[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c. [ 35.960893][ T23] audit: type=1800 audit(1572816753.059:25): pid=7104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 35.988413][ T23] audit: type=1800 audit(1572816753.069:26): pid=7104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 36.032801][ T23] audit: type=1800 audit(1572816753.069:27): pid=7104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.67' (ECDSA) to the list of known hosts. 2019/11/03 21:32:43 fuzzer started 2019/11/03 21:32:45 dialing manager at 10.128.0.105:42255 2019/11/03 21:32:45 syscalls: 2553 2019/11/03 21:32:45 code coverage: enabled 2019/11/03 21:32:45 comparison tracing: enabled 2019/11/03 21:32:45 extra coverage: extra coverage is not supported by the kernel 2019/11/03 21:32:45 setuid sandbox: enabled 2019/11/03 21:32:45 namespace sandbox: enabled 2019/11/03 21:32:45 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/03 21:32:45 fault injection: enabled 2019/11/03 21:32:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/03 21:32:45 net packet injection: enabled 2019/11/03 21:32:45 net device setup: enabled 2019/11/03 21:32:45 concurrency sanitizer: enabled 2019/11/03 21:32:45 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/11/03 21:32:48 adding functions to KCSAN blacklist: 'generic_permission' 'audit_log_start' 'find_next_bit' 'pid_update_inode' 'ktime_get_real_seconds' '__tcp_select_window' '__hrtimer_run_queues' 'tomoyo_supervisor' '__splice_from_pipe' 'blk_mq_get_request' 'tcp_poll' 'get_wchan' 'ext4_free_inode' 'tcp_add_backlog' 'generic_write_end' 21:32:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) syzkaller login: [ 54.335819][ T7274] IPVS: ftp: loaded support on port[0] = 21 21:32:51 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000af0000a1f00000b002808000800144004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 54.430914][ T7274] chnl_net:caif_netlink_parms(): no params data found [ 54.494426][ T7274] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.501573][ T7274] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.510275][ T7274] device bridge_slave_0 entered promiscuous mode [ 54.519323][ T7274] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.527001][ T7274] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.536319][ T7274] device bridge_slave_1 entered promiscuous mode [ 54.557651][ T7274] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.569376][ T7274] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.595216][ T7274] team0: Port device team_slave_0 added [ 54.602272][ T7274] team0: Port device team_slave_1 added [ 54.686295][ T7274] device hsr_slave_0 entered promiscuous mode 21:32:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000740)=0x100, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) [ 54.764658][ T7274] device hsr_slave_1 entered promiscuous mode [ 54.850777][ T7277] IPVS: ftp: loaded support on port[0] = 21 [ 54.894038][ T7274] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.901202][ T7274] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.908625][ T7274] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.915729][ T7274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.225365][ T7274] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.259244][ T7302] IPVS: ftp: loaded support on port[0] = 21 [ 55.307925][ T7277] chnl_net:caif_netlink_parms(): no params data found [ 55.369344][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.402876][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.442755][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.475700][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 21:32:52 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000), 0x4) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000), 0x4) [ 55.543831][ T7274] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.583529][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.623041][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.630154][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.709404][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.744876][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.784523][ T3007] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.791613][ T3007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.833334][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.854717][ T7277] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.861786][ T7277] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.903537][ T7277] device bridge_slave_0 entered promiscuous mode [ 55.933496][ T7277] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.940563][ T7277] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.983447][ T7277] device bridge_slave_1 entered promiscuous mode [ 56.024215][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.063730][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 56.103402][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 56.144391][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 56.176402][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 56.205459][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 56.233815][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 56.263150][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.294673][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.323495][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.356559][ T7277] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.383264][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.398643][ T7307] IPVS: ftp: loaded support on port[0] = 21 [ 56.417900][ T7277] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 56.503542][ T7277] team0: Port device team_slave_0 added [ 56.510660][ T7277] team0: Port device team_slave_1 added 21:32:53 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x38, 0x0) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = getpgrp(0x0) r1 = getpgrp(0xffffffffffffffff) kcmp(r0, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) [ 56.609697][ T2607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 56.652687][ T2607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 56.667650][ T7274] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.787371][ T7277] device hsr_slave_0 entered promiscuous mode [ 56.852880][ T7277] device hsr_slave_1 entered promiscuous mode [ 56.883819][ T7277] debugfs: Directory 'hsr0' with parent '/' already present! [ 56.980562][ T7302] chnl_net:caif_netlink_parms(): no params data found [ 57.016369][ T7307] chnl_net:caif_netlink_parms(): no params data found [ 57.221275][ T7302] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.242192][ T7302] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.257828][ T7302] device bridge_slave_0 entered promiscuous mode [ 57.273206][ T7277] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.301887][ T7302] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.335592][ T7302] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.361054][ T7302] device bridge_slave_1 entered promiscuous mode [ 57.388867][ T7307] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.399694][ T7307] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.422616][ T7307] device bridge_slave_0 entered promiscuous mode [ 57.457841][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.468628][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.502908][ T7277] 8021q: adding VLAN 0 to HW filter on device team0 [ 57.528858][ T7341] device nr0 entered promiscuous mode [ 57.543920][ T7307] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.555662][ T7307] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.578301][ T7307] device bridge_slave_1 entered promiscuous mode [ 57.941114][ T7302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.994353][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.014310][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.056006][ T3007] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.063120][ T3007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.140499][ T7302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.216050][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 58.233689][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.281215][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.317455][ T7304] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.324585][ T7304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.363259][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 58.401837][ T7307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.440505][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 58.453581][ T7351] IPVS: ftp: loaded support on port[0] = 21 [ 58.460260][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.500654][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.539916][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.568849][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.613989][ T7307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.649487][ T7302] team0: Port device team_slave_0 added [ 58.682008][ T7277] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 58.732647][ T7277] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 58.756581][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.784521][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 58.823227][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.832279][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 21:32:56 executing program 5: openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000115000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000048c000/0x1000)=nil) syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c) listen(r0, 0x400000001ffffffd) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0) [ 58.883244][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.901666][ T7307] team0: Port device team_slave_0 added [ 58.935976][ T7302] team0: Port device team_slave_1 added [ 58.961403][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 58.984630][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 58.992139][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 59.024116][ T7307] team0: Port device team_slave_1 added [ 59.078179][ T7277] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 59.185826][ T7302] device hsr_slave_0 entered promiscuous mode [ 59.212858][ T7302] device hsr_slave_1 entered promiscuous mode 21:32:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 59.252493][ T7302] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.286206][ T7307] device hsr_slave_0 entered promiscuous mode [ 59.362898][ T7307] device hsr_slave_1 entered promiscuous mode [ 59.382595][ T7307] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.411346][ T7360] IPVS: ftp: loaded support on port[0] = 21 [ 59.586311][ T7362] device nr0 entered promiscuous mode [ 60.265258][ T7351] chnl_net:caif_netlink_parms(): no params data found 21:32:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 60.599273][ T7417] netlink: 'syz-executor.1': attribute type 20 has an invalid length. [ 60.666680][ T7302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.724930][ T7351] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.732016][ T7351] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.794961][ T7351] device bridge_slave_0 entered promiscuous mode [ 60.842422][ T7351] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.884694][ T7351] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.936506][ T7351] device bridge_slave_1 entered promiscuous mode [ 60.981686][ T7417] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 61.383299][ T7423] device nr0 entered promiscuous mode [ 61.414135][ T7427] netlink: 'syz-executor.1': attribute type 20 has an invalid length. [ 61.435281][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 61.448925][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 61.488753][ T7302] 8021q: adding VLAN 0 to HW filter on device team0 [ 61.886173][ T7427] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 61.967221][ T7351] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.016351][ T7307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.046597][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.066748][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.125369][ T3007] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.132497][ T3007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.201177][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.235464][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.263307][ T3007] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.270399][ T3007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.323256][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.353201][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.395906][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.413564][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.437121][ T7351] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.476882][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 62.493327][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.501779][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.523913][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.543411][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.551364][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.580877][ T7302] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 62.614070][ T7302] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 62.644837][ T7307] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.671970][ T7360] chnl_net:caif_netlink_parms(): no params data found [ 62.697816][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.707157][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.725937][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 21:32:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) [ 62.743484][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 62.766549][ T7351] team0: Port device team_slave_0 added [ 62.783538][ T7351] team0: Port device team_slave_1 added [ 62.911914][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 62.964317][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 62.971843][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 63.105615][ T7302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.138717][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.163292][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.171827][ T7304] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.178920][ T7304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.288119][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.318025][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.343180][ T7304] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.350262][ T7304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.403269][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.469286][ T7439] device nr0 entered promiscuous mode [ 63.515633][ T7351] device hsr_slave_0 entered promiscuous mode [ 63.567393][ T7351] device hsr_slave_1 entered promiscuous mode [ 63.637668][ T7351] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.666402][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.683431][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.733228][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.773246][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.813638][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.858372][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.918731][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 63.943638][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 63.979059][ T7360] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.993430][ T7360] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.013939][ T7360] device bridge_slave_0 entered promiscuous mode 21:33:01 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000af0000a1f00000b002808000800144004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 64.139096][ T7307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 64.151262][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 64.163324][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.172154][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.180951][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.190003][ T7360] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.199288][ T7360] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.210532][ T7360] device bridge_slave_1 entered promiscuous mode [ 64.234814][ T7462] netlink: 'syz-executor.1': attribute type 20 has an invalid length. [ 64.259427][ T7462] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 64.383710][ T7360] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 21:33:01 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000af0000a1f00000b002808000800144004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 64.435005][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 64.452619][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 64.463273][ T7307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.495733][ T7360] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 21:33:01 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000af0000a1f00000b002808000800144004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 64.654927][ T7351] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.690532][ T7360] team0: Port device team_slave_0 added [ 64.758878][ T7360] team0: Port device team_slave_1 added [ 64.778244][ T7351] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.827914][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.840362][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.895667][ T7498] netlink: 'syz-executor.1': attribute type 20 has an invalid length. [ 64.989019][ T7499] netlink: 'syz-executor.0': attribute type 20 has an invalid length. [ 65.026357][ T7498] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 65.052409][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.093396][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.102104][ T7304] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.109244][ T7304] bridge0: port 1(bridge_slave_0) entered forwarding state 21:33:02 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000af0000a1f00000b002808000800144004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 65.211804][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.247801][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.296133][ T7304] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.303259][ T7304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.369414][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.401729][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.447422][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.484199][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.533807][ T7499] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 21:33:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000740)=0x100, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) [ 65.921982][ T7360] device hsr_slave_0 entered promiscuous mode [ 65.982900][ T7360] device hsr_slave_1 entered promiscuous mode [ 66.032505][ T7360] debugfs: Directory 'hsr0' with parent '/' already present! [ 66.046590][ T7504] netlink: 'syz-executor.1': attribute type 20 has an invalid length. [ 66.096128][ T7351] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 66.127278][ T7351] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 66.221013][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.239302][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 21:33:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000), 0x4) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000), 0x4) [ 66.282143][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.320337][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.370902][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.425755][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.468556][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.528898][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.572486][ T7504] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 66.593752][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:33:03 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000), 0x4) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000), 0x4) [ 66.736959][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.779401][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.844427][ T7351] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.008653][ T7527] ================================================================== [ 67.016787][ T7527] BUG: KCSAN: data-race in vm_area_dup / vma_interval_tree_remove [ 67.024594][ T7527] [ 67.026945][ T7527] read to 0xffff88812218ee10 of 200 bytes by task 7528 on cpu 1: [ 67.034665][ T7527] vm_area_dup+0x70/0xf0 [ 67.038896][ T7527] dup_mm+0x330/0xba0 [ 67.042872][ T7527] copy_process+0x36f3/0x3b50 [ 67.047557][ T7527] _do_fork+0xfe/0x6e0 [ 67.051630][ T7527] __x64_sys_clone+0x12b/0x160 [ 67.056395][ T7527] do_syscall_64+0xcc/0x370 [ 67.060894][ T7527] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 67.066775][ T7527] [ 67.069140][ T7527] write to 0xffff88812218ee80 of 8 bytes by task 7527 on cpu 0: [ 67.076781][ T7527] vma_interval_tree_remove+0x49c/0x8a0 [ 67.082344][ T7527] __vma_adjust+0x278/0x12a0 [ 67.086926][ T7527] __split_vma+0x208/0x350 [ 67.091348][ T7527] __do_munmap+0x233/0xb60 [ 67.095766][ T7527] __vm_munmap+0xb2/0x130 [ 67.100099][ T7527] vm_munmap+0x29/0x40 [ 67.104167][ T7527] elf_map+0x1f6/0x200 [ 67.108232][ T7527] load_elf_binary+0x1570/0x2ec0 [ 67.113178][ T7527] search_binary_handler+0x127/0x420 [ 67.118469][ T7527] __do_execve_file.isra.0+0xb76/0x11d0 [ 67.124037][ T7527] __x64_sys_execve+0x62/0x80 [ 67.128985][ T7527] do_syscall_64+0xcc/0x370 [ 67.133480][ T7527] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 67.139370][ T7527] [ 67.141689][ T7527] Reported by Kernel Concurrency Sanitizer on: [ 67.147841][ T7527] CPU: 0 PID: 7527 Comm: grep Not tainted 5.4.0-rc3+ #0 [ 67.154774][ T7527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.164819][ T7527] ================================================================== [ 67.172874][ T7527] Kernel panic - not syncing: panic_on_warn set ... [ 67.179459][ T7527] CPU: 0 PID: 7527 Comm: grep Not tainted 5.4.0-rc3+ #0 [ 67.186386][ T7527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 67.196574][ T7527] Call Trace: [ 67.199876][ T7527] dump_stack+0xf5/0x159 [ 67.204123][ T7527] panic+0x210/0x640 [ 67.208023][ T7527] ? search_binary_handler+0x127/0x420 [ 67.213475][ T7527] ? vprintk_func+0x8d/0x140 [ 67.218064][ T7527] kcsan_report.cold+0xc/0x10 [ 67.222742][ T7527] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 67.228312][ T7527] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 67.233949][ T7527] __tsan_write8+0x32/0x40 [ 67.238390][ T7527] vma_interval_tree_remove+0x49c/0x8a0 [ 67.243932][ T7527] ? vma_interval_tree_insert+0x19b/0x230 [ 67.249697][ T7527] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 67.255331][ T7527] __vma_adjust+0x278/0x12a0 [ 67.259924][ T7527] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 67.265556][ T7527] __split_vma+0x208/0x350 [ 67.269962][ T7527] __do_munmap+0x233/0xb60 [ 67.274378][ T7527] __vm_munmap+0xb2/0x130 [ 67.278707][ T7527] vm_munmap+0x29/0x40 [ 67.282798][ T7527] elf_map+0x1f6/0x200 [ 67.286861][ T7527] load_elf_binary+0x1570/0x2ec0 [ 67.291818][ T7527] search_binary_handler+0x127/0x420 [ 67.297105][ T7527] __do_execve_file.isra.0+0xb76/0x11d0 [ 67.302682][ T7527] __x64_sys_execve+0x62/0x80 [ 67.307354][ T7527] do_syscall_64+0xcc/0x370 [ 67.311996][ T7527] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 67.317880][ T7527] RIP: 0033:0x7fd0a65db207 [ 67.322294][ T7527] Code: Bad RIP value. [ 67.326350][ T7527] RSP: 002b:00007ffdffc34bc8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b [ 67.334851][ T7527] RAX: ffffffffffffffda RBX: 000000000208e650 RCX: 00007fd0a65db207 [ 67.342848][ T7527] RDX: 000000000208e678 RSI: 000000000208e650 RDI: 000000000208e6d8 [ 67.351781][ T7527] RBP: 000000000208e6d8 R08: 000000000061c428 R09: 00007fd0a6652800 [ 67.359751][ T7527] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000208e678 [ 67.367736][ T7527] R13: 000000000208e678 R14: 0000000000000000 R15: 0000000000000000 [ 67.377181][ T7527] Kernel Offset: disabled [ 67.381504][ T7527] Rebooting in 86400 seconds..