][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.540401][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.581486][ T8702] netdevsim: probe of netdevsim5 failed with error -17 [ 196.582489][ T8693] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.601604][ T8698] netdevsim: probe of netdevsim4 failed with error -17 [ 196.614426][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.661662][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 196.670442][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 196.694333][ T8693] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.724947][ T8696] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.745746][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.753887][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.794757][ T8691] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.809125][ T8696] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.829626][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 07:47:04 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1081082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x1081806) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r4, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2000005) [ 196.851253][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.859697][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.866783][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.874772][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.884079][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.894757][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.901854][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.909355][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.918209][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.927031][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.936095][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.946856][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.960458][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.979418][ T8693] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 197.000037][ T8693] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 197.024305][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.032687][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.040567][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.050399][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.059292][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.068144][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.078281][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.087428][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.096531][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.107191][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.119602][ T8701] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.126803][ T8701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.135434][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.144500][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.153417][ T8701] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.160480][ T8701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.168768][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.176621][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.212766][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.222046][ T3103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.272946][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.280410][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.311536][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.320488][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.344907][ T8736] BPF:hdr_len not found [ 197.361498][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.370255][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 07:47:05 executing program 1: [ 197.433064][ T8693] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.446413][ T8696] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 197.516501][ T8696] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 07:47:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x3c) close(r0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) getpid() setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000280)=""/101) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0xff00) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x400, 0xec}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x22003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8880, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)) r3 = socket(0xa, 0x0, 0x0) connect$bt_rfcomm(r3, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1000, 0x80000001}, 0x8}, 0xa) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x6}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@dev}}, {{@in=@loopback}}}, &(0x7f0000000480)=0xe8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(r4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) request_key(0x0, &(0x7f0000001300)={'syz', 0x2}, &(0x7f0000001340)='em0cpusetmime_type\x00', 0xfffffffffffffff8) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000040)=0x6, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(0x0, &(0x7f0000001300)={'syz', 0x2}, &(0x7f0000001340)='em0cpusetmime_type\x00', 0xfffffffffffffff8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) [ 197.569405][ T8698] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.598637][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.624041][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.660316][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.680904][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.689392][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.698440][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.716299][ T8702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.721653][ C1] hrtimer: interrupt took 62179 ns [ 197.757145][ T8698] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.806730][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.831648][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 07:47:05 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1081082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x1081806) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r4, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2000005) [ 197.876285][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.901750][ T3609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.939718][ T8696] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.959475][ T8702] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.976691][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.985913][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.031172][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.039734][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.109097][ T8708] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.116229][ T8708] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.123783][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.132500][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.140891][ T8708] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.147950][ T8708] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.155873][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.166008][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.175094][ T8708] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.182205][ T8708] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.190528][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.199877][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.208459][ T8708] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.215595][ T8708] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.223538][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.232528][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.241782][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.249852][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.281157][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.290360][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.324350][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.336802][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.346713][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.357039][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 07:47:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x3c) close(r0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) getpid() setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000280)=""/101) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0xff00) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x400, 0xec}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x22003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8880, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)) r3 = socket(0xa, 0x0, 0x0) connect$bt_rfcomm(r3, &(0x7f0000000000)={0x1f, {0x0, 0x0, 0x1000, 0x80000001}, 0x8}, 0xa) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x6}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in=@dev}}, {{@in=@loopback}}}, &(0x7f0000000480)=0xe8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) setuid(r4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) request_key(0x0, &(0x7f0000001300)={'syz', 0x2}, &(0x7f0000001340)='em0cpusetmime_type\x00', 0xfffffffffffffff8) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000040)=0x6, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) request_key(0x0, &(0x7f0000001300)={'syz', 0x2}, &(0x7f0000001340)='em0cpusetmime_type\x00', 0xfffffffffffffff8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) [ 198.369216][ T8701] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.406667][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 07:47:06 executing program 3: r0 = inotify_init1(0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) dup2(r0, r1) [ 198.455860][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.519496][ T8702] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 07:47:06 executing program 3: get_robust_list(0x0, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) 07:47:06 executing program 3: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) [ 198.604048][ T8702] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 198.680086][ T8698] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 198.735637][ T8698] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 198.822797][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.835782][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.891043][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.919258][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.930950][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.939267][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.952140][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.960281][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.969002][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.001067][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.009486][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.059801][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.067914][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.082487][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.089907][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 07:47:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r4, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, 0x0, 0xedc0) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x0) 07:47:06 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1081082) r1 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x1081806) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r4, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x2000005) [ 199.124374][ T8702] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.138899][ T8698] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.163688][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.171836][ T8708] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.270927][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 199.276905][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 199.280489][ T8806] kasan: CONFIG_KASAN_INLINE enabled [ 199.317524][ T8806] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 199.330751][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 199.336535][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 199.358692][ T8806] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 199.365670][ T8806] CPU: 0 PID: 8806 Comm: syz-executor.2 Not tainted 5.4.0-rc6-next-20191105 #0 [ 199.375235][ T8806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.385320][ T8806] RIP: 0010:pagemap_pmd_range+0x83/0x1e40 [ 199.391047][ T8806] Code: c1 ea 03 80 3c 02 00 0f 85 ef 1a 00 00 48 8b 43 18 49 8d 7f 40 48 89 fa 48 c1 ea 03 48 89 45 c8 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 be 1a 00 00 49 8b 5f 40 be 08 00 00 00 4c 8d ab [ 199.410659][ T8806] RSP: 0018:ffff88805c7bf288 EFLAGS: 00010202 [ 199.416729][ T8806] RAX: dffffc0000000000 RBX: ffff88805c7bf438 RCX: ffffc9000a36f000 [ 199.424712][ T8806] RDX: 0000000000000008 RSI: ffffffff81dd1b94 RDI: 0000000000000040 [ 199.432694][ T8806] RBP: ffff88805c7bf300 R08: ffff88805c7b20c0 R09: ffffed1012ba396c [ 199.440689][ T8806] R10: ffffed1012ba396b R11: ffff888095d1cb5b R12: ffff88809f550010 [ 199.448660][ T8806] R13: 0000000000600000 R14: 00000000005fffff R15: 0000000000000000 [ 199.456639][ T8806] FS: 00007f773cc1b700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 199.465564][ T8806] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 199.472146][ T8806] CR2: 00007f78a81fd638 CR3: 00000000a9b4e000 CR4: 00000000001406f0 [ 199.480238][ T8806] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 199.488209][ T8806] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 199.496179][ T8806] Call Trace: [ 199.499480][ T8806] ? smaps_pte_range+0x1460/0x1460 [ 199.504598][ T8806] __walk_page_range+0x10ff/0x1b40 [ 199.509730][ T8806] walk_page_range+0x1c5/0x3b0 [ 199.514495][ T8806] ? __walk_page_range+0x1b40/0x1b40 [ 199.519785][ T8806] ? security_capable+0x95/0xc0 [ 199.524652][ T8806] pagemap_read+0x4d1/0x650 [ 199.529160][ T8806] ? smaps_rollup_open+0x160/0x160 [ 199.534280][ T8806] do_iter_read+0x4a4/0x660 [ 199.538784][ T8806] ? dup_iter+0x260/0x260 [ 199.543116][ T8806] vfs_readv+0xf0/0x160 [ 199.547273][ T8806] ? alloc_pages_current+0x10f/0x210 [ 199.552565][ T8806] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 199.558648][ T8806] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 199.564891][ T8806] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 199.571132][ T8806] ? iov_iter_get_pages_alloc+0x3ae/0x12f0 [ 199.576943][ T8806] ? memcpy_mcsafe_to_page+0x150/0x150 [ 199.582401][ T8806] ? aa_file_perm+0x40b/0xdd0 [ 199.587080][ T8806] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 199.592802][ T8806] ? iov_iter_pipe+0xba/0x2f0 [ 199.597487][ T8806] default_file_splice_read+0x482/0x8a0 [ 199.603040][ T8806] ? rcu_read_lock_held+0x9c/0xb0 [ 199.608070][ T8806] ? iter_file_splice_write+0xbe0/0xbe0 [ 199.614412][ T8806] ? aa_path_link+0x340/0x340 [ 199.619094][ T8806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.625345][ T8806] ? security_file_permission+0x8f/0x380 [ 199.630987][ T8806] ? __mutex_init+0xef/0x130 [ 199.635575][ T8806] ? iter_file_splice_write+0xbe0/0xbe0 [ 199.641123][ T8806] do_splice_to+0x127/0x180 [ 199.645635][ T8806] splice_direct_to_actor+0x2d3/0x970 [ 199.651004][ T8806] ? generic_pipe_buf_nosteal+0x10/0x10 [ 199.656552][ T8806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.662790][ T8806] ? do_splice_to+0x180/0x180 [ 199.667474][ T8806] ? rw_verify_area+0x126/0x360 [ 199.672340][ T8806] do_splice_direct+0x1da/0x2a0 [ 199.677195][ T8806] ? splice_direct_to_actor+0x970/0x970 [ 199.682752][ T8806] ? rw_verify_area+0x126/0x360 [ 199.687609][ T8806] do_sendfile+0x597/0xd00 [ 199.692032][ T8806] ? do_compat_pwritev64+0x1c0/0x1c0 [ 199.697317][ T8806] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 199.703559][ T8806] ? put_timespec64+0xda/0x140 [ 199.708333][ T8806] __x64_sys_sendfile64+0x1dd/0x220 [ 199.713531][ T8806] ? __ia32_sys_sendfile+0x230/0x230 [ 199.718814][ T8806] ? do_syscall_64+0x26/0x760 [ 199.723491][ T8806] ? lockdep_hardirqs_on+0x421/0x5e0 [ 199.728784][ T8806] ? trace_hardirqs_on+0x67/0x240 [ 199.733845][ T8806] do_syscall_64+0xfa/0x760 [ 199.738355][ T8806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.744257][ T8806] RIP: 0033:0x45a219 [ 199.748152][ T8806] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.767762][ T8806] RSP: 002b:00007f773cc1ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 199.776179][ T8806] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a219 [ 199.784234][ T8806] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 [ 199.792203][ T8806] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 199.800172][ T8806] R10: 000000000000edc0 R11: 0000000000000246 R12: 00007f773cc1b6d4 [ 199.808131][ T8806] R13: 00000000004c7f94 R14: 00000000004de3b0 R15: 00000000ffffffff [ 199.816080][ T8806] Modules linked in: [ 199.820851][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 199.822092][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 199.826634][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 199.832331][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 199.838556][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 199.849446][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 199.857471][ T8806] ---[ end trace dc62db5d3622a824 ]--- [ 199.863941][ T8806] RIP: 0010:pagemap_pmd_range+0x83/0x1e40 [ 199.869679][ T8806] Code: c1 ea 03 80 3c 02 00 0f 85 ef 1a 00 00 48 8b 43 18 49 8d 7f 40 48 89 fa 48 c1 ea 03 48 89 45 c8 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 0f 85 be 1a 00 00 49 8b 5f 40 be 08 00 00 00 4c 8d ab [ 199.892958][ T8806] RSP: 0018:ffff88805c7bf288 EFLAGS: 00010202 [ 199.899043][ T8806] RAX: dffffc0000000000 RBX: ffff88805c7bf438 RCX: ffffc9000a36f000 [ 199.909276][ T8806] RDX: 0000000000000008 RSI: ffffffff81dd1b94 RDI: 0000000000000040 [ 199.919038][ T8806] RBP: ffff88805c7bf300 R08: ffff88805c7b20c0 R09: ffffed1012ba396c [ 199.928514][ T4000] kobject: 'loop4' (00000000aee385f4): kobject_uevent_env [ 199.941604][ T8806] R10: ffffed1012ba396b R11: ffff888095d1cb5b R12: ffff88809f550010 [ 199.947979][ T4000] kobject: 'loop4' (00000000aee385f4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 199.949712][ T8806] R13: 0000000000600000 R14: 00000000005fffff R15: 0000000000000000 [ 199.971941][ T4000] kobject: 'loop5' (0000000024e62dd9): kobject_uevent_env [ 199.979131][ T4000] kobject: 'loop5' (0000000024e62dd9): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 199.983729][ T8806] FS: 00007f773cc1b700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 200.010906][ T8806] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.017523][ T8806] CR2: 0000001b33522000 CR3: 00000000a9b4e000 CR4: 00000000001406e0 [ 200.034794][ T4000] kobject: 'loop0' (0000000090505471): kobject_uevent_env [ 200.060709][ T8806] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 200.074608][ T8806] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 200.079896][ T4000] kobject: 'loop0' (0000000090505471): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 200.100223][ T8806] Kernel panic - not syncing: Fatal exception [ 200.107678][ T8806] Kernel Offset: disabled [ 200.111998][ T8806] Rebooting in 86400 seconds..