[ 82.194086][ T27] audit: type=1800 audit(1579346318.187:26): pid=9724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 83.456943][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 83.456954][ T27] audit: type=1800 audit(1579346319.477:29): pid=9724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 83.489388][ T27] audit: type=1800 audit(1579346319.477:30): pid=9724 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.30' (ECDSA) to the list of known hosts. 2020/01/18 11:18:46 fuzzer started 2020/01/18 11:18:49 dialing manager at 10.128.0.26:44169 2020/01/18 11:18:49 syscalls: 2871 2020/01/18 11:18:49 code coverage: enabled 2020/01/18 11:18:49 comparison tracing: enabled 2020/01/18 11:18:49 extra coverage: enabled 2020/01/18 11:18:49 setuid sandbox: enabled 2020/01/18 11:18:49 namespace sandbox: enabled 2020/01/18 11:18:49 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/18 11:18:49 fault injection: enabled 2020/01/18 11:18:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/18 11:18:49 net packet injection: enabled 2020/01/18 11:18:49 net device setup: enabled 2020/01/18 11:18:49 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/01/18 11:18:49 devlink PCI setup: PCI device 0000:00:10.0 is not available 11:22:16 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100, 0x0) r1 = socket$inet6(0xa, 0x2, 0x1) r2 = dup3(r0, r1, 0x80000) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r0, 0x4) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000900)='/dev/dlm-monitor\x00', 0x40, 0x0) r4 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000980)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r3, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0xa00000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x1c, r4, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000ac0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x4080002}, 0xc, &(0x7f0000000e80)={&(0x7f0000000b00)={0x348, r5, 0x700, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xce7c}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x101}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_NODE={0x28, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1400000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0xe0, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4994}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3a50}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x401}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xe1a1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x173}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x48, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0xb4, 0x4, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x64, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x20000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xcf7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x31}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4d7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6a1}]}]}, 0x348}, 0x1, 0x0, 0x0, 0x8000}, 0x80000) r6 = dup2(r0, 0xffffffffffffffff) getresuid(&(0x7f0000000fc0)=0x0, &(0x7f0000001000), &(0x7f0000001040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001080)={0x0, 0x0, 0x0}, &(0x7f00000010c0)=0xc) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000f00)='/dev/loop0\x00', &(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='fuseblk\x00', 0x800, &(0x7f00000011c0)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize'}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@default_permissions='default_permissions'}], [{@uid_eq={'uid', 0x3d, r10}}, {@obj_type={'obj_type', 0x3d, 'syz0\x00'}}, {@context={'context', 0x3d, 'system_u'}}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@subj_role={'subj_role', 0x3d, 'syz1\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'TIPCv2\x00'}}]}}) r11 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001580)='/proc/capi/capi20\x00', 0x40880, 0x0) pipe2$9p(&(0x7f00000015c0)={0xffffffffffffffff}, 0x4000) r13 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001700)={&(0x7f0000001600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x6, [@const={0x6, 0x0, 0x0, 0xa, 0x3}, @typedef={0x5, 0x0, 0x0, 0x8, 0x1}, @typedef={0xf, 0x0, 0x0, 0x8, 0x3}, @func={0x3, 0x0, 0x0, 0xc, 0x2}, @func={0x10, 0x0, 0x0, 0xc, 0x2}, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0x10, 0x2}, {0xb, 0x4}, {0x5, 0x3}, {0xa, 0x40}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x5}, {0xc, 0x2}, {0xa, 0x4}]}, @var={0x10, 0x0, 0x0, 0xe, 0x5}]}, {0x0, [0x2e, 0x2e, 0x30, 0x61]}}, &(0x7f00000016c0)=""/56, 0xba, 0x38, 0x1}, 0x20) r14 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001740)=0xffffffffffffffff, 0x4) r15 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001780)='/dev/qat_adf_ctl\x00', 0x599200, 0x0) r16 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/rfkill\x00', 0x800, 0x0) r17 = perf_event_open$cgroup(&(0x7f0000001840)={0x5, 0x70, 0x8, 0xd0, 0x20, 0x68, 0x0, 0xc6, 0x22901, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000001800), 0x2}, 0x2a, 0x5, 0x2, 0x1, 0x100000001, 0x80, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r18 = accept$unix(0xffffffffffffffff, &(0x7f00000018c0)=@abs, &(0x7f0000001940)=0x6e) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001980)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = socket$inet(0x2, 0x6, 0x1) r21 = socket$packet(0x11, 0x1, 0x300) r22 = pidfd_open(r8, 0x0) r23 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/loop-control\x00', 0x8000, 0x0) r24 = syz_open_procfs(0x0, &(0x7f0000001a00)='fd\x00') r25 = syz_init_net_socket$ax25(0x3, 0x5, 0xc9) r26 = openat$vhci(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/vhci\x00', 0x340) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001a80)=0x0) r28 = geteuid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000001340)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001540)=[{&(0x7f00000013c0)="b0ebe2b2d6ca5268c586fa5e015276fe74245fed634e81", 0x17}, {&(0x7f0000001400)="68a7f1eb2daf1b19d4145174c39fcb19f964fe483040245e560f6a5a49c92aaff1a53a4476234a7ee9", 0x29}, {&(0x7f0000001440)="0eda56c4c592fcaf986f9e37c354416310847a34f019363188b622b0026eea0620533ef3f8d901eb89a0c98712cec2da70861449837562a7ca11e8b7df9c25ab81e30dc9bdb99da8d78eab4caab146df40340d9688aecba6b4b4", 0x5a}, {&(0x7f00000014c0)="c0ecdad3b51239d04b9e19e0de087e7f81875f5878f2ef52396994e5c2daf56a180794c38675f145f7712990de92848954d50bc79381e6dc046b8689a7e1a76d4679b03c1ee87fb51d09d0d8b95f07234731d6c403618d166fc9e504cbdfe44b4cee3873d48cba95587558f9", 0x6c}], 0x4, &(0x7f0000001ac0)=[@rights={{0x18, 0x1, 0x1, [r2, r11]}}, @rights={{0x20, 0x1, 0x1, [r12, r13, r6, r14]}}, @rights={{0x24, 0x1, 0x1, [r15, r16, 0xffffffffffffffff, r3, r17]}}, @rights={{0x30, 0x1, 0x1, [r3, r2, r1, r18, r19, r20, 0xffffffffffffffff, r21]}}, @rights={{0x14, 0x1, 0x1, [r22]}}, @rights={{0x18, 0x1, 0x1, [r23, r1]}}, @rights={{0x28, 0x1, 0x1, [r24, r25, r0, 0xffffffffffffffff, r26, r0]}}, @cred={{0x1c, 0x1, 0x2, {r27, r28, r9}}}], 0x108, 0x20000004}, 0x1) 11:22:16 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001740)='/dev/nvram\x00', 0x80800, 0x0) bind$l2tp(r1, &(0x7f0000001780)={0x2, 0x0, @multicast2, 0x1}, 0x10) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/vcsa\x00', 0x400, 0x0) sendto$l2tp(r2, &(0x7f0000001800)="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", 0xfb, 0x4, &(0x7f0000001900)={0x2, 0x0, @remote, 0x4}, 0x10) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r2) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000001940)=[@in6={0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x19717e6b}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0x33}, 0x9}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x68) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f0000001a00)={{0x2, 0x0, @identifier="fba8aabac72adb438ec42b6d25ebf8ea"}}) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/bsg\x00', 0x20000, 0x0) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000001a80)=0x7ff) r6 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ac0)={0x0, 0x0}, &(0x7f0000001b00)=0xc) stat(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r6, r7, r8) r9 = creat(&(0x7f0000001c00)='./file0\x00', 0x20) ioctl$VIDIOC_S_PRIORITY(r9, 0x40045644, 0x2) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000001c40)={0x7, 0x0, 0x4, 0x4000, 0x5, {0x77359400}, {0x831d7f3e50d19d17, 0x9, 0xff, 0x16, 0x0, 0x0, "29f3b25e"}, 0x40, 0x2, @offset=0x6, 0x3, 0x0, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000001cc0)={0x0, 0x4, 0x3, [0xda, 0x4, 0x0]}, &(0x7f0000001d00)=0xe) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r10, 0x84, 0x1f, &(0x7f0000001d40)={r11, @in={{0x2, 0x4e20, @loopback}}, 0xfff, 0x9d62}, 0x90) r12 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$SO_TIMESTAMP(r12, 0x1, 0x23, &(0x7f0000001e00), &(0x7f0000001e40)=0x4) r13 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/vcsu\x00', 0x80, 0x0) ioctl$BLKFLSBUF(r13, 0x1261, &(0x7f0000001ec0)=0x3ff) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000001f00)={r11, 0x4, 0x6, 0x10001}, &(0x7f0000001f40)=0x10) r14 = syz_open_dev$vcsa(&(0x7f0000001f80)='/dev/vcsa#\x00', 0x1400000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r14, 0xc04c5349, &(0x7f0000001fc0)={0x3, 0x9}) pipe(&(0x7f0000002040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETOFFLOAD(r15, 0x400454d0, 0xa) syzkaller login: [ 300.354695][ T9891] IPVS: ftp: loaded support on port[0] = 21 [ 300.479043][ T9893] IPVS: ftp: loaded support on port[0] = 21 11:22:16 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) read$char_usb(r0, &(0x7f0000000040)=""/193, 0xc1) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0', [], 0xa, "69779e1088522c01c32fa519cf6b92bbc11551eb86d9bbfb6ebde7fbd5cb735541101071d62b4f3a4a3a3f811483f29b1969055a47ca65e32499134e18b58d19f906a346c88740d136142db6026e38320218fa5cea71b07efc0b71907b03c235e9e1c658eadd5b7e3e245aeac8ebf3e27fdd5fa8125aa8b6d88ba3394c4311a0114da816e9"}, 0x90) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000002c0)={0x980000, 0x7, 0x6, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x9909e4, 0x6, [], @p_u32=&(0x7f0000000240)=0x7}}) write$UHID_DESTROY(r1, &(0x7f0000000300), 0x4) r2 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x2, 0xc5d9da7a5950ffd1) ioctl$SCSI_IOCTL_SYNC(r2, 0x4) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000380)) r3 = open$dir(&(0x7f00000003c0)='./file1\x00', 0x80, 0x8) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) futimesat(r3, &(0x7f0000000400)='\x00', &(0x7f0000000480)={{r4, r5/1000+10000}, {0x77359400}}) ioctl$CAPI_NCCI_OPENCOUNT(0xffffffffffffffff, 0x80044326, &(0x7f00000004c0)=0x2) r6 = creat(&(0x7f0000000500)='./file2\x00', 0xa) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000540)={'team0\x00', {0x2, 0x4e22, @local}}) r7 = accept$nfc_llcp(r2, &(0x7f0000000580), &(0x7f0000000600)=0x60) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000640)={0x0, r7, 0x7, 0x9, 0xffff}) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000680)='/dev/dlm-monitor\x00', 0x240042, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f00000006c0), &(0x7f0000000700)=0x4) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$IPCTNL_MSG_CT_GET_DYING(r9, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x14, 0x6, 0x1, 0x201, 0x0, 0x0, {0xa, 0x0, 0x9}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000840), &(0x7f0000000880)=0x30) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) setsockopt$inet6_tcp_int(r10, 0x6, 0x18, &(0x7f0000000900)=0x6, 0x4) r11 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000940)='/proc/capi/capi20ncci\x00', 0x181400, 0x0) sendmsg$IPSET_CMD_CREATE(r11, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x2000108}, 0xc, &(0x7f0000000a40)={&(0x7f00000009c0)={0x54, 0x2, 0x6, 0x0, 0x0, 0x0, {0x5, 0x0, 0x5}, [@IPSET_ATTR_DATA={0x38, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0xd}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x3}, @IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0xffffffff}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e20}, @IPSET_ATTR_NETMASK={0x5, 0x14, 0x18}]}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x1) r12 = syz_open_dev$audion(&(0x7f0000000ac0)='/dev/audio#\x00', 0x9, 0x8000) write$cgroup_subtree(r12, &(0x7f0000000b00)={[{0x2b, 'io'}, {0x6, 'cpu'}, {0x2b, 'io'}, {0x2d, 'rdma'}]}, 0x13) r13 = socket$nl_generic(0x10, 0x3, 0x10) r14 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000b80)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r13, &(0x7f0000000c40)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0xb6c2cd74b60f1b20}, 0xc, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, r14, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x20080010) [ 300.585427][ T9891] chnl_net:caif_netlink_parms(): no params data found [ 300.672639][ T9893] chnl_net:caif_netlink_parms(): no params data found [ 300.688104][ T9891] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.696326][ T9891] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.706089][ T9891] device bridge_slave_0 entered promiscuous mode [ 300.739227][ T9891] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.747701][ T9891] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.757114][ T9891] device bridge_slave_1 entered promiscuous mode [ 300.810419][ T9891] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 300.835318][ T9893] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.842424][ T9893] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.865663][ T9893] device bridge_slave_0 entered promiscuous mode [ 300.874903][ T9891] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 300.887941][ T9893] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.895456][ T9893] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.903481][ T9893] device bridge_slave_1 entered promiscuous mode 11:22:17 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r0, &(0x7f0000000040)={0x3b409f70ae8cc0b7}) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x7d, 0x10840) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f00000000c0)={0x7b, 0x0, [0x80000000, 0x7, 0x2a2, 0x1]}) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f00000001c0)={0xa30000, 0x80000000, 0x2, r1, 0x0, &(0x7f0000000180)={0x9c0908, 0x47, [], @p_u8=&(0x7f0000000140)=0x1}}) write$P9_RMKNOD(r2, &(0x7f0000000200)={0x14, 0x13, 0x1, {0x10, 0x4, 0x4}}, 0x14) add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)="ba7f44d1e3930fc41db835940d9646ad2bd3a44e041070a24d799529cdf8f9791a91c2d2e332aae40b5991b5e3a137e76a0ea12dfd49df4c8d24bf2056bc7fb639401e9322982c263dd87dd40222720b38acc9d23bf333796e2979d2b109f88881e69dcddc3a46a3ed6bcea6697ac0b4b7f681f586a4ae6bcac2c9cd61909a85cccfc6030b49f7fd672788557f88cbe7", 0x90, 0xfffffffffffffffc) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f00000003c0)=r1) r4 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f0000000400)={{0x2, 0x0, @reserved="36451375a163c544403b260fca32ae62bdf5af6cf880316b816ccbf20e582d10"}}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0)='nl80211\x00') sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f0000000600)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2024030}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x98, r5, 0x602, 0x70bd26, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x3}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @remote}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x4}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "5710d715f1"}, @NL80211_ATTR_KEY={0x38, 0x50, [@NL80211_KEY_TYPE={0x8, 0x7, 0x2}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_TYPE={0x8, 0x7, 0x2}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_CIPHER={0x8}, @NL80211_KEY_IDX={0x5}]}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r6 = socket$kcm(0x29, 0x3a97f01577d29a64, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r6, 0x0, 0x487, &(0x7f0000000640), &(0x7f0000000680)=0x30) add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000700)={'syz', 0x1}, &(0x7f0000000740)="de98f80947e3a96ec3cbb20677cf50fe093ad2df5758c6b5be1be62b71ed3831f7d73b4f4d8ee78a81ee86abb054d6b5dff97c8c36", 0x35, 0xfffffffffffffffa) r7 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$KDGETMODE(r7, 0x4b3b, &(0x7f0000000780)) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f00000007c0)={0x5, 0xe, 0x4, 0x2, 0x3, {0x77359400}, {0x4, 0xc, 0xd7, 0x3, 0x5, 0x3f, "e7103003"}, 0x800, 0x2, @userptr=0x3, 0x40, 0x0, 0xffffffffffffffff}) ioctl$KVM_GET_MSRS(r8, 0xc008ae88, &(0x7f0000000840)={0x7, 0x0, [{}, {}, {}, {}, {}, {}, {}]}) r9 = syz_open_dev$audion(&(0x7f00000008c0)='/dev/audio#\x00', 0x8, 0x610120) setsockopt$PNPIPE_ENCAP(r9, 0x113, 0x1, &(0x7f0000000900)=0x1, 0x4) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000940)='/dev/btrfs-control\x00', 0x400000, 0x0) ioctl$KVM_GET_API_VERSION(r10, 0xae00, 0x0) r11 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/uinput\x00', 0x807, 0x0) fsetxattr$trusted_overlay_opaque(r11, &(0x7f0000001ec0)='trusted.overlay.opaque\x00', &(0x7f0000001f00)='y\x00', 0x2, 0x2) openat$watch_queue(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/watch_queue\x00', 0x100, 0x0) r12 = syz_open_dev$usbfs(&(0x7f0000001f80)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x600) ioctl$USBDEVFS_GETDRIVER(r12, 0x41045508, &(0x7f0000001fc0)={0x200000, "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"}) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000002100)={0xffff7fff, 0x1, 0x4, 0x800, 0x9, {0x0, 0x2710}, {0x1, 0xa, 0x9, 0x80, 0x5, 0x0, "e665d4be"}, 0x6, 0x3, @offset=0x3, 0x4a, 0x0, 0xffffffffffffffff}) r14 = fanotify_init(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r13, 0x4c06, r14) [ 300.957000][ T9893] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 300.972188][ T9897] IPVS: ftp: loaded support on port[0] = 21 [ 300.982431][ T9891] team0: Port device team_slave_0 added [ 300.993720][ T9893] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 301.014685][ T9891] team0: Port device team_slave_1 added [ 301.090224][ T9893] team0: Port device team_slave_0 added [ 301.138015][ T9891] device hsr_slave_0 entered promiscuous mode [ 301.206563][ T9891] device hsr_slave_1 entered promiscuous mode 11:22:17 executing program 4: msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x58, r1, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) getsockopt$netlink(r0, 0x10e, 0x7, &(0x7f0000000280)=""/196, &(0x7f0000000380)=0xc4) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000003c0), &(0x7f0000000400)=0x4) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000440)={0x7, 0x0, 0x4, 0x20000408, 0x0, {}, {0xb, 0xc, 0x3, 0x4, 0x40, 0x54, "f91bae84"}, 0x0, 0x1, @fd, 0x8001, 0x0, r0}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f00000004c0)=0x4, 0x4) r3 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000500)={0x0, 0x1}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000580)={r4, 0x9}, &(0x7f00000005c0)=0x8) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80020420}, 0xc, &(0x7f0000000740)={&(0x7f0000000680)={0x84, r5, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xa15831986074f233}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x40}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x120}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xc80}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x100}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x40}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x84}}, 0x20000000) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/dlm-control\x00', 0x400400, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000a40)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r6, &(0x7f0000000b80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0xa0080}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a80)={0xb4, r7, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0xc}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x919}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}]}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x3b}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4a}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4d}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000bc0)) ioctl$VIDIOC_G_EXT_CTRLS(r6, 0xc0205647, &(0x7f0000001cc0)={0x9b0000, 0x9, 0x4, r2, 0x0, &(0x7f0000001c80)={0x98090a, 0x5017, [], @value=0x2}}) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001d40)='nl80211\x00') sendmsg$NL80211_CMD_TRIGGER_SCAN(r8, &(0x7f0000001e40)={&(0x7f0000001d00), 0xc, &(0x7f0000001e00)={&(0x7f0000001d80)={0x48, r9, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_SCAN_SUPP_RATES={0x34, 0x7d, [@NL80211_BAND_60GHZ={0x2e, 0x2, "1a7ae41172b71f216fb649a5328db3538d608a56758a517b6547076be5ccf2a5b8e6ceb05df0ae071c7c"}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x4008048}, 0x1e0c4) r10 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/dlm-monitor\x00', 0x200, 0x0) setsockopt$inet6_opts(r10, 0x29, 0x2e, &(0x7f0000001ec0)=@hopopts={0x33, 0x6, [], [@enc_lim={0x4, 0x1, 0xfe}, @hao={0xc9, 0x10, @rand_addr="9820072d7fce8d866c3273549321f67f"}, @generic={0x2, 0x1d, "9679b9212333e560071e5508890d79021cb4518ae3c147a009ce5e55b5"}]}, 0x40) r11 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/btrfs-control\x00', 0x8000, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000001fc0)={@multicast1, @remote, 0x0}, &(0x7f0000002000)=0xc) sendmsg$NL80211_CMD_SET_BSS(r11, &(0x7f0000002100)={&(0x7f0000001f40)={0x10, 0x0, 0x0, 0xa00}, 0xc, &(0x7f00000020c0)={&(0x7f0000002040)={0x5c, r9, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x4}, @NL80211_STA_WME_MAX_SP={0xb, 0x2, "c515ed470e8b6f"}, @NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0x200}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3f0, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r12}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x2}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x6a}, @NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0xac}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) socket$pppl2tp(0x18, 0x1, 0x1) r13 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000002140)='/dev/snapshot\x00', 0x48000, 0x0) ioctl$SG_GET_TIMEOUT(r13, 0x2202, 0x0) ioctl$BLKROGET(r13, 0x125e, &(0x7f0000002180)) r14 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000021c0)={0x0}, &(0x7f0000002200)=0xc) rt_tgsigqueueinfo(r14, r15, 0x25, &(0x7f0000002240)={0x37, 0x3, 0x1}) [ 301.250465][ T9893] team0: Port device team_slave_1 added [ 301.318619][ T9899] IPVS: ftp: loaded support on port[0] = 21 [ 301.407204][ T9893] device hsr_slave_0 entered promiscuous mode [ 301.454444][ T9893] device hsr_slave_1 entered promiscuous mode [ 301.494170][ T9893] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 301.502117][ T9893] Cannot create hsr debugfs directory 11:22:17 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x7, 0x22c180) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x0, 0x4, 0x4, 0xf040, 0x9, {0x0, 0x2710}, {0x2, 0x0, 0x2f, 0x5, 0x2, 0x7, "81224a4c"}, 0x7, 0x4, @planes=&(0x7f0000000040)={0x20, 0x2, @userptr=0x1, 0x5}, 0x5, 0x0, r0}) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000100)={0x1, 0x0, [{0xaed2b110853d5390, 0x0, 0x1}]}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x82800, 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0xd, &(0x7f0000000180)="fe5309d5ee669124131c176743304bb21533d7b1053bfa53d5582aabde884bc446af5d2a5169830fc36c476c8e2a6bbe2ccb6e818c2af5377508293278eef9e9c03c766b171e0c45b3d2b503a6f6be6872013f572dbf1982b908b2f566381683c6071457ebf6508a9cfec69b691fe767a8", 0x71) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x99, 0x208a41) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000280)={0x4, 0x1, 'client1\x00', 0x4, "612449633a821301", "4da51a7087beff9f5dc1e4459412d5fa9aadf5e7135bfda6afe215a0601a3804", 0x6, 0x6}) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000340)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x3881a966387174f9, 0x1, [@empty]}, 0x14) r4 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x48043) ioctl$KVM_X86_SET_MCE(r4, 0x4040ae9e, &(0x7f00000003c0)={0x0, 0x10000, 0x3f, 0x478ffa1f11bfc75c, 0x19}) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000400)={0x3, 0x0, 0x2, 0x10001}) r5 = syz_open_dev$sndseq(&(0x7f0000000440)='/dev/snd/seq\x00', 0x0, 0x202042) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r5, 0xc058534b, &(0x7f0000000480)={0x1, 0xfffffffe, 0x8, 0x4bccfe17, 0x10001, 0x732}) set_robust_list(&(0x7f0000000600)={&(0x7f0000000540)={&(0x7f0000000500)}, 0x3, &(0x7f00000005c0)={&(0x7f0000000580)}}, 0x18) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000640)={'mangle\x00'}, &(0x7f00000006c0)=0x54) syz_mount_image$bfs(&(0x7f0000000700)='bfs\x00', &(0x7f0000000740)='./file0\x00', 0x8871, 0x5, &(0x7f00000009c0)=[{&(0x7f0000000780)="df7d7ee8362ca4b6163d4f024ca5d0e1feeb747eff23318fc4971363658056e1a4df3df6bbcfa285", 0x28}, {&(0x7f00000007c0)="3ac67cf3c87a31", 0x7, 0x100}, {&(0x7f0000000800)="bbe32c0f74d2e2282100a5ddee2c7b6f3120b26a8325e85d17a3", 0x1a, 0x5}, {&(0x7f0000000840)="db741cd1d3e75a330969a8b566e49de57051ae25382f5a66f53cb7258d36fbab5c42f2c3ca9c0d2f894473af59c3a09601e312f33067757c438f35cf08f26dd387a52ffdd1671acc2ed8a1f4eeadc2b0288380f0b7651abcfc8f94b1709b", 0x5e, 0x4}, {&(0x7f00000008c0)="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", 0xff, 0x7}], 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000a40)="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") r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/bsg\x00', 0xfabb9effc86c25b4, 0x0) mount$fuseblk(&(0x7f0000000b40)='/dev/loop0\x00', &(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)='fuseblk\x00', 0x48000, &(0x7f0000000c40)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x400}}], [{@subj_role={'subj_role'}}]}}) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000d00)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000d80)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000d40)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r7, &(0x7f0000000dc0)={0x15, 0x110, 0xfa00, {r8, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}}}, 0x118) setsockopt$inet_opts(r6, 0x0, 0x9, &(0x7f0000000f00)="edf64365c856fabe033cb165f446c014420849a7b3961026425a90b6c653db3d74bdb60fcc9533d777c6b2443ce45eb6e8811276c582de75ee692927", 0x3c) syz_open_dev$vcsu(&(0x7f0000000f40)='/dev/vcsu#\x00', 0x40, 0x4000) io_setup(0x7fff, &(0x7f0000000f80)=0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ubi_ctrl\x00', 0x4000, 0x0) r12 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001300)={&(0x7f0000001180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x3, [@ptr={0xa, 0x0, 0x0, 0x2, 0x4}, @restrict={0x10, 0x0, 0x0, 0xb, 0x5}, @restrict={0x0, 0x0, 0x0, 0xb, 0x5}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1, 0x2}}, @restrict={0xb, 0x0, 0x0, 0xb, 0x2}, @ptr={0x2, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x61]}}, &(0x7f0000001200)=""/244, 0x6f, 0xf4}, 0x20) r13 = syz_open_dev$media(&(0x7f0000001440)='/dev/media#\x00', 0x4, 0x2000) r14 = syz_open_pts(0xffffffffffffffff, 0x10000) r15 = creat(&(0x7f0000001540)='./file1\x00', 0x0) r16 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000001700)={0x5, 0x0, 0x4, 0x40000, 0xc, {0x0, 0x7530}, {0x3, 0x1, 0x6, 0x9, 0x6a, 0x80, "a8fccba6"}, 0x81, 0x4, @planes=&(0x7f00000016c0)={0x6, 0x4, @fd=r2, 0xff}, 0x6d5, 0x0, 0xffffffffffffffff}) r18 = bpf$PROG_LOAD(0x5, &(0x7f0000001980)={0xc, 0xb, &(0x7f00000017c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffff}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x8}, @generic={0x6, 0x9, 0x9, 0xfff, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x6}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x10001}]}, &(0x7f0000001840)='GPL\x00', 0x5, 0x61, &(0x7f0000001880)=""/97, 0x41100, 0xc602ea9bb0c93662, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000001900)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000001940)={0x1, 0xc, 0x0, 0x7fff}, 0x10, 0xffffffffffffffff}, 0x78) r19 = eventfd2(0xe7, 0x800) r20 = syz_open_dev$sndseq(&(0x7f0000001ac0)='/dev/snd/seq\x00', 0x0, 0x101000) r21 = socket$inet_sctp(0x2, 0x1, 0x84) io_submit(r9, 0x8, &(0x7f0000001c80)=[&(0x7f0000001000)={0x0, 0x0, 0x0, 0x5, 0x9, 0xffffffffffffffff, &(0x7f0000000fc0)="02779b8b925092e884a5da8a53c42dc24264ad70", 0x14, 0x0, 0x0, 0x3}, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x8, 0x1f, r10, &(0x7f0000001040)="cb9572edd7bf5760dde5840386f8ca11d74361f882f0d30dc33c86f28c4748c4a0e6d30fed550611e1ed6fa0889d227c15d377bd194190640143260c0c672731bc6a9b7e5184bb8014020f921f9b7e7dda500a4220578a798f13894ebabaa6f1f983879856b3fbf678a205c75405a93a476e46b74ac56d90db83568fba6aa94f097816a4607e2d098de9c7ddf2c8b34f7e8e0fcb0afde50caf439b8f9dd12911e94056e7059955e1b928331aedf29c606c73732e9d00ef9886c52ec7", 0xbc, 0x9, 0x0, 0x8a7901a73a7b63, r11}, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x7, 0x101, r12, &(0x7f0000001340)="07638004b74e2d550cce90d14ffeecb1879e42eb4606817b7e5ea86588642fd87b4aebb7613b7949e5a3a42703354e6945555ab0e74ed12a3c810f0400a8da60df023b4a4e833cd33dadc6220356c6ecd4672a7444b39ed19c7191cfb06b99e244ed5a63a824d922e4c104da8f0ed67a3ed008fbeb856c955550868dca6676e90d85550b424114c1b45acc38804e134622cfd7b2434af766f9bd29048a47078f1a05bb852c68929c755b242dffdddf822564da734e693f5214a9a61a96f713dda831c5e592b512f4902da32fbbdfe02a", 0xd0, 0x0, 0x0, 0x1, r13}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x2c44, r14, &(0x7f00000014c0)="ef5fa72e3804baee4cd59a193ac365b0d01d281991cc57418a33fa4b3f29be56f3d6818f4096d429edcdfbf860bf2f1e55bbd949a5e84d0f42b6917711c54b66a056e5bc96111392c775df5cdc8c5591a3935d", 0x53, 0x9, 0x0, 0x6, r15}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x2, 0x0, r16, &(0x7f00000015c0)="6f54a8583e9c5c03e31a0e4c11a7c1090fd40fece57034b818082b5091bbdb775138a535fa2b7a712ef95a06928c0de2ea5cc6859f64def5cf2a1d6bb49b2db75581b270655b3cad54b517850d09e02ce0cc3c80d08c3624162f255c38ecdc490eb8035c99040ed8fdc2d0057764de9a9f25921636c142c661cdb79a5fb07273198964158eb6cd863e97e448917185572f603e860b7735e45718aab746b043efd03bdecfd22b57df3b505ad50d37d40dd9b5fcbf579a2c5adcd4121b566dbdcc9bf302048988836b77ddebb66db104f280d8f063cfd95f6094da82e6af", 0xdd, 0x1, 0x0, 0x70fad2b0d433b174, r17}, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x8, 0x18, r18, &(0x7f0000001a00)="8f5f761c8f86ad48a4d9d5f8ca7fec80809f7d7213f81c4e887bc2710d5ef2171990c27365524aecec703c82761ee2900f2a143638daef9461fee2db7ffb71e5eebc1bc5f3d758", 0x47, 0x9, 0x0, 0x0, r19}, &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x6, 0xfff, r20, &(0x7f0000001b00)="4f8e11f5307983c40292e93f4776521d29a69a821be77ab8cfbf3f93fd36169f36e004e07cde7757ad0b23d5522930e8c4ce4c382e1465a3b6135fbbe2f31a6aebf5303e33cd6b3b70fbf25153b9c4f6bf9c35f754c19b4fc9d3b68bae24cbc1c95bde6c788e260a78d1af4b416a8310ecb589bf9df01f2175dddbeba4d183bc66", 0x81, 0x1f, 0x0, 0x7, r4}, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x7, 0xfffc, r21, &(0x7f0000001c00)="4c77108241fbb8e06c9aeddf7d4b89b8dc128e805548978f9ebb93dd9425ec0004a144d02a415fdc563c8971266d9ba1c615e6", 0x33, 0x6, 0x0, 0x2}]) [ 301.548297][ T9901] IPVS: ftp: loaded support on port[0] = 21 [ 301.742288][ T9897] chnl_net:caif_netlink_parms(): no params data found [ 301.771161][ T9904] IPVS: ftp: loaded support on port[0] = 21 [ 301.838356][ T9897] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.845656][ T9897] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.853366][ T9897] device bridge_slave_0 entered promiscuous mode [ 301.866737][ T9897] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.873818][ T9897] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.881843][ T9897] device bridge_slave_1 entered promiscuous mode [ 301.939926][ T9893] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 301.997535][ T9891] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 302.058261][ T9897] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 302.078303][ T9893] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 302.156599][ T9891] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 302.209126][ T9891] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 302.268595][ T9891] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 302.340294][ T9897] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 302.351046][ T9893] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 302.427338][ T9897] team0: Port device team_slave_0 added [ 302.433513][ T9893] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 302.511708][ T9897] team0: Port device team_slave_1 added [ 302.550795][ T9899] chnl_net:caif_netlink_parms(): no params data found [ 302.597907][ T9901] chnl_net:caif_netlink_parms(): no params data found [ 302.666177][ T9897] device hsr_slave_0 entered promiscuous mode [ 302.725511][ T9897] device hsr_slave_1 entered promiscuous mode [ 302.774209][ T9897] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 302.781841][ T9897] Cannot create hsr debugfs directory [ 302.870262][ T9899] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.877720][ T9899] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.886917][ T9899] device bridge_slave_0 entered promiscuous mode [ 302.896065][ T9899] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.903158][ T9899] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.911304][ T9899] device bridge_slave_1 entered promiscuous mode [ 302.929091][ T9901] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.936883][ T9901] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.947800][ T9901] device bridge_slave_0 entered promiscuous mode [ 302.957146][ T9901] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.964448][ T9901] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.972473][ T9901] device bridge_slave_1 entered promiscuous mode [ 303.050090][ T9899] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 303.078886][ T9901] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 303.090710][ T9899] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 303.120799][ T9899] team0: Port device team_slave_0 added [ 303.141465][ T9901] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 303.152129][ T9904] chnl_net:caif_netlink_parms(): no params data found [ 303.163639][ T9899] team0: Port device team_slave_1 added [ 303.277590][ T9899] device hsr_slave_0 entered promiscuous mode [ 303.324415][ T9899] device hsr_slave_1 entered promiscuous mode [ 303.394231][ T9899] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 303.401866][ T9899] Cannot create hsr debugfs directory [ 303.425810][ T9901] team0: Port device team_slave_0 added [ 303.439412][ T9891] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.456824][ T9897] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 303.507342][ T9901] team0: Port device team_slave_1 added [ 303.513421][ T9897] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 303.604656][ T9897] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 303.641414][ T9897] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 303.740590][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 303.749173][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.775893][ T9891] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.837532][ T9901] device hsr_slave_0 entered promiscuous mode [ 303.874501][ T9901] device hsr_slave_1 entered promiscuous mode [ 303.914142][ T9901] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 303.921941][ T9901] Cannot create hsr debugfs directory [ 303.928048][ T9904] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.935454][ T9904] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.943250][ T9904] device bridge_slave_0 entered promiscuous mode [ 303.959071][ T9893] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.975401][ T9904] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.982603][ T9904] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.991218][ T9904] device bridge_slave_1 entered promiscuous mode [ 304.022083][ T9893] 8021q: adding VLAN 0 to HW filter on device team0 [ 304.059437][ T9904] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.070241][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 304.078972][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 304.087536][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 304.096435][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 304.105337][ T2746] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.112535][ T2746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.121158][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 304.131300][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 304.140123][ T2746] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.147242][ T2746] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.188166][ T9904] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.203886][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 304.216674][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 304.225797][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 304.234579][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 304.243047][ T2722] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.250158][ T2722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.291135][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 304.300109][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 304.309469][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 304.318725][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 304.327785][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 304.336713][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 304.346528][ T2774] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.353576][ T2774] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.386169][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 304.401678][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.410499][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 304.428933][ T9904] team0: Port device team_slave_0 added [ 304.440797][ T9904] team0: Port device team_slave_1 added [ 304.453145][ T9899] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 304.528330][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 304.539630][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.548860][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.558237][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 304.574198][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 304.582692][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.592641][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 304.601753][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 304.628405][ T9899] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 304.660872][ T9891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 304.677071][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 304.685459][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.694412][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 304.720677][ T9901] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 304.787815][ T9899] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 304.869379][ T9897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.877104][ T9901] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 304.946865][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.955757][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 305.027615][ T9904] device hsr_slave_0 entered promiscuous mode [ 305.084534][ T9904] device hsr_slave_1 entered promiscuous mode [ 305.124237][ T9904] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 305.131837][ T9904] Cannot create hsr debugfs directory [ 305.137556][ T9899] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 305.204274][ T9901] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 305.242417][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 305.251224][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 305.260153][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 305.268194][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 305.286471][ T9893] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 305.308990][ T9901] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 305.399967][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 305.408662][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 305.419444][ T9897] 8021q: adding VLAN 0 to HW filter on device team0 [ 305.458717][ T9891] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 305.471373][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 305.480036][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 305.496032][ T9893] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 305.515831][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 305.525622][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 305.534572][ T2772] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.541902][ T2772] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.549928][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 305.559070][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 305.567703][ T2772] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.575165][ T2772] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.583443][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 305.639183][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 305.648663][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 305.687910][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 305.701380][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 305.710866][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 305.720093][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 305.729999][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 305.746899][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 305.759184][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 305.812057][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 305.825246][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 305.833635][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 305.846016][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 305.857776][ T9904] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 305.920401][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 305.946743][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 305.957893][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 305.968174][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 305.977052][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 305.985747][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 305.993618][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 306.001973][ T9904] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 306.062130][ T9904] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 306.131291][ T9893] device veth0_vlan entered promiscuous mode [ 306.141585][ T9904] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 306.187774][ T9899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.203694][ T9893] device veth1_vlan entered promiscuous mode [ 306.231261][ T9891] device veth0_vlan entered promiscuous mode [ 306.261406][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 306.271557][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 306.280831][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 306.289853][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.303492][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 306.312000][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 306.336078][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 306.343657][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 306.390874][ T9897] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 306.406226][ T9891] device veth1_vlan entered promiscuous mode [ 306.430396][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 306.439698][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.452708][ T9899] 8021q: adding VLAN 0 to HW filter on device team0 [ 306.501132][ T9901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.569625][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 306.592060][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 306.612024][ T2744] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.619894][ T2744] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.620391][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 306.620964][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 306.646064][ T2744] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.646103][ T2744] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.646627][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 306.647231][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 306.664660][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 306.693091][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 306.702579][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 11:22:22 executing program 1: unshare(0x20400) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40044590, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "9bc21a9b6829afbbb844576db378db836cf621debc6adf7f6f2871719f2c9acf"}) [ 306.761595][ T9901] 8021q: adding VLAN 0 to HW filter on device team0 [ 306.843211][ T9904] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.852133][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 306.861314][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 306.871172][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 306.880415][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 306.889358][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 306.897983][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 306.907282][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 306.916456][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 306.925567][ T2746] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.932860][ T2746] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.942669][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 306.951273][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 306.959661][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 306.967852][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 306.994380][ T9897] device veth0_vlan entered promiscuous mode [ 307.005775][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 307.027093][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 307.036088][ T2722] bridge0: port 2(bridge_slave_1) entered blocking state 11:22:23 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xd23d239a8dece813}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 307.043392][ T2722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 307.051421][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 307.112330][ T9904] 8021q: adding VLAN 0 to HW filter on device team0 [ 307.136578][ T9897] device veth1_vlan entered promiscuous mode [ 307.174650][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 307.206318][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 307.265168][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 307.285118][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 307.306920][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 11:22:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0xd, &(0x7f0000000180)={{{@in6=@rand_addr="1003d3e1f7cb2f672a22a665b795df82", @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, 0xe8) [ 307.322520][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 307.332092][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 307.346719][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 307.359690][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 307.370779][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 307.388333][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 307.401403][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 307.410014][ T9939] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 307.436757][ T9939] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 307.453395][ T9939] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 307.472029][ T9899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 307.492974][ T9939] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=128, mo=e002c01c, mo2=0002] [ 307.502518][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 307.511830][ T9939] System zones: 0-7, 112-112 [ 307.525405][ T9939] EXT4-fs (loop1): mounting with "discard" option, but the device does not support discard [ 307.529718][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 307.542623][ T9939] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 307.546018][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 307.562450][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 307.585120][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 307.593908][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 307.602679][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 307.616220][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 307.637352][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 307.649069][ T2722] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 307.658288][ T2722] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.665526][ T2722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 307.682897][ T9901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 11:22:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x12, &(0x7f0000000180)={{{@in6=@rand_addr="1003d3e1f7cb2f672a22a665b795df82", @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, 0xe8) [ 307.725968][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 307.734172][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 307.743453][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 307.752338][ T2746] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.759586][ T2746] bridge0: port 2(bridge_slave_1) entered forwarding state [ 307.770964][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 307.800984][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 307.809576][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 307.817784][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 307.826989][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 307.834845][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 11:22:23 executing program 0: unshare(0x20400) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) [ 307.894806][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 307.915098][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 307.930766][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 307.960938][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 307.993701][ T2774] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 11:22:24 executing program 2: unshare(0x20400) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40044591, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "9bc21a9b6829afbbb844576db378db836cf621debc6adf7f6f2871719f2c9acf"}) [ 308.028526][ T9901] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 308.054452][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 308.063091][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 11:22:24 executing program 0: unshare(0x20400) socket$tipc(0x1e, 0x5, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ptmx\x00', 0x0, 0x0) socket$unix(0x1, 0x2000000000001, 0x0) socket$unix(0x1, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') syz_open_procfs(0x0, &(0x7f0000000100)='mountinfo\x00') pselect6(0x40, &(0x7f00000000c0)={0x3}, 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) [ 308.121121][ T9899] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 308.152131][ T9904] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 308.205788][ T9904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 11:22:24 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read$eventfd(r3, &(0x7f0000000380), 0x8) write$cgroup_pid(r1, &(0x7f00000002c0), 0x12) 11:22:24 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000004c0)={'filter\x00', 0xa, 0x4, 0x3c8, 0x110, 0x1f8, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@local, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@random="6d937a7ecfde"}, {}, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 'xfrm0\x00', 'veth1_vlan\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@remote, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {{@arp={@loopback, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 'lo\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) [ 308.262495][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 308.281456][ T2744] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 308.453560][ T9984] x_tables: unsorted underflow at hook 3 [ 308.478381][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 308.488618][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 308.521583][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 308.553764][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 308.573909][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 308.582687][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 308.592980][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 308.604663][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 308.619956][ T9904] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 308.633510][ T9899] device veth0_vlan entered promiscuous mode [ 308.654709][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 308.666567][ T2691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 308.700139][ T9899] device veth1_vlan entered promiscuous mode [ 308.714499][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 308.723136][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 308.747671][ T9901] device veth0_vlan entered promiscuous mode [ 308.763267][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 308.772965][ T2746] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 308.805166][ T9901] device veth1_vlan entered promiscuous mode [ 308.819564][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 308.833096][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 308.842803][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 308.902065][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 308.923797][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 308.949028][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 308.969051][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 308.980531][ T2772] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 308.999193][ T9904] device veth0_vlan entered promiscuous mode [ 309.024691][ T9904] device veth1_vlan entered promiscuous mode [ 309.103152][T10003] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=e87e7ddf) 11:22:25 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') r0 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fcntl$setlease(r0, 0x400, 0x1) 11:22:25 executing program 4: [ 309.380896][T10023] BFS-fs: bfs_fill_super(): No BFS filesystem on loop5 (magic=e87e7ddf) [ 309.516710][T10025] ------------[ cut here ]------------ [ 309.522599][T10025] WARNING: CPU: 1 PID: 10025 at fs/overlayfs/file.c:55 ovl_real_fdget_meta+0x4a3/0x540 [ 309.532236][T10025] Kernel panic - not syncing: panic_on_warn set ... [ 309.538953][T10025] CPU: 1 PID: 10025 Comm: syz-executor.3 Not tainted 5.5.0-rc6-next-20200116-syzkaller #0 [ 309.548853][T10025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.558923][T10025] Call Trace: [ 309.562398][T10025] dump_stack+0x197/0x210 [ 309.566765][T10025] ? ovl_real_fdget_meta+0x3b0/0x540 [ 309.572179][T10025] panic+0x2e3/0x75c [ 309.576096][T10025] ? add_taint.cold+0x16/0x16 [ 309.580796][T10025] ? printk+0xba/0xed [ 309.584800][T10025] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 309.590299][T10025] ? __warn.cold+0x14/0x3e [ 309.594744][T10025] ? ovl_real_fdget_meta+0x4a3/0x540 [ 309.600054][T10025] __warn.cold+0x2f/0x3e [ 309.604320][T10025] ? report_bug.cold+0x63/0xb2 [ 309.609108][T10025] ? ovl_real_fdget_meta+0x4a3/0x540 [ 309.614414][T10025] report_bug+0x289/0x300 [ 309.618778][T10025] do_error_trap+0x11b/0x200 [ 309.623401][T10025] do_invalid_op+0x37/0x50 [ 309.627866][T10025] ? ovl_real_fdget_meta+0x4a3/0x540 [ 309.633171][T10025] invalid_op+0x23/0x30 [ 309.637343][T10025] RIP: 0010:ovl_real_fdget_meta+0x4a3/0x540 [ 309.643260][T10025] Code: ff 4c 89 f7 e8 6e d9 2c ff e9 fb fc ff ff e8 64 d9 2c ff e9 c7 fc ff ff 4c 89 f7 e8 f7 d9 2c ff e9 5e fd ff ff e8 dd 41 ee fe <0f> 0b 41 bc fb ff ff ff e9 f9 fc ff ff e8 5b d9 2c ff e9 85 fb ff [ 309.662951][T10025] RSP: 0018:ffffc900030173e8 EFLAGS: 00010206 [ 309.669018][T10025] RAX: 0000000000040000 RBX: 0000000004149002 RCX: ffffc900104f8000 [ 309.677134][T10025] RDX: 000000000001bf70 RSI: ffffffff828755f3 RDI: 0000000000000005 [ 309.685163][T10025] RBP: ffffc90003017418 R08: ffff888097c22100 R09: 0000000000000000 [ 309.693161][T10025] R10: fffffbfff154a5c8 R11: ffffffff8aa52e47 R12: 000000000014b002 [ 309.701527][T10025] R13: ffff888098ef4780 R14: ffff888098ef47f8 R15: ffff8880925fb588 [ 309.709713][T10025] ? ovl_real_fdget_meta+0x4a3/0x540 [ 309.715034][T10025] ? ovl_real_fdget_meta+0x4a3/0x540 [ 309.720971][T10025] ovl_read_iter+0x11a/0x370 [ 309.725620][T10025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.731880][T10025] ? ovl_mmap+0x300/0x300 [ 309.736228][T10025] ? fsnotify+0xbb0/0xbb0 [ 309.740601][T10025] do_iter_readv_writev+0x711/0x8f0 [ 309.745831][T10025] ? no_seek_end_llseek_size+0x70/0x70 [ 309.751303][T10025] ? rw_verify_area+0x126/0x360 [ 309.756275][T10025] do_iter_read+0x27c/0x660 [ 309.761041][T10025] ? dup_iter+0x260/0x260 [ 309.765393][T10025] vfs_readv+0xf0/0x160 [ 309.769561][T10025] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 309.775771][T10025] ? push_pipe+0x3e2/0x6a0 [ 309.780358][T10025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 309.786611][T10025] ? iov_iter_get_pages_alloc+0x3a5/0x15b0 [ 309.792431][T10025] ? iov_iter_for_each_range+0x7d0/0x7d0 [ 309.798213][T10025] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 309.807252][T10025] default_file_splice_read+0x4fb/0xa20 [ 309.812803][T10025] ? free_unref_page+0x101/0x180 [ 309.818352][T10025] ? __put_page+0x105/0x3b0 [ 309.822865][T10025] ? iter_file_splice_write+0xc10/0xc10 [ 309.828426][T10025] ? __put_page+0x10a/0x3b0 [ 309.832944][T10025] ? generic_pipe_buf_release+0x1e6/0x250 [ 309.838691][T10025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 309.844944][T10025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.851187][T10025] ? fsnotify+0x7fd/0xbb0 [ 309.855552][T10025] ? security_file_permission+0x8f/0x380 [ 309.861303][T10025] ? rw_verify_area+0x126/0x360 [ 309.866170][T10025] ? iter_file_splice_write+0xc10/0xc10 [ 309.871730][T10025] do_splice_to+0x127/0x180 [ 309.876431][T10025] splice_direct_to_actor+0x320/0xa30 [ 309.881903][T10025] ? generic_pipe_buf_nosteal+0x10/0x10 [ 309.887462][T10025] ? do_splice_to+0x180/0x180 [ 309.892250][T10025] ? rw_verify_area+0x126/0x360 [ 309.897122][T10025] do_splice_direct+0x1da/0x2a0 [ 309.901989][T10025] ? splice_direct_to_actor+0xa30/0xa30 [ 309.907645][T10025] ? rcu_read_lock_any_held+0xcd/0xf0 [ 309.913285][T10025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.919671][T10025] ? __this_cpu_preempt_check+0x35/0x190 [ 309.925441][T10025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.931921][T10025] ? __sb_start_write+0x1e5/0x460 [ 309.937093][T10025] do_sendfile+0x597/0xd00 [ 309.942893][T10025] ? do_compat_pwritev64+0x1c0/0x1c0 [ 309.948467][T10025] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 309.954735][T10025] ? _copy_from_user+0x12c/0x1a0 [ 309.959701][T10025] __x64_sys_sendfile64+0x15a/0x220 [ 309.964916][T10025] ? __ia32_sys_sendfile+0x230/0x230 [ 309.970257][T10025] ? do_syscall_64+0x26/0x790 [ 309.974975][T10025] ? lockdep_hardirqs_on+0x421/0x5e0 [ 309.980532][T10025] ? trace_hardirqs_on+0x67/0x240 [ 309.985952][T10025] do_syscall_64+0xfa/0x790 [ 309.990472][T10025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.996593][T10025] RIP: 0033:0x45aff9 [ 310.000607][T10025] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.020626][T10025] RSP: 002b:00007f569059ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 310.029071][T10025] RAX: ffffffffffffffda RBX: 00007f569059b6d4 RCX: 000000000045aff9 [ 310.037318][T10025] RDX: 00000000200001c0 RSI: 0000000000000003 RDI: 0000000000000003 [ 310.045308][T10025] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 310.053406][T10025] R10: 00008080fffffffe R11: 0000000000000246 R12: 00000000ffffffff [ 310.061523][T10025] R13: 00000000000008a2 R14: 00000000004c9bce R15: 000000000075bfd4 [ 310.071232][T10025] Kernel Offset: disabled [ 310.075734][T10025] Rebooting in 86400 seconds..