[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 35.430366][ T25] audit: type=1800 audit(1572756187.301:25): pid=7019 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 35.457582][ T25] audit: type=1800 audit(1572756187.311:26): pid=7019 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 35.496839][ T25] audit: type=1800 audit(1572756187.311:27): pid=7019 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.22' (ECDSA) to the list of known hosts. 2019/11/03 04:43:17 fuzzer started 2019/11/03 04:43:18 dialing manager at 10.128.0.105:46001 2019/11/03 04:43:19 syscalls: 2554 2019/11/03 04:43:19 code coverage: enabled 2019/11/03 04:43:19 comparison tracing: enabled 2019/11/03 04:43:19 extra coverage: extra coverage is not supported by the kernel 2019/11/03 04:43:19 setuid sandbox: enabled 2019/11/03 04:43:19 namespace sandbox: enabled 2019/11/03 04:43:19 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/03 04:43:19 fault injection: enabled 2019/11/03 04:43:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/03 04:43:19 net packet injection: enabled 2019/11/03 04:43:19 net device setup: enabled 2019/11/03 04:43:19 concurrency sanitizer: enabled syzkaller login: [ 51.452197][ T7185] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/03 04:43:41 adding functions to KCSAN blacklist: 'ext4_xattr_get' 'alloc_pid' 'ktime_get_with_offset' 'blk_mq_dispatch_rq_list' 'n_tty_receive_buf_common' 'xas_find_marked' 'task_dump_owner' 'tick_do_update_jiffies64' 'dd_has_work' 'ext4_free_inodes_count' 'wbt_done' 'snd_ctl_notify' 'taskstats_exit' 'generic_permission' 'bio_chain' '__snd_rawmidi_transmit_ack' 'dput' 'poll_schedule_timeout' 'rcu_gp_fqs_loop' 'blk_mq_get_request' 'find_next_bit' 'sit_tunnel_xmit' 'kauditd_thread' 'generic_fillattr' 'wbc_detach_inode' 'inode_permission' 'do_nanosleep' 'blk_mq_sched_dispatch_requests' '__alloc_file' 'run_timer_softirq' 'ipip_tunnel_xmit' '__mark_inode_dirty' '__perf_event_overflow' 'add_timer' 'ktime_get_real_seconds' 'shmem_getpage_gfp' 'pcpu_alloc' 'exit_signals' 'fsnotify' 'lru_add_drain_all' 'handle_mm_fault' 'rcvbuf_limit' 'pipe_unlock' 'blk_mq_run_hw_queue' 'inactive_list_is_low' 'lookup_fast' '__nf_conntrack_find_get' 'kernfs_refresh_inode' 'kvm_mmu_notifier_invalidate_range_end' 'process_srcu' 'tick_nohz_idle_stop_tick' 'xas_clear_mark' 'do_syslog' 'vm_area_dup' 'kcm_rfree' 'page_counter_try_charge' 'snd_seq_timer_get_cur_tick' 'evict' 'mm_update_next_owner' 'add_timer_on' 'update_defense_level' '__skb_wait_for_more_packets' 'tomoyo_supervisor' '__rcu_read_unlock' '__tcp_select_window' 'do_exit' 'skb_queue_tail' '__wb_calc_thresh' 'pipe_wait' 'ext4_nonda_switch' 'timer_clear_idle' '__nf_ct_refresh_acct' 'commit_echoes' 'ktime_get_seconds' 'kvm_arch_vcpu_load' '__dev_queue_xmit' 'mod_timer' 'generic_write_end' '__ext4_new_inode' 'audit_log_start' 'install_new_memslots' 'ptrace_check_attach' 'snapshot_refaults' 'tick_sched_do_timer' 'ext4_mark_iloc_dirty' '__blk_queue_split' 'mem_cgroup_select_victim_node' 'ext4_setattr' '__skb_try_recv_from_queue' 'pipe_poll' 'enqueue_timer' 'osq_lock' 'ep_poll' 'wbc_attach_and_unlock_inode' 'copy_process' '__dentry_kill' 'wbt_issue' 'shmem_file_read_iter' 'ext4_free_inode' 'p9_poll_workfn' '__delete_from_page_cache' 'rcu_gp_fqs_check_wake' 'tcp_add_backlog' 'ext4_mb_good_group' 'yama_ptracer_del' 'ext4_has_free_clusters' 'find_get_pages_range_tag' 'echo_char' 'tcp_event_new_data_sent' '__hrtimer_run_queues' 'tcp_poll' 'queue_access_lock' 'pid_update_inode' 'list_lru_count_one' 04:48:13 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x3, 0x2, 0xfff}, &(0x7f0000000040)=0x14) sendto$ax25(0xffffffffffffffff, &(0x7f0000000080)="f882a35965804778c5763dfdb5626365b5c0cb823531c9fe001e986e75fe2e89d97e04187802477680686a59818c346f5746a7", 0x33, 0x24004040, &(0x7f00000000c0)={{0x3, @null, 0x5}, [@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default]}, 0x48) r1 = socket$caif_seqpacket(0x25, 0x5, 0x928) listen(r1, 0x4) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000140)='gretap0\x00') r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x7f, 0x400) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f00000001c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_int(r3, 0x1, 0x12, &(0x7f0000000200)=0x1, 0x4) syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x209000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000002c0)={0x1, [0x0]}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000340)={r5, 0x8000}, 0xc) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getpeername$inet6(r6, &(0x7f0000000380)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000003c0)=0x1c) r7 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video35\x00', 0x2, 0x0) r8 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x2, 0x410000) connect$vsock_dgram(r8, &(0x7f0000000480)={0x28, 0x0, 0x2710, @hyper}, 0x10) r9 = syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x8cc2) getsockopt$inet_mreqn(r9, 0x0, 0x23, &(0x7f0000000500)={@local, @loopback}, &(0x7f0000000540)=0xc) syz_open_dev$char_usb(0xc, 0xb4, 0x10001) r10 = accept$ax25(r9, &(0x7f0000000640)={{0x3, @null}, [@default, @netrom, @default, @remote, @default, @null, @default, @netrom]}, &(0x7f00000006c0)=0x48) getsockopt(r10, 0x0, 0x2, &(0x7f0000000700)=""/98, &(0x7f0000000780)=0x62) r11 = dup2(0xffffffffffffffff, r7) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r11, 0x800443d2, &(0x7f0000000840)={0x5, &(0x7f00000007c0)=[{}, {}, {}, {}, {}]}) getpeername(r2, &(0x7f0000000880)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000900)=0x80) getsockname(r12, &(0x7f0000000940)=@hci={0x1f, 0x0}, &(0x7f00000009c0)=0x80) bind$packet(r7, &(0x7f0000000a00)={0x11, 0xd, r13, 0x1, 0x0, 0x6, @random="28fd21aeccb6"}, 0x14) r14 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x2080, 0x0) connect$vsock_stream(r14, &(0x7f0000000a80)={0x28, 0x0, 0x2711, @host}, 0x10) [ 341.393026][ T7188] IPVS: ftp: loaded support on port[0] = 21 04:48:13 executing program 1: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="a8b0fcdd500e0a5edbf6bf8c3610207c442ee1defba104373aa0f3032ba266e8c9369824f819cc0f94", 0x29, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='pagemap\x00') setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000180)={0x1, 0xe7}, 0x2) r3 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2) name_to_handle_at(r3, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x7c, 0xfffffff7, "931fdaeeea5411376135df92209775778e776395d4393a15173bb93fec26cf7c3310f2ec8e41081d5801c41ffeb2f1a7c1788c29317fd32527c4edce00814b211042cb1ae9efb5a4e0a7e212e6f1b29e6bdde3cc3a9bf1c876c3fdcc5446d921265395ad7ae7caaf4e4aecaa07f4f5a5da4db92d"}, &(0x7f00000002c0), 0xe00) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NS_GET_NSTYPE(r4, 0xb703, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x40, &(0x7f0000000340)={'security\x00'}, &(0x7f00000003c0)=0x54) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000003640)={&(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000003580)=[{&(0x7f0000000480)=""/9, 0x9}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f00000034c0)=""/169, 0xa9}], 0x5, &(0x7f0000003600)=""/33, 0x21}, 0x10103) recvfrom$unix(r7, &(0x7f0000003680)=""/140, 0x8c, 0x20, &(0x7f0000003740)=@abs={0x1, 0x0, 0x4e22}, 0x6e) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) setsockopt$inet_group_source_req(r3, 0x0, 0x0, &(0x7f00000037c0)={0x10001, {{0x2, 0x4e22, @empty}}, {{0x2, 0x4e22, @empty}}}, 0x108) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000003900)={0x0, @in6={{0xa, 0x4e21, 0x4, @mcast2, 0x4}}}, &(0x7f00000039c0)=0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000003a00)={r8, 0x6}, &(0x7f0000003a40)=0x8) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0xc0485661, &(0x7f0000003a80)={0x3, 0x2, @stop_pts=0x80}) ioctl$sock_proto_private(r2, 0x89e2, &(0x7f0000003b00)="66c970db21a46f912f1126de60e44f6548b28f8851b520e9b054d54ecd52fbc2ca982b1716706782f831d07edd0e2116f599c9de68ac378bec4fa7466618af2b37dc1ea521d7510a6a50989e4d11a4a19d0b7083708932532cc72cd9320caea9fed4436c696935b48cc94520f435b2398ba8b613b49a3821868304d6157792a2e5b5e736874e6257d2c62f4323d9") r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000003bc0)='/dev/dlm_plock\x00', 0x501380, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r9, 0x40bc5311, &(0x7f0000003c00)={0x800, 0x2e8671f7e0cec695, 'client0\x00', 0xffffffff80000004, "4bd068b2cb1c7d7b", "32a189aeef9bf44f8c304ecd7ed40a584b280a5d965b279e6bd9edddcebf2665", 0x73, 0x81}) ioctl$VFIO_IOMMU_UNMAP_DMA(r5, 0x3b72, &(0x7f0000003cc0)={0x20, 0x2, 0xce, 0xfffffffffffffffa, 0x1ff}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000003d00)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x1}) sync_file_range(r5, 0x7f, 0x8, 0x4) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) ioctl$USBDEVFS_DISCARDURB(r2, 0x550b, &(0x7f0000003d40)=0x7f) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f0000003d80)='/dev/dsp\x00', 0x18d800, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r10, 0x84, 0x1c, &(0x7f0000003dc0), &(0x7f0000003e00)=0x4) syz_open_dev$vcsn(&(0x7f0000003e40)='/dev/vcs#\x00', 0x4, 0x20a000) r11 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$CAN_RAW_JOIN_FILTERS(r11, 0x65, 0x6, &(0x7f0000003e80), 0x4) [ 341.520890][ T7188] chnl_net:caif_netlink_parms(): no params data found [ 341.570871][ T7188] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.578212][ T7188] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.587649][ T7188] device bridge_slave_0 entered promiscuous mode [ 341.595718][ T7188] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.604059][ T7188] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.613027][ T7188] device bridge_slave_1 entered promiscuous mode [ 341.636095][ T7188] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 341.647672][ T7188] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 341.671941][ T7188] team0: Port device team_slave_0 added [ 341.678880][ T7188] team0: Port device team_slave_1 added 04:48:13 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000000)="6ca34226e1522d69ef8370e2ae88cb90910a13b2d7b9c861fca1831715dfdea265", 0x21) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000040)={0x7, {{0xa, 0x4e24, 0x6, @mcast1}}, 0x1, 0x8, [{{0xa, 0x4e22, 0xdb3, @loopback, 0x7}}, {{0xa, 0x4e22, 0x5, @local, 0x6}}, {{0xa, 0x4e22, 0x7, @rand_addr="ae7c0ce23ea1201789556fffe7508efd", 0x100}}, {{0xa, 0x4e20, 0x98e3, @empty, 0x6}}, {{0xa, 0x4e22, 0x6, @mcast2, 0x7fff}}, {{0xa, 0x4e22, 0x4, @empty, 0x7ff}}, {{0xa, 0x4e20, 0x1, @rand_addr="460d384eeae2f1aa9cff082b9e329fc2", 0x9}}, {{0xa, 0x4e23, 0x3, @dev={0xfe, 0x80, [], 0x12}, 0x7fffffff}}]}, 0x490) r1 = syz_open_dev$radio(&(0x7f0000001a00)='/dev/radio#\x00', 0x1, 0x2) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000001a40)=@routing={0x11, 0xc, 0x2, 0x7, 0x0, [@loopback, @empty, @loopback, @dev={0xfe, 0x80, [], 0x27}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, @ipv4={[], [], @loopback}]}, 0x68) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001ac0)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x64) ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f0000001b00)={0x100000000, 0x5, "5bb4603e01fd86482cf908e9481a55508169b2ce500ae4128350ca99f6313bb8", 0x3f, 0x3, 0x8, 0x800, 0x0, 0x401, 0x2, 0x0, [0x8, 0x800, 0x1, 0x1]}) r3 = socket$can_raw(0x1d, 0x3, 0x1) pwritev(r3, &(0x7f0000001c00), 0x0, 0x6) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f0000001c40)={0x6, "5977ce007ea27a16dcd0e96a2a06806cbfb0aed00c8954bb9c97fca254ff927b", 0x3, 0x1, 0x4ce71f4baa9f1c2e, 0xff06ff, 0x5eb80d9b07a8cb73, 0x4}) socket$isdn(0x22, 0x3, 0x2) r5 = dup2(r3, 0xffffffffffffffff) fadvise64(r5, 0x9, 0x2, 0x1) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001cc0), &(0x7f0000001d00)=0x8) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/dlm_plock\x00', 0x9b767f5b5971c683, 0x0) setsockopt$TIPC_GROUP_LEAVE(r6, 0x10f, 0x88) r7 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000001d80), &(0x7f0000001e00)=0x60, 0x800) r8 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/mISDNtimer\x00', 0x202000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000001e80)={0x0, r8, 0x3, 0x7fffffff, 0xfffffffffffffff9, 0x5}) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000001ec0)='/dev/zero\x00', 0x200001, 0x0) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/snapshot\x00', 0x212c02, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000001f40)={r9, 0x4585, 0xfffff000, r10}) r11 = openat$full(0xffffffffffffff9c, &(0x7f0000001f80)='/dev/full\x00', 0x402000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r11, 0x6, 0x15, &(0x7f0000001fc0)=0x6, 0x4) r12 = open(&(0x7f0000002000)='./file0\x00', 0x0, 0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r12, 0x40345410, &(0x7f0000002040)={{0x1, 0x0, 0x9, 0x2, 0x80000001}}) r13 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_SET_KEYBIT(r13, 0x40045565, 0x26e) [ 341.773748][ T7188] device hsr_slave_0 entered promiscuous mode [ 341.812200][ T7188] device hsr_slave_1 entered promiscuous mode [ 341.913862][ T7192] IPVS: ftp: loaded support on port[0] = 21 [ 341.942814][ T7188] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.949928][ T7188] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.957440][ T7188] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.965583][ T7188] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.175602][ T7206] IPVS: ftp: loaded support on port[0] = 21 [ 342.265763][ T7188] 8021q: adding VLAN 0 to HW filter on device bond0 [ 342.346708][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 342.356692][ T7214] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.402837][ T7214] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.423002][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 342.463855][ T7188] 8021q: adding VLAN 0 to HW filter on device team0 [ 342.522664][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 342.542356][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 04:48:14 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10000, 0x0) accept4$ax25(r0, 0x0, &(0x7f0000000040), 0xdfb3c46da84080cd) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x20000, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x14) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x40, 0x5, 0x3f, 0x7}]}) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x5cbfaa91c4ad39d0, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={'rose', 0x0}, 0xb7b5, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x0, 0x6, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000200)={'hwsim0\x00', 0xffff30ab}) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000240)={0x9, 0x9, 0x5, 0x3}, 0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x6}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000380)={r2, 0xcb, "03aa0ce51f1977ce2fdfb21255d9890f7b896bb8a9eb44bf783d14d929910197707646538f884874265d00ca7ba3d326be936684cde3ce8370e8d77a8da9f020b08d02f9d0b4b0d73ce69f6d41592265ade029ef94cbe19281569a3e57c63f1eb27c191f1d968d2933f43545ee8c65e1996d5373d2195ceb7dce067f925590a3c2f32c035a072fb7dad2cac00afd091670ced997622617bbf0a6ddce74199af9e6760820463da399b44145fbc1e82ed2b19aaa14e71977f9ecc4b9521f7d6975a3dbf44c80737c4919e42c"}, &(0x7f0000000480)=0xd3) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000004c0)) r4 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r4, 0x10e, 0x8, &(0x7f0000000500)=0x9, 0x4) r5 = syz_open_dev$vbi(&(0x7f0000000540)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000580)={r3, 0x8}, 0x8) openat$ashmem(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000600)={0x0, 0x0, @ioapic}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000700)={0x0, 0x0}) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000780)=r6, 0x12) r7 = add_key$keyring(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key(&(0x7f00000007c0)='pkcs7_test\x00', &(0x7f0000000800)={'syz', 0x0}, &(0x7f0000000840)="3ac97f233248dff383197049db250caafabe0d057af01f885919ff13edb655f8", 0x20, r7) r8 = openat$cgroup_ro(r0, &(0x7f0000000900)='cpuset.effective_cpus\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(r8, 0x112, 0xc, &(0x7f0000000940)=0x7b57, 0x2) r9 = openat$null(0xffffffffffffff9c, &(0x7f0000000980)='/dev/null\x00', 0x200000, 0x0) pread64(r9, &(0x7f00000009c0)=""/197, 0xc5, 0x10001) r10 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000ac0)='/proc/capi/capi20ncci\x00', 0xc001, 0x0) ioctl$IOC_PR_RELEASE(r10, 0x401070ca, &(0x7f0000000b00)={0x63, 0x40, 0x1}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r9, 0x40a85323, &(0x7f0000000b40)={{0x10, 0x6}, 'port0\x00', 0x4, 0x840, 0xff, 0x3ff, 0x1fe00000, 0x3f, 0x5, 0x0, 0x1, 0xb8}) r11 = syz_open_dev$radio(&(0x7f0000000c00)='/dev/radio#\x00', 0x3, 0x2) ioctl$RNDADDTOENTCNT(r11, 0x40045201, &(0x7f0000000c40)=0x3) [ 342.574014][ T7214] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.581143][ T7214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.631499][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 342.673722][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 342.697946][ T7214] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.705101][ T7214] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.786919][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 342.813141][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 342.861971][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 342.892328][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 342.921824][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 342.951265][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 342.977730][ T7188] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 343.021332][ T7188] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 343.087012][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 343.112806][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 343.142716][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 343.172031][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 343.202077][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 343.253297][ T7188] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 343.304504][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 343.321487][ T7192] chnl_net:caif_netlink_parms(): no params data found [ 343.376788][ T7206] chnl_net:caif_netlink_parms(): no params data found [ 343.439570][ T7222] IPVS: ftp: loaded support on port[0] = 21 04:48:15 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x80000) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f0000000080)) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r3) r4 = memfd_create(&(0x7f0000000100)='procvboxnet1^)\x00', 0x6) write$binfmt_elf32(r4, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xd8, 0x81, 0x0, 0x8, 0x0, 0x938aeb87c8eda4c3, 0x8, 0x17a, 0x38, 0x2c9, 0x7b5, 0xe3c0, 0x20, 0x1, 0xfffa, 0xa78, 0x3}, [{0x3, 0x4, 0xa0, 0x1, 0xf8, 0x7, 0x400, 0x9}], "a381c941f055392da873326b197976591e49414c671b4ea0547974a7ae40c7d9b01df6896c0bc8f23d4e32b79e2fc9da66acbaaef28bfa4a6554abd141efc3addb3670762b84a6de7cfe3a", [[], [], [], [], [], [], [], []]}, 0x8a3) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r5 = dup2(r1, r4) r6 = syz_open_dev$video(&(0x7f0000000ac0)='/dev/video#\x00', 0xff, 0x0) r7 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000d00)={0xa8, 0x0, &(0x7f0000000bc0)=[@reply={0x40406301, {0x2, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000a00)={@fd={0x66642a85, 0x0, r4}, @fda={0x66646185, 0x4, 0x0, 0x6}, @fda={0x66646185, 0xa, 0x1, 0x2d}}, &(0x7f0000000a80)={0x0, 0x18, 0x38}}}, @increfs_done={0x40106308, 0x3}, @exit_looper, @transaction_sg={0x40486311, {0x2, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000b00)={@fda={0x66646185, 0x7, 0x0, 0x11}, @fd={0x66642a85, 0x0, r6}, @fd={0x66642a85, 0x0, r7}}, &(0x7f0000000b80)={0x0, 0x20, 0x38}}, 0x1000}], 0x69, 0x0, &(0x7f0000000c80)="05c9652def07000eeae574d87ce2f06923f4bf3f085a90067c1e5e9c9efdc089059c75a70ad44a1a491b8d6fe568fd797da72f05c07914b914ab10b11e4b7d3127c2909df43c6bfb3ebde8f44f1ba1383b421b41d37ec3879aa987b186ef8ad0c63af99959e6d6bdad"}) r8 = syz_open_dev$audion(&(0x7f0000000d40)='/dev/audio#\x00', 0x4, 0x404880) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r8, 0xc034564b, &(0x7f0000000d80)={0x7, 0x35323645, 0x200, 0x3, 0x3, @stepwise={{0x100, 0x8}, {0x5, 0x100}, {0x8001, 0x400}}}) r9 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/mixer\x00', 0x0, 0x0) statx(r9, &(0x7f0000000e00)='./file0\x00', 0x3000, 0x7ed, &(0x7f0000000e40)) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/hwrng\x00', 0x19802, 0x0) ioctl$SIOCSIFMTU(r10, 0x8922, &(0x7f0000000f80)={'bridge_slave_0\x00', 0x1}) ioctl$KVM_SET_TSS_ADDR(r10, 0xae47, 0xd000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000fc0)={0x0, 0x4}, &(0x7f0000001000)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000001080)={r11, 0x1c, &(0x7f0000001040)=[@in6={0xa, 0x4e21, 0xc6fe, @dev={0xfe, 0x80, [], 0x20}, 0x5af}]}, &(0x7f00000010c0)=0x10) r12 = memfd_create(&(0x7f0000001100)='\x00', 0x8b30e1d6044630e7) ioctl$EXT4_IOC_SETFLAGS(r12, 0x40086602, &(0x7f0000001140)=0x200000) setsockopt$inet6_icmp_ICMP_FILTER(r9, 0x1, 0x1, &(0x7f0000001180)={0x6}, 0x4) r13 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x8) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f0000001300)={0x50, 0x0, &(0x7f00000011c0)=[@free_buffer={0x40086303, r13}, @increfs_done, @acquire_done, @acquire={0x40046305, 0x1}, @acquire_done], 0xb3, 0x0, &(0x7f0000001240)="2408c0889b2288fd09863603cb589025bcc6f91e224cbba66baebb04e2ceae02e50d71e6285d571e4bc439faf4962022f5c584df34d950887851789981ca7cddb635a7d69e54ab690d56c8115cbc8663c622088466f8f67698c80ea9f77b14ea8855145f3990cc40127d0f686043fd7ddc3b79e362169574d2994f3e9b4d7b1cf95532350add20260e606bce1265dacbd2c1c11e1d65416e259e63af7738dbab3d9e9b77d85e485acd4e3b8c69bbb95526fc60"}) pwrite64(r4, &(0x7f0000001340)="94dc6824aefb6646b3104faec649e81398ceccda61c4d111d6a2c1ce09e5c443f2af8efd9ab4b05b697e201e2857676de45a4fb399ee214cecb90b60298747efac915efe7df1546480c03784180bf1ba53a8b0e20529a4297bb1eba517b581aa13f1a5482dbb1f363f22f155538970cb427eff34b8343bddac4909fba5a90f18a22c13692c633a0aecd22132bad0eb1b49a207435a2bae52fd9866f538965918ee4e8a201902b99d7226d5a64267dccb2156f916459ef81ab0482890d7b2127d6d0185ba31a1b11d6151", 0xca, 0x10001) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000001440)=0x2) r14 = openat$cgroup_subtree(r10, &(0x7f0000001480)='cgroup.subtree_control\x00', 0x2, 0x0) writev(r14, &(0x7f0000002940)=[{&(0x7f00000014c0)="3e83dc9190001ff36d76e70279db9a6625341d69165c879485c5724c8ac159e44438029c138c462996a9e9af41c27c379a2bb8beaaaf30f9e712aaa3c3b0f78bad902eee27c00e6e9e1f18fea8be196312b46c2ac8ccfc9acb7662d6d1a526a97dc9c6cf68f8b8f0c99878db891e4ef2c6587243818364af1149b8d4b8a6684b506060303fc899b1db13b4b5428b2ae33653722e24ff74933253ad5196043e8ff5bee218da9f9a", 0xa7}, {&(0x7f0000001580)="f12ceac9ce6daac7cbf54d364f071f9df803efea3eaa15843e3c4e7544ded491ab25358bce07646afc6efb4f39fb0d618acc49339f62c60a9a657b", 0x3b}, {&(0x7f00000015c0)="a3bdd0af9519d95b5ff0cdeea18f025009cdcbf59f185d007465346096ddf6a6c350fcd34947c39bfc53e315225d4031707cde4746765976a19f188080abd1592ed4030d9a05de5339766d0c7933b2548a0278fc141b8e4ef95b4ad523eb1e55984bc121db9e5c35294808074d6f1adcbdd9ac82b961133f5f72482b7b1d8b665c89f116a066818ecd2cc42d151c09089f8fe261ee22ed1acd281d43555826267e1b2f7d17ab55f648ea14108ba846b9d0046a1b2226e57a97d041937a11b880f35cdbf44042969c8d73af367c5a60d1b03247e3e73d717f4faf", 0xda}, {&(0x7f00000016c0)="c9e83bad37527aae02dbe4f342405d738e973533271a1cf17809ce3b1c9f37", 0x1f}, {&(0x7f0000001700)="42f7b30a9ae4ec5fb3cbf36dd57067d4c70c5d8ebbcbdfbce19eb91c7c409e2869454163240d8d66e8208e67eefe0903cc4c06b8d89e6b9ebcb142f2db30d2a668c2482ef1c4b377df31d340c99de2fd15905ca0a1093f2f274a89c351a5bce6b70d23e50af64f6eebfef3fa305531e760a8731af5faee459bb906da98086d638852a4dc255e54c839747ddc5e8802b2102bced57bd8fa4ac6", 0x99}, {&(0x7f00000017c0)="d8ba5c46a0b2893e23246b59874686e6c7f386510e3828bef22d0f36028776d93bd19a16e5d8e80212d93c8af72e03fa0a6077ab84f65632ac9966eb14665442182e354b296a290ed001353038d8c2f372f38379f985660c0a20164d2c4453727f250c3f7348e8dd5ca71c5b3f21ad4bc437c13bcb95a404a09e237b5571ad0b48740a93ee03fe8a78859a4c66a86aaf6ab290a648073d45520f4c387b6d5fcab66342e7d85df82cee636c720227adb1ed2b69ceb3ca4d14772564163eeacc39bbcb43bca1d2610c", 0xc8}, {&(0x7f00000018c0)="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", 0x1000}, {&(0x7f00000028c0)="d42551795eedf503d65efe392a0be279ab2f07c5694c1811464678827fd18944846d96111b9fa80fa081a7c24534d1e11aa8c0dd5c335f8ddb5e196b5caccd50dfbdf3bf51f6ec", 0x47}], 0x8) [ 343.662457][ T7192] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.669639][ T7192] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.711801][ T7192] device bridge_slave_0 entered promiscuous mode [ 343.735573][ T7206] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.747822][ T7206] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.784906][ T7206] device bridge_slave_0 entered promiscuous mode [ 343.820142][ T7192] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.833017][ T7192] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.868152][ T7192] device bridge_slave_1 entered promiscuous mode [ 343.896854][ T7206] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.909917][ T7206] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.937085][ T7206] device bridge_slave_1 entered promiscuous mode 04:48:15 executing program 0: syz_open_dev$sndmidi(0x0, 0x8, 0x286200) read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(r3, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r3, r2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="01f4a484d973b66458ccf1571d22363051ea410f97ecf6c1982dfa3144d4503e7665952e26e00b60ddee20393ea44f3bbc69e445f6c249bd16bfb081153c5b75d8e0d35fde76828fe14d6cceede59115ad5511268ff307780c7e7009f5f87faebe1ca6c69db907bf846b3b78778fd48cbf765c0fcb8923c303730e19b5643e443b9fecf4a2960dcf4b1054f929dd8b18be17541c21e4f4326ad5fca4e430ef343644dd60325871f0ff2dd27bffe8362d89fd40269afce215941ab87b12a58643154b5002a45023f65f7767d59ff427282d43eff34792f382fc8a123cec1cf2d6124ff58666b0a31cb18ee54b15d0378af626a37140766930c0f134486822f2d2114d4a905ece76ecaf2714828dad093ca01ebc98da903d43ccbe7b097299fd29c1523335c250bf1d6a74cf0cbe57c76eea2beedaf7f1cda9ce18cc318e1600c08d629703bd36b678f5fa9a260753a0ec2070b4779ac20c8b924738112c4d66002b78aaadf563305795bc2f2745ae1bd2daa4dbff2242fe803fff160e1e20f3ea1d09c7ea121955b006e547a203b82c13bef4ce1e0d8b783e26ebb3834c6f278e36b710caeb0eb2626298f6bc96b9c68e18beb78cd0ccf547dc", @ANYRES64=r7], 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000200)=0x8) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000080)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x21, 0xffffffffffffff8f}, 0x2c) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @empty}, 0x96, 0x0, 0x0, 0x0, 0x7, 0x0, 0xff, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, 0x0, 0x3, 0x243, 0x1f}) setsockopt$IP_VS_SO_SET_ZERO(r8, 0x0, 0x48f, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000012c0)) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e, 0x1}, 0x120) [ 344.040970][ T7192] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 344.092405][ T7192] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 344.187650][ T7206] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 344.238052][ T7237] IPVS: ftp: loaded support on port[0] = 21 [ 344.265579][ T7206] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 344.312363][ T7222] chnl_net:caif_netlink_parms(): no params data found [ 344.327180][ C1] hrtimer: interrupt took 35599 ns [ 344.373868][ T7192] team0: Port device team_slave_0 added [ 344.406496][ T7192] team0: Port device team_slave_1 added [ 344.435867][ T7206] team0: Port device team_slave_0 added [ 344.461235][ T7222] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.468520][ T7222] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.476786][ T7222] device bridge_slave_0 entered promiscuous mode 04:48:16 executing program 0: syz_open_dev$sndmidi(0x0, 0x8, 0x286200) read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(r3, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r3, r2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES64=r7], 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000200)=0x8) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000080)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x21, 0xffffffffffffff8f}, 0x2c) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @empty}, 0x96, 0x0, 0x0, 0x0, 0x7, 0x0, 0xff, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, 0x0, 0x3, 0x243, 0x1f}) setsockopt$IP_VS_SO_SET_ZERO(r8, 0x0, 0x48f, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000012c0)) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e, 0x1}, 0x120) [ 344.488073][ T7206] team0: Port device team_slave_1 added 04:48:16 executing program 5: syz_open_dev$sndmidi(0x0, 0x8, 0x286200) read(0xffffffffffffffff, 0x0, 0x23b) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0x1) fcntl$setstatus(r3, 0x4, 0x102800) write(r3, &(0x7f0000000000)="d5", 0xfffffedf) dup3(r3, r2, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x9}, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES64=r7], 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0x0, @rand_addr="c223e211e63ec71f52f4aa37180045d7"}}, 0x9}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000200)=0x8) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000080)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'wrr\x00', 0x21, 0xffffffffffffff8f}, 0x2c) r8 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @empty}, 0x96, 0x0, 0x0, 0x0, 0x7, 0x0, 0xff, 0x0, 0x40}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x0, @rand_addr=0x7}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, 0x0, 0x3, 0x243, 0x1f}) setsockopt$IP_VS_SO_SET_ZERO(r8, 0x0, 0x48f, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000012c0)) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) write$UHID_CREATE(r0, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x9e, 0x1}, 0x120) [ 344.543373][ T7192] device hsr_slave_0 entered promiscuous mode [ 344.590999][ T7192] device hsr_slave_1 entered promiscuous mode [ 344.650728][ T7192] debugfs: Directory 'hsr0' with parent '/' already present! [ 344.658330][ T7222] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.670743][ T7222] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.687064][ T7222] device bridge_slave_1 entered promiscuous mode [ 344.735910][ T7222] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 04:48:16 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}}, 0xfffffffffffffe11) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000026c0)=[{&(0x7f0000000300)=""/207, 0xcf}], 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@local, 0x0, 0x2}, 0x300) write$binfmt_elf32(r2, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYRES32=r0, @ANYRES16=r3], 0xa) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000180)={@local, 0x0, 0x2}, 0x300) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)=0x0) chown(&(0x7f0000000480)='./file0\x00', r5, r6) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r9, @ANYBLOB="00000000ffffffff0000000008000100686866000c00020008000500000000335aadbcd6bd94205fab18edbb00"], 0x38}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000440)={@remote, 0x4, r9}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r2, &(0x7f0000000140)="9086d31826969e3cbd14eb38ff4788cf45a2a66360eec1fb1ea83b1025ee99b772366f1d8f709f2852f586039a2bc98e4b364c23f95f1bc202b27810d2e3a884341a33d9c29b20e1710ef031441792802904ce8c2140bec296a1d5acbf83b8bdb3882ebc4a2b8f40a6c18931463a7b162438ae60ea6a973bbbc41e9ee598a39c23510711feb625f584cc7f19dd5aa06ab00cef7491fc52eddb8c15daa89cac09da78b3c59e6396d06b5070b9ac56fe335ec2d347b2ab2aed86aca890", &(0x7f0000000200)=""/174}, 0x20) [ 344.823520][ T7206] device hsr_slave_0 entered promiscuous mode [ 344.891154][ T7206] device hsr_slave_1 entered promiscuous mode [ 344.960639][ T7206] debugfs: Directory 'hsr0' with parent '/' already present! [ 344.985659][ T7222] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 345.001534][ T7255] IPVS: ftp: loaded support on port[0] = 21 [ 345.135439][ T7222] team0: Port device team_slave_0 added [ 345.267321][ T7222] team0: Port device team_slave_1 added 04:48:17 executing program 0: 04:48:17 executing program 0: [ 345.610345][ T7237] chnl_net:caif_netlink_parms(): no params data found [ 345.734162][ T7222] device hsr_slave_0 entered promiscuous mode [ 345.780993][ T7222] device hsr_slave_1 entered promiscuous mode [ 345.820724][ T7222] debugfs: Directory 'hsr0' with parent '/' already present! 04:48:17 executing program 0: [ 345.959748][ T7192] 8021q: adding VLAN 0 to HW filter on device bond0 [ 346.141979][ T7192] 8021q: adding VLAN 0 to HW filter on device team0 [ 346.191788][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 346.214469][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.262893][ T7237] bridge0: port 1(bridge_slave_0) entered blocking state 04:48:18 executing program 0: [ 346.323993][ T7237] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.355948][ T7237] device bridge_slave_0 entered promiscuous mode [ 346.515721][ T7237] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.565122][ T7237] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.640679][ T7237] device bridge_slave_1 entered promiscuous mode [ 346.737287][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 346.761520][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 346.770007][ T7214] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.777129][ T7214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.971324][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 346.980221][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 347.101116][ T7214] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.108307][ T7214] bridge0: port 2(bridge_slave_1) entered forwarding state [ 347.241318][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 347.320866][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 347.424428][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 347.461448][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 347.470370][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 347.571806][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 347.631621][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 347.700840][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 347.709358][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 347.811677][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 347.860833][ T7206] 8021q: adding VLAN 0 to HW filter on device bond0 [ 347.873500][ T7192] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 347.941587][ T7192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 348.009043][ T7237] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 348.081269][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 348.121192][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 348.129690][ T7255] chnl_net:caif_netlink_parms(): no params data found [ 348.159067][ T7206] 8021q: adding VLAN 0 to HW filter on device team0 [ 348.212154][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 348.219954][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 348.306836][ T7237] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 348.358524][ T7192] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 348.430928][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 348.440007][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 348.561307][ T7308] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.568393][ T7308] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.661409][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 348.725531][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 348.801205][ T7308] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.808291][ T7308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.002614][ T7222] 8021q: adding VLAN 0 to HW filter on device bond0 [ 349.128482][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 349.171367][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 349.245402][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 349.326475][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 349.406069][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 349.486639][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 349.552285][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 349.632574][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 349.646223][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 349.806108][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 349.916317][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 349.997299][ T7237] team0: Port device team_slave_0 added [ 350.023768][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 350.051646][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 350.060559][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 350.108576][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 350.198256][ T7222] 8021q: adding VLAN 0 to HW filter on device team0 [ 350.216925][ T7237] team0: Port device team_slave_1 added [ 350.223944][ T7255] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.264930][ T7255] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.325444][ T7255] device bridge_slave_0 entered promiscuous mode [ 350.366815][ T7255] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.431151][ T7255] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.485224][ T7255] device bridge_slave_1 entered promiscuous mode [ 350.617939][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 350.637860][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 350.691406][ T7307] bridge0: port 1(bridge_slave_0) entered blocking state [ 350.698507][ T7307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 350.765686][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 350.805520][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 350.831549][ T7307] bridge0: port 2(bridge_slave_1) entered blocking state [ 350.838672][ T7307] bridge0: port 2(bridge_slave_1) entered forwarding state 04:48:22 executing program 1: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) [ 350.889349][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 350.918856][ T7206] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 351.033597][ T7237] device hsr_slave_0 entered promiscuous mode [ 351.071029][ T7237] device hsr_slave_1 entered promiscuous mode [ 351.101052][ T7237] debugfs: Directory 'hsr0' with parent '/' already present! [ 351.108689][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 351.128987][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 351.152531][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 351.166372][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 351.175614][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 351.214026][ T7255] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 351.235884][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 351.254004][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 351.277446][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 351.289871][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 351.302801][ T7222] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 351.329649][ T7222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 351.354915][ T7255] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 351.369969][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 351.393396][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 351.434183][ T7222] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 351.537268][ T7255] team0: Port device team_slave_0 added [ 351.613188][ T7255] team0: Port device team_slave_1 added [ 351.754044][ T7255] device hsr_slave_0 entered promiscuous mode [ 351.800982][ T7255] device hsr_slave_1 entered promiscuous mode [ 351.840660][ T7255] debugfs: Directory 'hsr0' with parent '/' already present! [ 351.966569][ T7237] 8021q: adding VLAN 0 to HW filter on device bond0 [ 352.011879][ T7413] Unknown ioctl 21539 04:48:23 executing program 2: [ 352.105286][ T7413] Unknown ioctl 21539 [ 352.122961][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 352.163754][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.215175][ T7237] 8021q: adding VLAN 0 to HW filter on device team0 [ 352.341535][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 352.350238][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 04:48:24 executing program 3: [ 352.455639][ T7214] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.462976][ T7214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.601561][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 352.609815][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 352.696578][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 352.745722][ T41] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.752863][ T41] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.886408][ T41] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 353.011342][ T7255] 8021q: adding VLAN 0 to HW filter on device bond0 [ 353.026186][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 353.035782][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 353.081615][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 353.136186][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 353.191519][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 353.251836][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 353.316170][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 353.361526][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 353.425636][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 353.458671][ T7237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 353.524843][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 353.533843][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 353.581359][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 353.672683][ T7255] 8021q: adding VLAN 0 to HW filter on device team0 [ 353.684375][ T7237] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 353.784367][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 353.801312][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 353.809820][ T7250] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.816978][ T7250] bridge0: port 1(bridge_slave_0) entered forwarding state [ 353.935702][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 353.971284][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 353.991273][ T7250] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.998403][ T7250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.081618][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 354.142919][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 354.158467][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 354.202251][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 354.256282][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 354.321928][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 354.371375][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 354.380590][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 354.439713][ T3001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 354.485123][ T7255] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 354.550778][ T7255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 354.614837][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 354.624113][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 354.694927][ T7250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 354.767069][ T7255] 8021q: adding VLAN 0 to HW filter on device batadv0 04:48:26 executing program 4: 04:48:26 executing program 0: 04:48:26 executing program 1: 04:48:27 executing program 5: r0 = open(&(0x7f00000002c0)='./bus\x00', 0x40000141041, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x323) creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) write$FUSE_POLL(r0, &(0x7f0000000540)={0xffffffffffffffc0, 0x0, 0x1}, 0x18) r3 = socket(0x10, 0x80002, 0x0) bind$netlink(r3, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(0xffffffffffffffff, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r3, &(0x7f00000014c0)=@proc, 0xc) sendto(0xffffffffffffffff, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8fff) 04:48:27 executing program 2: 04:48:27 executing program 3: 04:48:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) fsetxattr$system_posix_acl(r2, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 04:48:27 executing program 0: setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\xa4h\x04\x00', 0x1}) r2 = socket$nl_route(0x10, 0x3, 0x0) clock_nanosleep(0x7, 0x3, &(0x7f00000002c0), &(0x7f0000000300)) pread64(r1, &(0x7f0000000200)=""/39, 0xfdef, 0xc00000000000000) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe5d, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2800000010005fba000000004000000000000000", @ANYRES32=0x0, @ANYBLOB="030000000000000008001b0000000000"], 0x28}}, 0x0) dup2(r0, r1) 04:48:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x70d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'brid\x04e\x00'}, {0x4}}}]}, 0x34}}, 0x0) [ 355.991465][ T25] kauditd_printk_skb: 3 callbacks suppressed [ 355.991494][ T25] audit: type=1804 audit(1572756507.871:31): pid=7485 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir860836380/syzkaller.rNpEFM/1/bus" dev="sda1" ino=16534 res=1 04:48:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001700)="230000005e0081aee4050c00000f0000d4ab8cf45c886c49d636454e09008bc609f6d8", 0x23}], 0x1}, 0x0) r1 = socket$kcm(0x2b, 0x200000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(r0, &(0x7f000000c0c0)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 356.110685][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 356.116518][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:48:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) fsetxattr$security_evm(r0, &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="027c72e38e681e55d676d8abc106300127b0779a8a"], 0x15, 0x2) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f00009ff000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmsg$rds(r2, &(0x7f0000002940)={0x0, 0x0, &(0x7f0000002800)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1}, 0x0) recvfrom(r2, 0x0, 0x0, 0x3, 0x0, 0x0) [ 356.210443][ T25] audit: type=1804 audit(1572756508.081:32): pid=7485 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir860836380/syzkaller.rNpEFM/1/bus" dev="sda1" ino=16534 res=1 04:48:28 executing program 2: memfd_create(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) dup(0xffffffffffffffff) socket$vsock_dgram(0x28, 0x2, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r7, 0x800442d4, &(0x7f0000000100)=0xcb) r8 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$UI_SET_RELBIT(r8, 0x40045566, 0xa) sendmmsg(r4, &(0x7f0000006d00), 0x400034b, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000009536808d8341175a04000000af908fd10b64da650c6f04f465d644a9e92361ce20181ffe923bb70000000000000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) [ 356.350456][ T7507] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 04:48:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file0\x00') execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000200)='ppp1$\x00', &(0x7f0000000240)='ppp0nodev\x00', &(0x7f0000000280)='hugetlbfs\x00', &(0x7f00000002c0)='hugetlbfs\x00'], &(0x7f0000000540)=[&(0x7f0000000340)='hugetlbfs\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='md5sum)\x00', &(0x7f0000000400)='hugetlbfs\x00', &(0x7f0000000440)='+\x00', &(0x7f0000000480)='hugetlbfs\x00', &(0x7f00000004c0)='hugetlbfs\x00', &(0x7f0000000500)='\x00']) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000640)={@ethernet={0x1, @broadcast}, {&(0x7f0000000580)=""/102, 0x66}, &(0x7f0000000600), 0x14}, 0xa0) acct(&(0x7f0000000180)='./file0\x00') [ 356.446015][ T7497] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 356.454173][ T7497] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 356.520740][ T7497] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 356.670661][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 356.676492][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:48:28 executing program 1: r0 = socket(0x10, 0x3, 0x0) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040)=0xfffffffffffffff8, 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x1, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @loopback}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0x4a6) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) write$FUSE_DIRENTPLUS(r4, &(0x7f00000006c0)=ANY=[@ANYBLOB="d00300000000000005000000000000000500000000000000000000000000000000000000000000000000000000000000050000000010000000000000000000005e02000000000000090000000000000001000000010000000100008000000000ff07000000000000010000000400000000000100ffffff7f00000000", @ANYRES32=0x0, @ANYRES32=r5, @ANYBLOB="0000000001000000000000000100000000000000e604000000000000100000000100000076657468315f746f5f62726964676500000000000000000002000000000000000000000000000000ff0700000000000000000000000000000000000000000000010000000000000000000000000000000800000000000000000000000000000000000000000000000000000094000000020000000004000005000000", @ANYRES32=r6, @ANYRES32=0x0, @ANYBLOB="ff03000002000000000000000000000000000000070000000000000000000000ff000000000000000000000000000000000000000900000000000000000000000000000096010000cf00000003000000000000000300000000000000000000000000000000000000000000000080000000000000ff0000000000000000000000060000000100000000000000ff030000", @ANYRES32=r8, @ANYRES32=0x0, @ANYBLOB="00000000050000000000000000000000000000001f0000000000000004000000010000006574683100000000787e6c4f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000007f0000000000000002000000000000006b2800000000000001000000010000002600000000000000000000002bba00003f000000ff01000006000000", @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="8300000005000000000000000000000000000000000000000000000000000000000800000100000000000000030000000000000003000000000000000000000000000000010001000000000006000000000000002a440000000000000000000000000000030000000000000009000000000000000104000000000000790b000000000000050000000000000081000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="020000000000000000000000000000000000000000fcffffffffffff08000000000000002f6c6f6e6f646576000000000000000002000000000000000000000000000000000000000000000003000000000000000500000000000000060000000000000000300000000000000400000000000000000000000000000006000000000000000900000000000000000000000400000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ffffffff00000000000000000500000000000000ff070000000000ff010000000500000076657468315f746f5f62726964676500"], 0x3d0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x323000, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@debug={'debug', 0x3d, 0x1}}, {@uname={'uname', 0x3d, 'veth1\x00'}}, {@version_9p2000='version=9p2000'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@fscache='fscache'}, {@access_uid={'access', 0x3d, r8}}], [{@euid_eq={'euid'}}, {@seclabel='seclabel'}, {@smackfshat={'smackfshat', 0x3d, 'veth1\x00'}}, {@subj_type={'subj_type', 0x3d, 'veth1\x00'}}, {@uid_eq={'uid', 0x3d, r11}}]}}) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) ioctl$SIOCAX25DELFWD(0xffffffffffffffff, 0x89eb, &(0x7f0000000600)={@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000240)=0x1, 0x4) sendto$inet(r1, &(0x7f0000000080)=';', 0x1, 0x0, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000040), 0xfd1b, 0x4004800, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 356.919248][ T7497] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 04:48:28 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000000c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000040)={0x3, 0x2, 0xffff, 0x465eb87c, 0x8000, 0x401}) ioctl$CAPI_NCCI_GETUNIT(r1, 0x80044327, &(0x7f0000000000)=0x6) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 04:48:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='hugetlbfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) link(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='./file0\x00') execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000200)='ppp1$\x00', &(0x7f0000000240)='ppp0nodev\x00', &(0x7f0000000280)='hugetlbfs\x00', &(0x7f00000002c0)='hugetlbfs\x00'], &(0x7f0000000540)=[&(0x7f0000000340)='hugetlbfs\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='md5sum)\x00', &(0x7f0000000400)='hugetlbfs\x00', &(0x7f0000000440)='+\x00', &(0x7f0000000480)='hugetlbfs\x00', &(0x7f00000004c0)='hugetlbfs\x00', &(0x7f0000000500)='\x00']) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000640)={@ethernet={0x1, @broadcast}, {&(0x7f0000000580)=""/102, 0x66}, &(0x7f0000000600), 0x14}, 0xa0) acct(&(0x7f0000000180)='./file0\x00') 04:48:29 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) fstat(r2, &(0x7f00000009c0)) socket$inet_udplite(0x2, 0x2, 0x88) ioprio_get$uid(0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x6400, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x10, 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="3a258211f663a7724bdef645000014b7b0f781d1d3abf9d1a51c4bfce1e77551a8bd6786261808300200000040847bc2fdffe8cd918b0350412915d8a5c51817c3ff01a1f62ac71e85445d8f244f6be879ffffffffff8756ea7d486588272169d8b90f1d7106f5776f6294ee47382b88117e669c6e3203053a6a05995f5ed199fcf8722b005fa42c030601d48e7081160000a2793d1429196b4d9182f7c46359a074285b251aca195af3b288c605c0c47cc79d749fbd68abe8f0d453677c7e7f95c7d750042390a546375c8c1f1726a24583e1f8066319e93802eda50f3fb22ab8d6dc3d2afd102b71b6c5c2f2c915b6c3fc452f0b29e70402"], 0xf9) r3 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x7, 0xffffffffffffffff, 0x1) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') [ 357.151559][ T7497] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 04:48:29 executing program 2: memfd_create(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) dup(0xffffffffffffffff) socket$vsock_dgram(0x28, 0x2, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r7, 0x800442d4, &(0x7f0000000100)=0xcb) r8 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$UI_SET_RELBIT(r8, 0x40045566, 0xa) sendmmsg(r4, &(0x7f0000006d00), 0x400034b, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000009536808d8341175a04000000af908fd10b64da650c6f04f465d644a9e92361ce20181ffe923bb70000000000000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) [ 357.359006][ T25] audit: type=1804 audit(1572756509.231:33): pid=7530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir238528986/syzkaller.JLusvH/3/memory.events" dev="sda1" ino=16539 res=1 04:48:29 executing program 0: memfd_create(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) dup(0xffffffffffffffff) socket$vsock_dgram(0x28, 0x2, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r7, 0x800442d4, &(0x7f0000000100)=0xcb) r8 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$UI_SET_RELBIT(r8, 0x40045566, 0xa) sendmmsg(r4, &(0x7f0000006d00), 0x400034b, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r9 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000009536808d8341175a04000000af908fd10b64da650c6f04f465d644a9e92361ce20181ffe923bb70000000000000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) 04:48:29 executing program 1: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfea4) fallocate(r0, 0x11, 0x7ffd, 0x8000) fallocate(r0, 0x3, 0x0, 0xfff9) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x64) ioctl$SIOCX25SCALLUSERDATA(r0, 0x89e5, &(0x7f00000001c0)={0x51, "0d36305954ab2192256402a40dc2a8e8138d17acb5f40d3afdd912d82296cdb7c1c4aba92bd64be4bf63dd0506046f1fa629679d6705e57d8495eceec8087e4f2eb043914adec23302c7813ffdd3111de6cea2d9c0403049a6be4ef228139b1f06e1f09b09beba2a1a3cca1892c270f350a5a09e8eb793fc79f352bfd690183f"}) timer_create(0x0, 0x0, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r2, 0x40086607, 0x717000) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000140)) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0305710, &(0x7f0000000300)={0x1, 0x7, 0x4, 0x1ff}) r3 = syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x4, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x2, 0x9, 0x1, 0x0, 0x8, 0x4, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x7, 0x9}, 0x0, 0x0, 0x9, 0x7, 0x0, 0xd, 0x2}, r3, 0x8, r3, 0x8) recvfrom$rxrpc(r3, &(0x7f0000000380)=""/134, 0x86, 0x40000004, &(0x7f0000000440)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e21, 0x8, @empty}}, 0x24) fcntl$setstatus(r1, 0x4, 0x42000) r4 = creat(&(0x7f0000000080)='./file1\x00', 0x0) write$cgroup_type(r4, &(0x7f0000000040)='threaded\x00', 0xfea4) fallocate(r4, 0x11, 0x7ffd, 0x8000) fallocate(r4, 0x3, 0x0, 0xfff9) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000480)='/dev/snapshot\x00', 0x200000, 0x0) syz_open_dev$media(&(0x7f00000002c0)='/dev/media#\x00', 0x4, 0x0) r6 = syz_open_dev$dmmidi(&(0x7f0000000500)='/dev/dmmidi#\x00', 0x0, 0x20400) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={0x0, r6, 0x13, 0x1}, 0xfffffffffffffdfd) accept4$ax25(r4, &(0x7f0000000140)={{0x3, @null}, [@rose, @default, @netrom, @netrom, @netrom, @remote, @remote, @default]}, &(0x7f0000000000)=0x48, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x8040ae9f, &(0x7f0000000340)) stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000280)) [ 357.558689][ T7547] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 357.606709][ T7547] FAT-fs (loop3): Filesystem has been set read-only [ 357.640863][ T7547] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 357.717946][ T25] audit: type=1804 audit(1572756509.591:34): pid=7530 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir238528986/syzkaller.JLusvH/3/memory.events" dev="sda1" ino=16539 res=1 04:48:29 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) r2 = socket(0x2, 0x803, 0xff) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc014563b, &(0x7f0000000140)={0x1, {0x5, 0x7fffffff, 0x10001, 0x100}}) dup(r2) open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x26000, 0x0, 0x7f, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f00000002c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x1) socket$rxrpc(0x21, 0x2, 0xa) r4 = syz_open_dev$sg(&(0x7f00000003c0)='/dev/sg#\x00', 0x0, 0x5) ioctl$SG_IO(r4, 0x2285, 0x0) writev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)="aefdda9d246800005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d766a83cf89441cb69d952f41bdd2ac8bb8c43b460", 0x34}, {&(0x7f0000000100)="aa1d484e24002000a84d4583671e120755272bb736be94d9fc56c9953fbd80630600097704a71e023a27", 0x2a}], 0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff}) splice(r5, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, 0x0, 0x0) stat(0x0, 0x0) chown(&(0x7f0000000280)='./file0/file0/../file0\x00', r7, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x808000, 0x0) ioctl$KVM_ENABLE_CAP(r8, 0x4068aea3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/full\x00', 0x2, 0x0) [ 358.117326][ T7573] ================================================================== [ 358.125898][ T7573] BUG: KCSAN: data-race in icmp_global_allow / icmp_global_allow [ 358.133591][ T7573] [ 358.135910][ T7573] read to 0xffffffff861a8014 of 4 bytes by task 7565 on cpu 1: [ 358.143443][ T7573] icmp_global_allow+0x36/0x1b0 [ 358.148283][ T7573] icmp6_send+0x493/0x1140 [ 358.152683][ T7573] icmpv6_send+0x71/0xb0 [ 358.156909][ T7573] ip6_link_failure+0x43/0x180 [ 358.161657][ T7573] vti6_tnl_xmit+0x9dc/0xe30 [ 358.166259][ T7573] dev_hard_start_xmit+0xef/0x430 [ 358.171279][ T7573] __dev_queue_xmit+0x14c9/0x1b60 [ 358.176285][ T7573] dev_queue_xmit+0x21/0x30 [ 358.180774][ T7573] neigh_direct_output+0x1f/0x30 [ 358.185695][ T7573] ip6_finish_output2+0x7a6/0xec0 [ 358.190706][ T7573] __ip6_finish_output+0x2d7/0x330 [ 358.195809][ T7573] ip6_finish_output+0x41/0x160 [ 358.200645][ T7573] ip6_output+0xf2/0x280 [ 358.204870][ T7573] ip6_local_out+0x74/0x90 [ 358.209261][ T7573] [ 358.211577][ T7573] write to 0xffffffff861a8014 of 4 bytes by task 7573 on cpu 0: [ 358.219190][ T7573] icmp_global_allow+0x174/0x1b0 [ 358.224115][ T7573] icmp6_send+0x493/0x1140 [ 358.228519][ T7573] icmpv6_send+0x71/0xb0 [ 358.232746][ T7573] ip6_link_failure+0x43/0x180 [ 358.237492][ T7573] vti6_tnl_xmit+0x9dc/0xe30 [ 358.242067][ T7573] dev_hard_start_xmit+0xef/0x430 [ 358.247073][ T7573] __dev_queue_xmit+0x14c9/0x1b60 [ 358.252082][ T7573] dev_queue_xmit+0x21/0x30 [ 358.256565][ T7573] neigh_direct_output+0x1f/0x30 [ 358.261488][ T7573] ip6_finish_output2+0x7a6/0xec0 [ 358.266496][ T7573] __ip6_finish_output+0x2d7/0x330 [ 358.271588][ T7573] ip6_finish_output+0x41/0x160 [ 358.276422][ T7573] ip6_output+0xf2/0x280 [ 358.280651][ T7573] [ 358.282963][ T7573] Reported by Kernel Concurrency Sanitizer on: [ 358.289108][ T7573] CPU: 0 PID: 7573 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 358.296894][ T7573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.306930][ T7573] ================================================================== [ 358.317762][ T7573] Kernel panic - not syncing: panic_on_warn set ... [ 358.324334][ T7573] CPU: 0 PID: 7573 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 358.332114][ T7573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.342148][ T7573] Call Trace: [ 358.345428][ T7573] dump_stack+0xf5/0x159 [ 358.349660][ T7573] panic+0x210/0x640 [ 358.353551][ T7573] ? neigh_direct_output+0x1f/0x30 [ 358.358654][ T7573] ? vprintk_func+0x8d/0x140 [ 358.363237][ T7573] kcsan_report.cold+0xc/0x10 [ 358.367901][ T7573] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 358.373432][ T7573] __tsan_write4+0x32/0x40 [ 358.377837][ T7573] icmp_global_allow+0x174/0x1b0 [ 358.382763][ T7573] icmp6_send+0x493/0x1140 [ 358.387164][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.392786][ T7573] ? __bpf_offload_dev_match.isra.0+0x5d0/0x640 [ 358.399016][ T7573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 358.405271][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.410892][ T7573] ? debug_smp_processor_id+0x4c/0x172 [ 358.416339][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.421957][ T7573] ? __tsan_read8+0x2c/0x30 [ 358.426447][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.432068][ T7573] ? icmpv6_push_pending_frames+0x220/0x220 [ 358.437948][ T7573] icmpv6_send+0x71/0xb0 [ 358.442191][ T7573] ? icmpv6_send+0x71/0xb0 [ 358.446599][ T7573] ? icmpv6_push_pending_frames+0x220/0x220 [ 358.452491][ T7573] ip6_link_failure+0x43/0x180 [ 358.457257][ T7573] ? fib6_nh_del_cached_rt+0x80/0x80 [ 358.464628][ T7573] vti6_tnl_xmit+0x9dc/0xe30 [ 358.469221][ T7573] dev_hard_start_xmit+0xef/0x430 [ 358.474255][ T7573] __dev_queue_xmit+0x14c9/0x1b60 [ 358.479266][ T7573] ? __tsan_read8+0x2c/0x30 [ 358.485164][ T7573] ? _raw_spin_unlock_irq+0x68/0x80 [ 358.490354][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.495974][ T7573] dev_queue_xmit+0x21/0x30 [ 358.500462][ T7573] neigh_direct_output+0x1f/0x30 [ 358.505476][ T7573] ip6_finish_output2+0x7a6/0xec0 [ 358.510487][ T7573] ? __rcu_read_unlock+0x66/0x3c0 [ 358.515499][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.521116][ T7573] ? __tsan_read8+0x2c/0x30 [ 358.525607][ T7573] __ip6_finish_output+0x2d7/0x330 [ 358.530707][ T7573] ip6_finish_output+0x41/0x160 [ 358.535546][ T7573] ip6_output+0xf2/0x280 [ 358.539777][ T7573] ? __ip6_finish_output+0x330/0x330 [ 358.545062][ T7573] ip6_local_out+0x74/0x90 [ 358.549470][ T7573] ip6_send_skb+0x53/0x110 [ 358.553873][ T7573] udp_v6_send_skb.isra.0+0x3ec/0xa70 [ 358.559248][ T7573] udpv6_sendmsg+0x1906/0x1c20 [ 358.563997][ T7573] ? ip_reply_glue_bits+0xb0/0xb0 [ 358.569011][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.574627][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.580246][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.585864][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.592279][ T7573] inet6_sendmsg+0x6d/0x90 [ 358.596681][ T7573] ? inet6_sendmsg+0x6d/0x90 [ 358.601261][ T7573] ? inet6_ioctl+0x140/0x140 [ 358.605838][ T7573] sock_sendmsg+0x9f/0xc0 [ 358.610160][ T7573] ___sys_sendmsg+0x2b7/0x5d0 [ 358.614840][ T7573] ? __rcu_read_unlock+0x66/0x3c0 [ 358.619850][ T7573] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 358.625726][ T7573] ? __fget+0xb8/0x1d0 [ 358.629782][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.635398][ T7573] ? __fget_light+0xaf/0x190 [ 358.639976][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.645605][ T7573] ? __tsan_write4+0x32/0x40 [ 358.650192][ T7573] __sys_sendmmsg+0x123/0x350 [ 358.654870][ T7573] ? __tsan_read8+0x2c/0x30 [ 358.659369][ T7573] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 358.665074][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.670718][ T7573] ? _copy_to_user+0x84/0xb0 [ 358.675307][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.680922][ T7573] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 358.686546][ T7573] __x64_sys_sendmmsg+0x64/0x80 [ 358.691384][ T7573] do_syscall_64+0xcc/0x370 [ 358.695875][ T7573] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 358.701769][ T7573] RIP: 0033:0x459f49 [ 358.705653][ T7573] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 358.725241][ T7573] RSP: 002b:00007f9e958ecc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 358.733640][ T7573] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459f49 [ 358.741595][ T7573] RDX: 000000000400034b RSI: 0000000020006d00 RDI: 0000000000000008 [ 358.749554][ T7573] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 358.758465][ T7573] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9e958ed6d4 [ 358.766441][ T7573] R13: 00000000004c7c85 R14: 00000000004de080 R15: 00000000ffffffff [ 358.775942][ T7573] Kernel Offset: disabled [ 358.780271][ T7573] Rebooting in 86400 seconds..