[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 65.986071][ T27] audit: type=1800 audit(1576114011.499:25): pid=9095 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 66.006834][ T27] audit: type=1800 audit(1576114011.499:26): pid=9095 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 66.057695][ T27] audit: type=1800 audit(1576114011.509:27): pid=9095 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.17' (ECDSA) to the list of known hosts. 2019/12/12 01:27:03 fuzzer started 2019/12/12 01:27:05 dialing manager at 10.128.0.26:42497 2019/12/12 01:27:05 syscalls: 2701 2019/12/12 01:27:05 code coverage: enabled 2019/12/12 01:27:05 comparison tracing: enabled 2019/12/12 01:27:05 extra coverage: enabled 2019/12/12 01:27:05 setuid sandbox: enabled 2019/12/12 01:27:05 namespace sandbox: enabled 2019/12/12 01:27:05 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/12 01:27:05 fault injection: enabled 2019/12/12 01:27:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/12 01:27:05 net packet injection: enabled 2019/12/12 01:27:05 net device setup: enabled 2019/12/12 01:27:05 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/12 01:27:05 devlink PCI setup: PCI device 0000:00:10.0 is not available 01:28:55 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/connector\x00') getdents(0xffffffffffffffff, 0x0, 0x0) setns(0xffffffffffffffff, 0x2000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x10000000000000e0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2002) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f00000004c0)={0x4d, "fa0633a8dd118e52df6936d20bcd784b2f1c508f3dfc59fdf7f214d000b0f6fb407bf074c3252af821afee4c02a6db57d237ad21b1e5727aea625f42ec5be4fe9c656098b9bc00f21939e0445d"}) dup3(r1, r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 01:28:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000040, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000000000000290000003400000009000079"], 0x14}}], 0x1, 0x0) syzkaller login: [ 189.781412][ T9260] IPVS: ftp: loaded support on port[0] = 21 01:28:55 executing program 2: r0 = socket(0x10, 0x800000000080002, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001900fdabaa725d9448000097050000000800030005000000100000000009000087bd978a3477cd050000001d000000a8b9686b57c6e210414704000000366900000076122fd37dbf6624dcdea36a19e19d4a528ec12f3af2b7fa3c591ec54cd4084165a055097281c39430c9fa6a46aee90981fe6e7747b0c4bebc15f1a34b8ba4a016d5b6a184ea00"/153], 0x28}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492a1d, 0x0) [ 189.985573][ T9260] chnl_net:caif_netlink_parms(): no params data found [ 190.031071][ T9260] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.039855][ T9260] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.048306][ T9260] device bridge_slave_0 entered promiscuous mode [ 190.068700][ T9263] IPVS: ftp: loaded support on port[0] = 21 [ 190.076843][ T9260] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.084124][ T9260] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.100077][ T9260] device bridge_slave_1 entered promiscuous mode [ 190.192917][ T9260] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 190.217166][ T9260] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 01:28:55 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$sg(0x0, 0x0, 0x0) syz_open_dev$sg(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)={0x14, r1, 0x391}, 0x14}}, 0x0) r2 = gettid() ptrace(0xffffffffffffffff, r2) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x13) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000640)={0x3c, r1, 0x0, 0x70bd26, 0x0, {}, [{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}]}, 0x3c}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, 0x0, 0x0) setuid(0x0) [ 190.270415][ T9260] team0: Port device team_slave_0 added [ 190.320419][ T9260] team0: Port device team_slave_1 added [ 190.399912][ T9265] IPVS: ftp: loaded support on port[0] = 21 [ 190.441133][ T9268] IPVS: ftp: loaded support on port[0] = 21 01:28:56 executing program 4: setuid(0xee01) shmget(0x3, 0x4000, 0x77, &(0x7f0000ffa000/0x4000)=nil) [ 190.497610][ T9260] device hsr_slave_0 entered promiscuous mode [ 190.564210][ T9260] device hsr_slave_1 entered promiscuous mode [ 190.666176][ T9263] chnl_net:caif_netlink_parms(): no params data found [ 190.833712][ T9270] IPVS: ftp: loaded support on port[0] = 21 [ 190.834043][ T9263] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.864295][ T9263] bridge0: port 1(bridge_slave_0) entered disabled state 01:28:56 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) [ 190.884958][ T9263] device bridge_slave_0 entered promiscuous mode [ 190.893791][ T9260] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 190.931188][ T9260] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 191.009982][ T9263] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.020329][ T9263] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.029449][ T9263] device bridge_slave_1 entered promiscuous mode [ 191.041668][ T9260] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 191.098911][ T9260] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 191.156625][ T9272] IPVS: ftp: loaded support on port[0] = 21 [ 191.186957][ T9263] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.198672][ T9263] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.286533][ T9263] team0: Port device team_slave_0 added [ 191.302061][ T9263] team0: Port device team_slave_1 added [ 191.311126][ T9265] chnl_net:caif_netlink_parms(): no params data found [ 191.375377][ T9265] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.382568][ T9265] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.390863][ T9265] device bridge_slave_0 entered promiscuous mode [ 191.431896][ T9265] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.440198][ T9265] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.448592][ T9265] device bridge_slave_1 entered promiscuous mode [ 191.456934][ T9268] chnl_net:caif_netlink_parms(): no params data found [ 191.516479][ T9263] device hsr_slave_0 entered promiscuous mode [ 191.544206][ T9263] device hsr_slave_1 entered promiscuous mode [ 191.594011][ T9263] debugfs: Directory 'hsr0' with parent '/' already present! [ 191.658791][ T9265] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.671330][ T9265] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.735794][ T9263] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 191.776736][ T9263] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 191.827399][ T9265] team0: Port device team_slave_0 added [ 191.879012][ T9263] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 191.939649][ T9265] team0: Port device team_slave_1 added [ 191.949078][ T9272] chnl_net:caif_netlink_parms(): no params data found [ 191.966468][ T9268] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.973647][ T9268] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.982582][ T9268] device bridge_slave_0 entered promiscuous mode [ 191.992376][ T9268] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.999564][ T9268] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.007666][ T9268] device bridge_slave_1 entered promiscuous mode [ 192.015622][ T9263] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 192.070566][ T9270] chnl_net:caif_netlink_parms(): no params data found [ 192.136619][ T9265] device hsr_slave_0 entered promiscuous mode [ 192.186094][ T9265] device hsr_slave_1 entered promiscuous mode [ 192.224105][ T9265] debugfs: Directory 'hsr0' with parent '/' already present! [ 192.238398][ T9268] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.251156][ T9268] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.357936][ T9268] team0: Port device team_slave_0 added [ 192.367506][ T9268] team0: Port device team_slave_1 added [ 192.387725][ T9272] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.400453][ T9272] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.408806][ T9272] device bridge_slave_0 entered promiscuous mode [ 192.421984][ T9260] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.444275][ T9265] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 192.488678][ T9272] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.496397][ T9272] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.504965][ T9272] device bridge_slave_1 entered promiscuous mode [ 192.536119][ T9270] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.543356][ T9270] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.552524][ T9270] device bridge_slave_0 entered promiscuous mode [ 192.560759][ T9265] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 192.597536][ T9272] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.613422][ T9272] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.633757][ T9270] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.642217][ T9270] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.650692][ T9270] device bridge_slave_1 entered promiscuous mode [ 192.658153][ T9265] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 192.717130][ T9265] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 192.778711][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.787231][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.856365][ T9268] device hsr_slave_0 entered promiscuous mode [ 192.884224][ T9268] device hsr_slave_1 entered promiscuous mode [ 192.934123][ T9268] debugfs: Directory 'hsr0' with parent '/' already present! [ 192.957466][ T9260] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.970662][ T9272] team0: Port device team_slave_0 added [ 192.984638][ T9272] team0: Port device team_slave_1 added [ 193.003471][ T9270] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.022628][ T9270] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.063518][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.073056][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.082171][ T3203] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.090300][ T3203] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.133614][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.142366][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.152211][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.161073][ T3203] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.168253][ T3203] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.179117][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.187820][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.237080][ T9272] device hsr_slave_0 entered promiscuous mode [ 193.274473][ T9272] device hsr_slave_1 entered promiscuous mode [ 193.323966][ T9272] debugfs: Directory 'hsr0' with parent '/' already present! [ 193.351742][ T9270] team0: Port device team_slave_0 added [ 193.362369][ T9270] team0: Port device team_slave_1 added [ 193.377601][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.390612][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.404376][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.413118][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.426531][ T9263] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.451671][ T9268] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 193.518333][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.530580][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.539731][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.549652][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.559924][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.581206][ T9260] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.594286][ T9268] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 193.645974][ T9268] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 193.701210][ T9268] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 193.783468][ T9272] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 193.820832][ T9272] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 193.881472][ T9272] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 193.936296][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.948594][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.996047][ T9270] device hsr_slave_0 entered promiscuous mode [ 194.054489][ T9270] device hsr_slave_1 entered promiscuous mode [ 194.104013][ T9270] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.115606][ T9272] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 194.169140][ T9263] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.193223][ T9265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.226288][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 194.235035][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 194.254929][ T9260] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.309204][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.318583][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.336262][ T3203] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.343667][ T3203] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.355575][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.363513][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.371734][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.382730][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.392310][ T3203] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.399517][ T3203] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.409951][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.419878][ T3203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.434732][ T9270] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 194.490285][ T9270] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 194.557711][ T9270] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 194.606785][ T9270] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 194.677148][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.683899][ C0] hrtimer: interrupt took 112426 ns [ 194.706499][ T9265] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.729441][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.740442][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.750521][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.762289][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.772022][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.782563][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.792869][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.802630][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.811941][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.821337][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.831387][ T9273] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.838952][ T9273] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.856505][ T9263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 01:29:00 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$vcsa(0xffffffffffffff9c, 0x0, 0x244001, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x20008000) syz_open_procfs(r0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r2) prctl$PR_SET_UNALIGN(0x6, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r4 = open(&(0x7f0000000040)='./bus\x00', 0x143042, 0x0) ftruncate(r4, 0x200004) sendfile(r2, r4, 0x0, 0x80001d00c0d0) [ 194.887067][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.906010][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.922617][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.936487][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.947891][ T9273] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.955876][ T9273] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.965611][ T9273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.026824][ T9278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 01:29:00 executing program 0: socket$inet(0x10, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2, &(0x7f0000000040)=0x800, 0x49) dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) lseek(r1, 0x0, 0x4) socket$netlink(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='L\x00\x00,', @ANYRES16, @ANYBLOB="100026bd7000fedbdf250200000014000100fe80000000000000000000000000001a080002006900000008000600020000000400040008000500030000000800060001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x10000) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b96748c841ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27) [ 195.104019][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 195.111645][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 195.131957][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.142716][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.201655][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.214882][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.236231][ T3198] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.282065][ T9265] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 195.294999][ T9265] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 195.313174][ T9263] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 195.327968][ T3080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.344554][ T3080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.355933][ T3080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.364599][ T3080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.377574][ T9268] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.389303][ T9272] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.422443][ T3080] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.479846][ T3080] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.495166][ T3080] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.521208][ T9272] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.522908][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 195.551036][ T9268] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.560613][ T9278] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 01:29:01 executing program 1: munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) r0 = shmget$private(0x0, 0x1000, 0x500, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x1800) shmctl$IPC_RMID(r0, 0x0) [ 195.568651][ T9278] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 195.576384][ T9278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.586224][ T9278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.608686][ T9265] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 195.679995][ T9270] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.700172][ T9278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.717566][ T9278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 01:29:01 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, 0x0) [ 195.732747][ T9278] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.740037][ T9278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.774931][ T9278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.802383][ T9278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.837767][ T9278] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.844954][ T9278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.854475][ T9278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.863776][ T9278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 01:29:01 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) [ 195.884240][ T9278] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.891373][ T9278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.937192][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.954535][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.963431][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.979492][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.989932][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.003145][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.010327][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.103153][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.133017][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.158268][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.179611][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.195496][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 01:29:01 executing program 1: io_setup(0x0, &(0x7f00000001c0)=0x0) io_submit(0x0, 0x0, 0x0) io_getevents(r0, 0x0, 0x191, 0x0, 0x0) [ 196.203561][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.229368][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.271150][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.303434][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 01:29:01 executing program 1: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_TIOCINQ(r0, 0x8907, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 196.333199][ T9270] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.382818][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.411404][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.443522][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.471127][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 01:29:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000700)={'eql:\xb3\x87\x00\x00\x00\x00\x00\x00\x00\x02\x00', @ifru_flags}) [ 196.512401][ T9272] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 196.554670][ T9272] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.595263][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.615634][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.638052][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.672740][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.700508][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.742528][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 01:29:02 executing program 2: socket$inet(0x10, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2, &(0x7f0000000040)=0x800, 0x49) dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) lseek(r1, 0x0, 0x4) socket$netlink(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='L\x00\x00,', @ANYRES16, @ANYBLOB="100026bd7000fedbdf250200000014000100fe80000000000000000000000000001a080002006900000008000600020000000400040008000500030000000800060001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x10000) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b96748c841ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27) [ 196.788392][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.825735][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.840805][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.850138][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.867309][ T9310] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.874464][ T9310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.913506][ T9268] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.931846][ T9268] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.949114][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.957101][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.965670][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.975277][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.992631][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.002057][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.018118][ T9310] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.025286][ T9310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.039997][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.049040][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.081568][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.089285][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.107760][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.120606][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.132706][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.148403][ T9310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.159920][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.228744][ T9272] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.240166][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.249276][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.280583][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.289487][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.308008][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.315753][ T9305] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.325898][ T9270] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.355438][ T9268] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.373575][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.389866][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.416355][ T9270] 8021q: adding VLAN 0 to HW filter on device batadv0 01:29:03 executing program 3: socket$inet(0x10, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2, &(0x7f0000000040)=0x800, 0x49) dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) lseek(r1, 0x0, 0x4) socket$netlink(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='L\x00\x00,', @ANYRES16, @ANYBLOB="100026bd7000fedbdf250200000014000100fe80000000000000000000000000001a080002006900000008000600020000000400040008000500030000000800060001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x10000) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b96748c841ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27) 01:29:03 executing program 4: syz_emit_ethernet(0x3e, &(0x7f00000014c0)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "008000", 0x44, 0xffffff11, 0x0, @remote, @loopback, {[], @gre}}}}}, 0x0) 01:29:04 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 01:29:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x803, 0xa0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x8, &(0x7f0000000200)={{{@in6=@mcast1={0x0}, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, 0xe8) 01:29:04 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 01:29:04 executing program 0: socket$inet(0x10, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2, &(0x7f0000000040)=0x800, 0x49) dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) lseek(r1, 0x0, 0x4) socket$netlink(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='L\x00\x00,', @ANYRES16, @ANYBLOB="100026bd7000fedbdf250200000014000100fe80000000000000000000000000001a080002006900000008000600020000000400040008000500030000000800060001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x10000) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b96748c841ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27) 01:29:04 executing program 4: socket$inet(0x10, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2, &(0x7f0000000040)=0x800, 0x49) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='scalable\x00', 0x9) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r2 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) lseek(r2, 0x0, 0x4) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r3, &(0x7f0000000140)={0x0, 0xa2, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="0d0d0000000000140001009312026ed8a951000000000000000000"], 0x30}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="100026bd7000fedbdf250200000014000100fe80000000000000000000000000001a080002006900000008000600020000000400040008000500030000000800060001000000"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x10000) sendto$inet(r1, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r1, &(0x7f0000006c80)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000180)="f5", 0x1}], 0x1}}], 0x1, 0x0) sendto$inet(r1, &(0x7f00000012c0)="03268a927f1f6587b96748c841ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27) 01:29:04 executing program 3: socket$inet(0x10, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2, &(0x7f0000000040)=0x800, 0x49) dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000cab000)=0xc) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) lseek(r1, 0x0, 0x4) socket$netlink(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='L\x00\x00,', @ANYRES16, @ANYBLOB="100026bd7000fedbdf250200000014000100fe80000000000000000000000000001a080002006900000008000600020000000400040008000500030000000800060001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x10000) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b96748c841ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xf83c, 0x2, 0x0, 0x27) 01:29:04 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[]) getxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)=@known='system.posix_acl_access\x00', 0x0, 0x0) 01:29:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000600000004000000000000070000000000000000000000010000ffff0800000000000000010000850200000004000000020000000000000100000000da003ed9aed616aa94f92417f9e857d1d45b54da920bfbed77cff360afa7996df6a13094d40d00007cebdc661626027c1bb39852ffbb5b1884c5"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 01:29:04 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) 01:29:04 executing program 2: r0 = socket$inet(0x2, 0x803, 0xa0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x19, 0x0, 0x0) [ 199.187291][ T9395] overlayfs: overlapping lowerdir path [ 199.225278][ T9397] overlayfs: overlapping lowerdir path 01:29:04 executing program 2: r0 = socket$inet(0x2, 0x803, 0xa0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x19, 0x0, 0x0) 01:29:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) keyctl$link(0x8, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000300000000000000000003000000008e"], 0x0, 0x1a}, 0x20) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 199.471728][ T9411] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 199.609264][ T9410] list_del corruption. prev->next should be ffff888096f4b850, but was ffff8880a56bc250 [ 199.619877][ T9410] ------------[ cut here ]------------ [ 199.625452][ T9410] kernel BUG at lib/list_debug.c:51! [ 199.630857][ T9410] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 199.637025][ T9410] CPU: 1 PID: 9410 Comm: syz-executor.1 Not tainted 5.5.0-rc1-next-20191211-syzkaller #0 [ 199.646918][ T9410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.657949][ T9410] RIP: 0010:__list_del_entry_valid.cold+0xf/0x4f [ 199.664321][ T9410] Code: e8 c9 00 cb fd 0f 0b 48 89 f1 48 c7 c7 c0 10 70 88 4c 89 e6 e8 b5 00 cb fd 0f 0b 4c 89 f6 48 c7 c7 60 12 70 88 e8 a4 00 cb fd <0f> 0b 4c 89 ea 4c 89 f6 48 c7 c7 a0 11 70 88 e8 90 00 cb fd 0f 0b [ 199.685528][ T9410] RSP: 0018:ffffc90001727c00 EFLAGS: 00010282 [ 199.692151][ T9410] RAX: 0000000000000054 RBX: ffff8882199af420 RCX: 0000000000000000 [ 199.694230][ T4095] kobject: 'loop4' (00000000d88b216d): kobject_uevent_env [ 199.703241][ T9410] RDX: 0000000000000000 RSI: ffffffff815e8576 RDI: fffff520002e4f72 [ 199.718668][ T9410] RBP: ffffc90001727c18 R08: 0000000000000054 R09: ffffed1015d26621 [ 199.721065][ T4095] kobject: 'loop4' (00000000d88b216d): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 199.726646][ T9410] R10: ffffed1015d26620 R11: ffff8880ae933107 R12: ffff8882199af520 [ 199.726653][ T9410] R13: ffff8880a56bc250 R14: ffff888096f4b850 R15: ffff888096f4b850 [ 199.726664][ T9410] FS: 0000000001041940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 199.726671][ T9410] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 199.726676][ T9410] CR2: 0000001b2e925000 CR3: 00000000961b6000 CR4: 00000000001426e0 [ 199.726687][ T9410] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 199.726692][ T9410] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 199.726698][ T9410] Call Trace: [ 199.726732][ T9410] __dentry_kill+0x1fd/0x600 [ 199.726742][ T9410] ? dput+0x38/0xe10 [ 199.726753][ T9410] ? dput+0x38/0xe10 [ 199.726763][ T9410] dput+0x62f/0xe10 [ 199.726788][ T9410] simple_recursive_removal+0x5bc/0x6d0 [ 199.726805][ T9410] ? debugfs_rename+0x7f0/0x7f0 [ 199.726827][ T9410] debugfs_remove+0x5e/0x80 [ 199.835615][ T9410] kvm_put_kvm+0x136/0xcc0 [ 199.840050][ T9410] ? kvm_irqfd_release+0xe2/0x120 [ 199.845104][ T9410] ? kvm_irqfd_release+0xe2/0x120 [ 199.850178][ T9410] kvm_vm_release+0x44/0x60 [ 199.855918][ T9410] __fput+0x2ff/0x890 [ 199.860423][ T9410] ? kvm_dev_ioctl+0x17d0/0x17d0 [ 199.865831][ T9410] ____fput+0x16/0x20 [ 199.869969][ T9410] task_work_run+0x145/0x1c0 [ 199.874796][ T9410] exit_to_usermode_loop+0x316/0x380 [ 199.880968][ T9410] do_syscall_64+0x676/0x790 [ 199.885563][ T9410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.891436][ T9410] RIP: 0033:0x4144a1 [ 199.895323][ T9410] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 199.916947][ T9410] RSP: 002b:00007fffde622860 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 199.929674][ T9410] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 00000000004144a1 [ 199.939488][ T9410] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 199.947491][ T9410] RBP: 0000000000000001 R08: 00000000fc2b66a5 R09: 00000000fc2b66a9 [ 199.956587][ T9410] R10: 00007fffde622940 R11: 0000000000000293 R12: 000000000075c9a0 [ 199.965460][ T9410] R13: 000000000075c9a0 R14: 0000000000762578 R15: 000000000075bfd4 [ 199.973421][ T9410] Modules linked in: [ 199.978791][ T9410] ---[ end trace 91b8e08e118a35a9 ]--- [ 199.984711][ T9410] RIP: 0010:__list_del_entry_valid.cold+0xf/0x4f [ 199.991030][ T9410] Code: e8 c9 00 cb fd 0f 0b 48 89 f1 48 c7 c7 c0 10 70 88 4c 89 e6 e8 b5 00 cb fd 0f 0b 4c 89 f6 48 c7 c7 60 12 70 88 e8 a4 00 cb fd <0f> 0b 4c 89 ea 4c 89 f6 48 c7 c7 a0 11 70 88 e8 90 00 cb fd 0f 0b [ 200.010769][ T9410] RSP: 0018:ffffc90001727c00 EFLAGS: 00010282 [ 200.016865][ T9410] RAX: 0000000000000054 RBX: ffff8882199af420 RCX: 0000000000000000 [ 200.025219][ T9410] RDX: 0000000000000000 RSI: ffffffff815e8576 RDI: fffff520002e4f72 [ 200.033197][ T9410] RBP: ffffc90001727c18 R08: 0000000000000054 R09: ffffed1015d26621 [ 200.041196][ T9410] R10: ffffed1015d26620 R11: ffff8880ae933107 R12: ffff8882199af520 [ 200.049205][ T9410] R13: ffff8880a56bc250 R14: ffff888096f4b850 R15: ffff888096f4b850 [ 200.057221][ T9410] FS: 0000000001041940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 200.066307][ T9410] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.072885][ T9410] CR2: 0000001b2e925000 CR3: 00000000961b6000 CR4: 00000000001426e0 [ 200.081399][ T9410] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 200.089503][ T9410] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 200.097491][ T9410] Kernel panic - not syncing: Fatal exception [ 200.105215][ T9410] Kernel Offset: disabled [ 200.109559][ T9410] Rebooting in 86400 seconds..