[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c.
[   35.960893][   T23] audit: type=1800 audit(1572816753.059:25): pid=7104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0
[   35.988413][   T23] audit: type=1800 audit(1572816753.069:26): pid=7104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0
[   36.032801][   T23] audit: type=1800 audit(1572816753.069:27): pid=7104 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0
[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

Warning: Permanently added '10.128.0.67' (ECDSA) to the list of known hosts.
2019/11/03 21:32:43 fuzzer started
2019/11/03 21:32:45 dialing manager at 10.128.0.105:42255
2019/11/03 21:32:45 syscalls: 2553
2019/11/03 21:32:45 code coverage: enabled
2019/11/03 21:32:45 comparison tracing: enabled
2019/11/03 21:32:45 extra coverage: extra coverage is not supported by the kernel
2019/11/03 21:32:45 setuid sandbox: enabled
2019/11/03 21:32:45 namespace sandbox: enabled
2019/11/03 21:32:45 Android sandbox: /sys/fs/selinux/policy does not exist
2019/11/03 21:32:45 fault injection: enabled
2019/11/03 21:32:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled
2019/11/03 21:32:45 net packet injection: enabled
2019/11/03 21:32:45 net device setup: enabled
2019/11/03 21:32:45 concurrency sanitizer: enabled
2019/11/03 21:32:45 devlink PCI setup: PCI device 0000:00:10.0 is not available
2019/11/03 21:32:48 adding functions to KCSAN blacklist: 'generic_permission' 'audit_log_start' 'find_next_bit' 'pid_update_inode' 'ktime_get_real_seconds' '__tcp_select_window' '__hrtimer_run_queues' 'tomoyo_supervisor' '__splice_from_pipe' 'blk_mq_get_request' 'tcp_poll' 'get_wchan' 'ext4_free_inode' 'tcp_add_backlog' 'generic_write_end' 
21:32:51 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0)
ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

syzkaller login: [   54.335819][ T7274] IPVS: ftp: loaded support on port[0] = 21
21:32:51 executing program 1:
r0 = socket$inet(0x10, 0x2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000af0000a1f00000b002808000800144004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0)

[   54.430914][ T7274] chnl_net:caif_netlink_parms(): no params data found
[   54.494426][ T7274] bridge0: port 1(bridge_slave_0) entered blocking state
[   54.501573][ T7274] bridge0: port 1(bridge_slave_0) entered disabled state
[   54.510275][ T7274] device bridge_slave_0 entered promiscuous mode
[   54.519323][ T7274] bridge0: port 2(bridge_slave_1) entered blocking state
[   54.527001][ T7274] bridge0: port 2(bridge_slave_1) entered disabled state
[   54.536319][ T7274] device bridge_slave_1 entered promiscuous mode
[   54.557651][ T7274] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   54.569376][ T7274] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   54.595216][ T7274] team0: Port device team_slave_0 added
[   54.602272][ T7274] team0: Port device team_slave_1 added
[   54.686295][ T7274] device hsr_slave_0 entered promiscuous mode
21:32:51 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000740)=0x100, 0x4)
bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10)
connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10)
sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0)
recvmmsg(r0, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0)

[   54.764658][ T7274] device hsr_slave_1 entered promiscuous mode
[   54.850777][ T7277] IPVS: ftp: loaded support on port[0] = 21
[   54.894038][ T7274] bridge0: port 2(bridge_slave_1) entered blocking state
[   54.901202][ T7274] bridge0: port 2(bridge_slave_1) entered forwarding state
[   54.908625][ T7274] bridge0: port 1(bridge_slave_0) entered blocking state
[   54.915729][ T7274] bridge0: port 1(bridge_slave_0) entered forwarding state
[   55.225365][ T7274] 8021q: adding VLAN 0 to HW filter on device bond0
[   55.259244][ T7302] IPVS: ftp: loaded support on port[0] = 21
[   55.307925][ T7277] chnl_net:caif_netlink_parms(): no params data found
[   55.369344][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   55.402876][   T43] bridge0: port 1(bridge_slave_0) entered disabled state
[   55.442755][   T43] bridge0: port 2(bridge_slave_1) entered disabled state
[   55.475700][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
21:32:52 executing program 3:
r0 = socket$inet6(0xa, 0x80003, 0xff)
setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000), 0x4)
setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000), 0x4)

[   55.543831][ T7274] 8021q: adding VLAN 0 to HW filter on device team0
[   55.583529][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   55.623041][   T43] bridge0: port 1(bridge_slave_0) entered blocking state
[   55.630154][   T43] bridge0: port 1(bridge_slave_0) entered forwarding state
[   55.709404][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   55.744876][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   55.784523][ T3007] bridge0: port 2(bridge_slave_1) entered blocking state
[   55.791613][ T3007] bridge0: port 2(bridge_slave_1) entered forwarding state
[   55.833334][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   55.854717][ T7277] bridge0: port 1(bridge_slave_0) entered blocking state
[   55.861786][ T7277] bridge0: port 1(bridge_slave_0) entered disabled state
[   55.903537][ T7277] device bridge_slave_0 entered promiscuous mode
[   55.933496][ T7277] bridge0: port 2(bridge_slave_1) entered blocking state
[   55.940563][ T7277] bridge0: port 2(bridge_slave_1) entered disabled state
[   55.983447][ T7277] device bridge_slave_1 entered promiscuous mode
[   56.024215][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   56.063730][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   56.103402][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   56.144391][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   56.176402][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   56.205459][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   56.233815][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   56.263150][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   56.294673][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   56.323495][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   56.356559][ T7277] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   56.383264][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   56.398643][ T7307] IPVS: ftp: loaded support on port[0] = 21
[   56.417900][ T7277] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   56.503542][ T7277] team0: Port device team_slave_0 added
[   56.510660][ T7277] team0: Port device team_slave_1 added
21:32:53 executing program 4:
clone(0x200, 0x0, 0x0, 0x0, 0x0)
mknod(&(0x7f0000000000)='./file0\x00', 0x38, 0x0)
execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0)
r0 = getpgrp(0x0)
r1 = getpgrp(0xffffffffffffffff)
kcmp(r0, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff)

[   56.609697][ T2607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   56.652687][ T2607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   56.667650][ T7274] 8021q: adding VLAN 0 to HW filter on device batadv0
[   56.787371][ T7277] device hsr_slave_0 entered promiscuous mode
[   56.852880][ T7277] device hsr_slave_1 entered promiscuous mode
[   56.883819][ T7277] debugfs: Directory 'hsr0' with parent '/' already present!
[   56.980562][ T7302] chnl_net:caif_netlink_parms(): no params data found
[   57.016369][ T7307] chnl_net:caif_netlink_parms(): no params data found
[   57.221275][ T7302] bridge0: port 1(bridge_slave_0) entered blocking state
[   57.242192][ T7302] bridge0: port 1(bridge_slave_0) entered disabled state
[   57.257828][ T7302] device bridge_slave_0 entered promiscuous mode
[   57.273206][ T7277] 8021q: adding VLAN 0 to HW filter on device bond0
[   57.301887][ T7302] bridge0: port 2(bridge_slave_1) entered blocking state
[   57.335592][ T7302] bridge0: port 2(bridge_slave_1) entered disabled state
[   57.361054][ T7302] device bridge_slave_1 entered promiscuous mode
[   57.388867][ T7307] bridge0: port 1(bridge_slave_0) entered blocking state
[   57.399694][ T7307] bridge0: port 1(bridge_slave_0) entered disabled state
[   57.422616][ T7307] device bridge_slave_0 entered promiscuous mode
[   57.457841][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   57.468628][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   57.502908][ T7277] 8021q: adding VLAN 0 to HW filter on device team0
[   57.528858][ T7341] device nr0 entered promiscuous mode
[   57.543920][ T7307] bridge0: port 2(bridge_slave_1) entered blocking state
[   57.555662][ T7307] bridge0: port 2(bridge_slave_1) entered disabled state
[   57.578301][ T7307] device bridge_slave_1 entered promiscuous mode
[   57.941114][ T7302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   57.994353][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   58.014310][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   58.056006][ T3007] bridge0: port 1(bridge_slave_0) entered blocking state
[   58.063120][ T3007] bridge0: port 1(bridge_slave_0) entered forwarding state
[   58.140499][ T7302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   58.216050][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   58.233689][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   58.281215][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   58.317455][ T7304] bridge0: port 2(bridge_slave_1) entered blocking state
[   58.324585][ T7304] bridge0: port 2(bridge_slave_1) entered forwarding state
[   58.363259][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   58.401837][ T7307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   58.440505][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   58.453581][ T7351] IPVS: ftp: loaded support on port[0] = 21
[   58.460260][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   58.500654][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   58.539916][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   58.568849][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   58.613989][ T7307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   58.649487][ T7302] team0: Port device team_slave_0 added
[   58.682008][ T7277] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[   58.732647][ T7277] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   58.756581][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   58.784521][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   58.823227][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   58.832279][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
21:32:56 executing program 5:
openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mremap(&(0x7f0000115000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000048c000/0x1000)=nil)
syz_open_dev$swradio(0x0, 0x1, 0x2)
r0 = socket$inet6(0xa, 0x40000080806, 0x0)
bind$inet6(r0, &(0x7f000047b000)={0xa, 0x404e20}, 0x1c)
listen(r0, 0x400000001ffffffd)
r1 = socket$inet6(0xa, 0x6, 0x0)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
r2 = accept4(r0, 0x0, 0x0, 0x0)
sendmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0}}], 0x4000000000000d0, 0x0)

[   58.883244][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   58.901666][ T7307] team0: Port device team_slave_0 added
[   58.935976][ T7302] team0: Port device team_slave_1 added
[   58.961403][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   58.984630][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   58.992139][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   59.024116][ T7307] team0: Port device team_slave_1 added
[   59.078179][ T7277] 8021q: adding VLAN 0 to HW filter on device batadv0
[   59.185826][ T7302] device hsr_slave_0 entered promiscuous mode
[   59.212858][ T7302] device hsr_slave_1 entered promiscuous mode
21:32:56 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0)
ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

[   59.252493][ T7302] debugfs: Directory 'hsr0' with parent '/' already present!
[   59.286206][ T7307] device hsr_slave_0 entered promiscuous mode
[   59.362898][ T7307] device hsr_slave_1 entered promiscuous mode
[   59.382595][ T7307] debugfs: Directory 'hsr0' with parent '/' already present!
[   59.411346][ T7360] IPVS: ftp: loaded support on port[0] = 21
[   59.586311][ T7362] device nr0 entered promiscuous mode
[   60.265258][ T7351] chnl_net:caif_netlink_parms(): no params data found
21:32:57 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0)
ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

[   60.599273][ T7417] netlink: 'syz-executor.1': attribute type 20 has an invalid length.
[   60.666680][ T7302] 8021q: adding VLAN 0 to HW filter on device bond0
[   60.724930][ T7351] bridge0: port 1(bridge_slave_0) entered blocking state
[   60.732016][ T7351] bridge0: port 1(bridge_slave_0) entered disabled state
[   60.794961][ T7351] device bridge_slave_0 entered promiscuous mode
[   60.842422][ T7351] bridge0: port 2(bridge_slave_1) entered blocking state
[   60.884694][ T7351] bridge0: port 2(bridge_slave_1) entered disabled state
[   60.936506][ T7351] device bridge_slave_1 entered promiscuous mode
[   60.981686][ T7417] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'.
[   61.383299][ T7423] device nr0 entered promiscuous mode
[   61.414135][ T7427] netlink: 'syz-executor.1': attribute type 20 has an invalid length.
[   61.435281][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   61.448925][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   61.488753][ T7302] 8021q: adding VLAN 0 to HW filter on device team0
[   61.886173][ T7427] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'.
[   61.967221][ T7351] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   62.016351][ T7307] 8021q: adding VLAN 0 to HW filter on device bond0
[   62.046597][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   62.066748][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   62.125369][ T3007] bridge0: port 1(bridge_slave_0) entered blocking state
[   62.132497][ T3007] bridge0: port 1(bridge_slave_0) entered forwarding state
[   62.201177][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   62.235464][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   62.263307][ T3007] bridge0: port 2(bridge_slave_1) entered blocking state
[   62.270399][ T3007] bridge0: port 2(bridge_slave_1) entered forwarding state
[   62.323256][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   62.353201][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   62.395906][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   62.413564][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   62.437121][ T7351] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   62.476882][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   62.493327][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   62.501779][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   62.523913][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   62.543411][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   62.551364][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   62.580877][ T7302] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[   62.614070][ T7302] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   62.644837][ T7307] 8021q: adding VLAN 0 to HW filter on device team0
[   62.671970][ T7360] chnl_net:caif_netlink_parms(): no params data found
[   62.697816][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   62.707157][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   62.725937][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
21:32:59 executing program 0:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
r3 = fcntl$dupfd(r2, 0x0, r2)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0)
ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef)

[   62.743484][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   62.766549][ T7351] team0: Port device team_slave_0 added
[   62.783538][ T7351] team0: Port device team_slave_1 added
[   62.911914][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   62.964317][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   62.971843][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   63.105615][ T7302] 8021q: adding VLAN 0 to HW filter on device batadv0
[   63.138717][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   63.163292][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   63.171827][ T7304] bridge0: port 1(bridge_slave_0) entered blocking state
[   63.178920][ T7304] bridge0: port 1(bridge_slave_0) entered forwarding state
[   63.288119][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   63.318025][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   63.343180][ T7304] bridge0: port 2(bridge_slave_1) entered blocking state
[   63.350262][ T7304] bridge0: port 2(bridge_slave_1) entered forwarding state
[   63.403269][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   63.469286][ T7439] device nr0 entered promiscuous mode
[   63.515633][ T7351] device hsr_slave_0 entered promiscuous mode
[   63.567393][ T7351] device hsr_slave_1 entered promiscuous mode
[   63.637668][ T7351] debugfs: Directory 'hsr0' with parent '/' already present!
[   63.666402][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   63.683431][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   63.733228][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   63.773246][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   63.813638][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   63.858372][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   63.918731][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   63.943638][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   63.979059][ T7360] bridge0: port 1(bridge_slave_0) entered blocking state
[   63.993430][ T7360] bridge0: port 1(bridge_slave_0) entered disabled state
[   64.013939][ T7360] device bridge_slave_0 entered promiscuous mode
21:33:01 executing program 1:
r0 = socket$inet(0x10, 0x2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000af0000a1f00000b002808000800144004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0)

[   64.139096][ T7307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   64.151262][ T7307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   64.163324][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   64.172154][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   64.180951][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   64.190003][ T7360] bridge0: port 2(bridge_slave_1) entered blocking state
[   64.199288][ T7360] bridge0: port 2(bridge_slave_1) entered disabled state
[   64.210532][ T7360] device bridge_slave_1 entered promiscuous mode
[   64.234814][ T7462] netlink: 'syz-executor.1': attribute type 20 has an invalid length.
[   64.259427][ T7462] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'.
[   64.383710][ T7360] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
21:33:01 executing program 1:
r0 = socket$inet(0x10, 0x2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000af0000a1f00000b002808000800144004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0)

[   64.435005][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   64.452619][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   64.463273][ T7307] 8021q: adding VLAN 0 to HW filter on device batadv0
[   64.495733][ T7360] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
21:33:01 executing program 0:
r0 = socket$inet(0x10, 0x2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000af0000a1f00000b002808000800144004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0)

[   64.654927][ T7351] 8021q: adding VLAN 0 to HW filter on device bond0
[   64.690532][ T7360] team0: Port device team_slave_0 added
[   64.758878][ T7360] team0: Port device team_slave_1 added
[   64.778244][ T7351] 8021q: adding VLAN 0 to HW filter on device team0
[   64.827914][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[   64.840362][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   64.895667][ T7498] netlink: 'syz-executor.1': attribute type 20 has an invalid length.
[   64.989019][ T7499] netlink: 'syz-executor.0': attribute type 20 has an invalid length.
[   65.026357][ T7498] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'.
[   65.052409][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[   65.093396][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   65.102104][ T7304] bridge0: port 1(bridge_slave_0) entered blocking state
[   65.109244][ T7304] bridge0: port 1(bridge_slave_0) entered forwarding state
21:33:02 executing program 1:
r0 = socket$inet(0x10, 0x2, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000af0000a1f00000b002808000800144004000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0)

[   65.211804][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[   65.247801][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   65.296133][ T7304] bridge0: port 2(bridge_slave_1) entered blocking state
[   65.303259][ T7304] bridge0: port 2(bridge_slave_1) entered forwarding state
[   65.369414][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[   65.401729][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[   65.447422][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[   65.484199][ T7304] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   65.533807][ T7499] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'.
21:33:03 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000740)=0x100, 0x4)
bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10)
connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10)
sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0)
recvmmsg(r0, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0)

[   65.921982][ T7360] device hsr_slave_0 entered promiscuous mode
[   65.982900][ T7360] device hsr_slave_1 entered promiscuous mode
[   66.032505][ T7360] debugfs: Directory 'hsr0' with parent '/' already present!
[   66.046590][ T7504] netlink: 'syz-executor.1': attribute type 20 has an invalid length.
[   66.096128][ T7351] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[   66.127278][ T7351] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   66.221013][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[   66.239302][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
21:33:03 executing program 3:
r0 = socket$inet6(0xa, 0x80003, 0xff)
setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000), 0x4)
setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000), 0x4)

[   66.282143][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[   66.320337][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   66.370902][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[   66.425755][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   66.468556][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[   66.528898][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   66.572486][ T7504] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'.
[   66.593752][   T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
21:33:03 executing program 3:
r0 = socket$inet6(0xa, 0x80003, 0xff)
setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000), 0x4)
setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000), 0x4)

[   66.736959][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   66.779401][ T7308] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   66.844427][ T7351] 8021q: adding VLAN 0 to HW filter on device batadv0
[   67.008653][ T7527] ==================================================================
[   67.016787][ T7527] BUG: KCSAN: data-race in vm_area_dup / vma_interval_tree_remove
[   67.024594][ T7527] 
[   67.026945][ T7527] read to 0xffff88812218ee10 of 200 bytes by task 7528 on cpu 1:
[   67.034665][ T7527]  vm_area_dup+0x70/0xf0
[   67.038896][ T7527]  dup_mm+0x330/0xba0
[   67.042872][ T7527]  copy_process+0x36f3/0x3b50
[   67.047557][ T7527]  _do_fork+0xfe/0x6e0
[   67.051630][ T7527]  __x64_sys_clone+0x12b/0x160
[   67.056395][ T7527]  do_syscall_64+0xcc/0x370
[   67.060894][ T7527]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   67.066775][ T7527] 
[   67.069140][ T7527] write to 0xffff88812218ee80 of 8 bytes by task 7527 on cpu 0:
[   67.076781][ T7527]  vma_interval_tree_remove+0x49c/0x8a0
[   67.082344][ T7527]  __vma_adjust+0x278/0x12a0
[   67.086926][ T7527]  __split_vma+0x208/0x350
[   67.091348][ T7527]  __do_munmap+0x233/0xb60
[   67.095766][ T7527]  __vm_munmap+0xb2/0x130
[   67.100099][ T7527]  vm_munmap+0x29/0x40
[   67.104167][ T7527]  elf_map+0x1f6/0x200
[   67.108232][ T7527]  load_elf_binary+0x1570/0x2ec0
[   67.113178][ T7527]  search_binary_handler+0x127/0x420
[   67.118469][ T7527]  __do_execve_file.isra.0+0xb76/0x11d0
[   67.124037][ T7527]  __x64_sys_execve+0x62/0x80
[   67.128985][ T7527]  do_syscall_64+0xcc/0x370
[   67.133480][ T7527]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   67.139370][ T7527] 
[   67.141689][ T7527] Reported by Kernel Concurrency Sanitizer on:
[   67.147841][ T7527] CPU: 0 PID: 7527 Comm: grep Not tainted 5.4.0-rc3+ #0
[   67.154774][ T7527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   67.164819][ T7527] ==================================================================
[   67.172874][ T7527] Kernel panic - not syncing: panic_on_warn set ...
[   67.179459][ T7527] CPU: 0 PID: 7527 Comm: grep Not tainted 5.4.0-rc3+ #0
[   67.186386][ T7527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   67.196574][ T7527] Call Trace:
[   67.199876][ T7527]  dump_stack+0xf5/0x159
[   67.204123][ T7527]  panic+0x210/0x640
[   67.208023][ T7527]  ? search_binary_handler+0x127/0x420
[   67.213475][ T7527]  ? vprintk_func+0x8d/0x140
[   67.218064][ T7527]  kcsan_report.cold+0xc/0x10
[   67.222742][ T7527]  __kcsan_setup_watchpoint+0x32e/0x4a0
[   67.228312][ T7527]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[   67.233949][ T7527]  __tsan_write8+0x32/0x40
[   67.238390][ T7527]  vma_interval_tree_remove+0x49c/0x8a0
[   67.243932][ T7527]  ? vma_interval_tree_insert+0x19b/0x230
[   67.249697][ T7527]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[   67.255331][ T7527]  __vma_adjust+0x278/0x12a0
[   67.259924][ T7527]  ? __kcsan_setup_watchpoint+0x6b/0x4a0
[   67.265556][ T7527]  __split_vma+0x208/0x350
[   67.269962][ T7527]  __do_munmap+0x233/0xb60
[   67.274378][ T7527]  __vm_munmap+0xb2/0x130
[   67.278707][ T7527]  vm_munmap+0x29/0x40
[   67.282798][ T7527]  elf_map+0x1f6/0x200
[   67.286861][ T7527]  load_elf_binary+0x1570/0x2ec0
[   67.291818][ T7527]  search_binary_handler+0x127/0x420
[   67.297105][ T7527]  __do_execve_file.isra.0+0xb76/0x11d0
[   67.302682][ T7527]  __x64_sys_execve+0x62/0x80
[   67.307354][ T7527]  do_syscall_64+0xcc/0x370
[   67.311996][ T7527]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   67.317880][ T7527] RIP: 0033:0x7fd0a65db207
[   67.322294][ T7527] Code: Bad RIP value.
[   67.326350][ T7527] RSP: 002b:00007ffdffc34bc8 EFLAGS: 00000202 ORIG_RAX: 000000000000003b
[   67.334851][ T7527] RAX: ffffffffffffffda RBX: 000000000208e650 RCX: 00007fd0a65db207
[   67.342848][ T7527] RDX: 000000000208e678 RSI: 000000000208e650 RDI: 000000000208e6d8
[   67.351781][ T7527] RBP: 000000000208e6d8 R08: 000000000061c428 R09: 00007fd0a6652800
[   67.359751][ T7527] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000208e678
[   67.367736][ T7527] R13: 000000000208e678 R14: 0000000000000000 R15: 0000000000000000
[   67.377181][ T7527] Kernel Offset: disabled
[   67.381504][ T7527] Rebooting in 86400 seconds..