[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 34.370424][ T25] audit: type=1800 audit(1570437137.177:25): pid=7100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 34.397845][ T25] audit: type=1800 audit(1570437137.177:26): pid=7100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 34.424834][ T25] audit: type=1800 audit(1570437137.177:27): pid=7100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.14' (ECDSA) to the list of known hosts. 2019/10/07 08:32:28 fuzzer started 2019/10/07 08:32:29 dialing manager at 10.128.0.105:39369 2019/10/07 08:32:29 syscalls: 2523 2019/10/07 08:32:29 code coverage: enabled 2019/10/07 08:32:29 comparison tracing: enabled 2019/10/07 08:32:29 extra coverage: extra coverage is not supported by the kernel 2019/10/07 08:32:29 setuid sandbox: enabled 2019/10/07 08:32:29 namespace sandbox: enabled 2019/10/07 08:32:29 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/07 08:32:29 fault injection: enabled 2019/10/07 08:32:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/07 08:32:29 net packet injection: enabled 2019/10/07 08:32:29 net device setup: enabled 2019/10/07 08:32:29 concurrency sanitizer: enabled 08:32:32 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000002c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)=""/173}, {&(0x7f0000000040)=""/54, 0xfffffffffffffe4d}, {&(0x7f0000000540)=""/190}, {&(0x7f0000000600)=""/152}, {&(0x7f0000000100)=""/109}], 0x0, &(0x7f0000000740)=""/4096, 0xffffffffffffff85}}], 0x2db, 0x2, 0x0) syzkaller login: [ 49.504579][ T7271] IPVS: ftp: loaded support on port[0] = 21 08:32:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130009006900000000000000ab0080480a00000046000107000000141900040010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 49.588011][ T7271] chnl_net:caif_netlink_parms(): no params data found [ 49.627923][ T7271] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.647287][ T7271] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.667308][ T7271] device bridge_slave_0 entered promiscuous mode [ 49.674805][ T7271] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.697286][ T7271] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.705146][ T7271] device bridge_slave_1 entered promiscuous mode [ 49.727301][ T7271] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 49.739306][ T7271] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 49.763093][ T7271] team0: Port device team_slave_0 added [ 49.770123][ T7271] team0: Port device team_slave_1 added [ 49.859958][ T7271] device hsr_slave_0 entered promiscuous mode 08:32:32 executing program 2: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 49.918332][ T7271] device hsr_slave_1 entered promiscuous mode [ 49.965174][ T7274] IPVS: ftp: loaded support on port[0] = 21 [ 49.988581][ T7271] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.995710][ T7271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.003079][ T7271] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.010157][ T7271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.165129][ T7276] IPVS: ftp: loaded support on port[0] = 21 [ 50.205595][ T7271] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.241799][ T7274] chnl_net:caif_netlink_parms(): no params data found [ 50.288043][ T7271] 8021q: adding VLAN 0 to HW filter on device team0 [ 50.304087][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.312890][ T3021] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.331768][ T3021] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.340867][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 50.360555][ T7274] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.367740][ T7274] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.375730][ T7274] device bridge_slave_0 entered promiscuous mode 08:32:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x5, 0x102) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f00000001c0), &(0x7f0000000240)=0x80) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x7, [@dev={[], 0xe}, @link_local, @dev, @empty, @remote, @remote, @remote]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) socket(0x10, 0x5, 0x8) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) [ 50.384322][ T7274] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.391879][ T7274] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.400245][ T7274] device bridge_slave_1 entered promiscuous mode [ 50.428362][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.437176][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.444329][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.452498][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.461897][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.469002][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.486188][ T7274] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.544372][ T7274] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.613326][ T7276] chnl_net:caif_netlink_parms(): no params data found [ 50.630540][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 50.658474][ T7274] team0: Port device team_slave_0 added [ 50.690299][ T7281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 50.699296][ T7281] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 50.715260][ T7281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 50.726778][ T7281] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.735827][ T7281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 50.746269][ T7281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.754883][ T7281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 50.765463][ T7281] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.775742][ T7271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 50.787089][ T7274] team0: Port device team_slave_1 added [ 50.810484][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 08:32:33 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'system.', 'selinux(+\x00'}, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) umount2(&(0x7f0000000100)='./file0\x00', 0x2) read$FUSE(r0, 0x0, 0x0) [ 50.840179][ T7283] IPVS: ftp: loaded support on port[0] = 21 [ 50.845443][ T7276] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.854817][ T7276] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.865362][ T7276] device bridge_slave_0 entered promiscuous mode [ 50.880320][ T7271] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 50.942594][ T7274] device hsr_slave_0 entered promiscuous mode [ 50.999855][ T7274] device hsr_slave_1 entered promiscuous mode [ 51.039535][ T7274] debugfs: Directory 'hsr0' with parent '/' already present! [ 51.063108][ T7276] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.070571][ T7276] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.088183][ T7276] device bridge_slave_1 entered promiscuous mode [ 51.154612][ T7276] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 08:32:34 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) [ 51.195069][ T7287] IPVS: ftp: loaded support on port[0] = 21 [ 51.213214][ T7276] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.254159][ T7274] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.322070][ T7274] 8021q: adding VLAN 0 to HW filter on device team0 [ 51.340426][ T7281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 51.352050][ T7281] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 51.389049][ T7276] team0: Port device team_slave_0 added [ 51.401439][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 51.412940][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 51.422546][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.429825][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.441375][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 51.450315][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 51.461990][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.469077][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.476713][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 51.487853][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 51.496558][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 51.505293][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 51.528425][ T7276] team0: Port device team_slave_1 added [ 51.540340][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 51.548973][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 51.557084][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 51.592385][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.600841][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 51.670504][ T7276] device hsr_slave_0 entered promiscuous mode [ 51.707621][ T7276] device hsr_slave_1 entered promiscuous mode [ 51.757278][ T7276] debugfs: Directory 'hsr0' with parent '/' already present! [ 51.769386][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 51.778262][ T7283] chnl_net:caif_netlink_parms(): no params data found [ 51.782884][ T7295] IPVS: ftp: loaded support on port[0] = 21 [ 51.825046][ T7274] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.920331][ T7283] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.927724][ T7283] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.935740][ T7283] device bridge_slave_0 entered promiscuous mode [ 51.952973][ T7276] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.982656][ T7287] chnl_net:caif_netlink_parms(): no params data found [ 51.995033][ T7283] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.003257][ T7283] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.014059][ T7283] device bridge_slave_1 entered promiscuous mode [ 52.026849][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.035679][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.044758][ T7276] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.056515][ T7306] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 08:32:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130009006900000000000000ab0080480a00000046000107000000141900040010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 52.079018][ C0] hrtimer: interrupt took 27060 ns [ 52.100238][ T7283] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.158888][ T7283] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.171569][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.180417][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.188896][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.196086][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.205769][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 52.214028][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.223040][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.231460][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.238569][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state 08:32:35 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000002c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)=""/173}, {&(0x7f0000000040)=""/54, 0xfffffffffffffe4d}, {&(0x7f0000000540)=""/190}, {&(0x7f0000000600)=""/152}, {&(0x7f0000000100)=""/109}], 0x0, &(0x7f0000000740)=""/4096, 0xffffffffffffff85}}], 0x2db, 0x2, 0x0) [ 52.254477][ T7309] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 08:32:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130009006900000000000000ab0080480a00000046000107000000141900040010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 52.305363][ T7276] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 52.325294][ T7276] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 52.377156][ T7283] team0: Port device team_slave_0 added [ 52.389498][ T7278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.402710][ T7278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.422282][ T7278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.431016][ T7278] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.440101][ T7278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.448734][ T7278] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.457043][ T7278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.465511][ T7278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.473938][ T7278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 52.482148][ T7278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.493424][ T7278] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.501516][ T7278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.509603][ T7287] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.516784][ T7287] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.524917][ T7287] device bridge_slave_0 entered promiscuous mode [ 52.532577][ T7287] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.540442][ T7287] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.548402][ T7287] device bridge_slave_1 entered promiscuous mode [ 52.562360][ T7283] team0: Port device team_slave_1 added [ 52.568168][ T7317] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 52.576652][ T7295] chnl_net:caif_netlink_parms(): no params data found 08:32:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130009006900000000000000ab0080480a00000046000107000000141900040010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 52.625982][ T7287] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.641829][ T7287] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.656480][ T7276] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 52.720443][ T7283] device hsr_slave_0 entered promiscuous mode [ 52.770118][ T7283] device hsr_slave_1 entered promiscuous mode [ 52.817284][ T7283] debugfs: Directory 'hsr0' with parent '/' already present! [ 52.831732][ T7287] team0: Port device team_slave_0 added [ 52.839002][ T7287] team0: Port device team_slave_1 added [ 52.844755][ T7321] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 08:32:35 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000002c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)=""/173}, {&(0x7f0000000040)=""/54, 0xfffffffffffffe4d}, {&(0x7f0000000540)=""/190}, {&(0x7f0000000600)=""/152}, {&(0x7f0000000100)=""/109}], 0x0, &(0x7f0000000740)=""/4096, 0xffffffffffffff85}}], 0x2db, 0x2, 0x0) [ 52.862174][ T7295] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.873609][ T7295] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.882755][ T7295] device bridge_slave_0 entered promiscuous mode [ 52.931935][ T7295] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.939528][ T7295] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.957536][ T7295] device bridge_slave_1 entered promiscuous mode [ 53.010038][ T7287] device hsr_slave_0 entered promiscuous mode [ 53.047749][ T7287] device hsr_slave_1 entered promiscuous mode [ 53.087311][ T7287] debugfs: Directory 'hsr0' with parent '/' already present! [ 53.162665][ T7283] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.183093][ T7295] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 08:32:36 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000002c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)=""/173}, {&(0x7f0000000040)=""/54, 0xfffffffffffffe4d}, {&(0x7f0000000540)=""/190}, {&(0x7f0000000600)=""/152}, {&(0x7f0000000100)=""/109}], 0x0, &(0x7f0000000740)=""/4096, 0xffffffffffffff85}}], 0x2db, 0x2, 0x0) 08:32:36 executing program 2: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 53.215804][ T7283] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.243093][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.253239][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.298887][ T7295] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.324974][ T7287] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.351418][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 53.378076][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.386692][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.404378][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.411506][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.434527][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.444288][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.455735][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.462844][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.471971][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.481496][ T7303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.498374][ T7295] team0: Port device team_slave_0 added 08:32:36 executing program 2: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 53.520617][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.535712][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.558766][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 08:32:36 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000002c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)=""/173}, {&(0x7f0000000040)=""/54, 0xfffffffffffffe4d}, {&(0x7f0000000540)=""/190}, {&(0x7f0000000600)=""/152}, {&(0x7f0000000100)=""/109}], 0x0, &(0x7f0000000740)=""/4096, 0xffffffffffffff85}}], 0x2db, 0x2, 0x0) [ 53.574348][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.588041][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.599316][ T7295] team0: Port device team_slave_1 added [ 53.613455][ T7283] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 53.637422][ T7283] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 53.660491][ T7287] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.674577][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.683898][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.712567][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.723725][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.733020][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.741186][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.780406][ T7283] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.799916][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.819097][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.838115][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.850724][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.857895][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.872047][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.883064][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.894733][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.901829][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.914807][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.933861][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.963361][ T7287] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 53.978921][ T7287] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.039955][ T7295] device hsr_slave_0 entered promiscuous mode [ 54.067705][ T7295] device hsr_slave_1 entered promiscuous mode [ 54.117349][ T7295] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.124920][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.133057][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.142373][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.151379][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.160372][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.169212][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.177737][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.186213][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.194739][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.203416][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.211795][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.288265][ T7287] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.308825][ T7295] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.324488][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.332557][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.342516][ T7295] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.352098][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.372386][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.381114][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.396740][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.405145][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.480324][ T7303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.493000][ T7303] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.501639][ T7303] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.508736][ T7303] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.518248][ T7303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.527516][ T7303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.536377][ T7303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.545333][ T7303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.554234][ T7303] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.562940][ T7303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.572206][ T7303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.580704][ T7303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.590262][ T7303] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.601790][ T7295] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:32:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x5, 0x102) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f00000001c0), &(0x7f0000000240)=0x80) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x7, [@dev={[], 0xe}, @link_local, @dev, @empty, @remote, @remote, @remote]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) socket(0x10, 0x5, 0x8) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) [ 54.681365][ T7295] 8021q: adding VLAN 0 to HW filter on device batadv0 08:32:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'system.', 'selinux(+\x00'}, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) umount2(&(0x7f0000000100)='./file0\x00', 0x2) read$FUSE(r0, 0x0, 0x0) 08:32:37 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:37 executing program 0: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:32:37 executing program 2: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:32:37 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000002c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)=""/173}, {&(0x7f0000000040)=""/54, 0xfffffffffffffe4d}, {&(0x7f0000000540)=""/190}, {&(0x7f0000000600)=""/152}, {&(0x7f0000000100)=""/109}], 0x0, &(0x7f0000000740)=""/4096, 0xffffffffffffff85}}], 0x2db, 0x2, 0x0) 08:32:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x5, 0x102) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f00000001c0), &(0x7f0000000240)=0x80) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x7, [@dev={[], 0xe}, @link_local, @dev, @empty, @remote, @remote, @remote]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) socket(0x10, 0x5, 0x8) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) 08:32:37 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'system.', 'selinux(+\x00'}, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) umount2(&(0x7f0000000100)='./file0\x00', 0x2) read$FUSE(r0, 0x0, 0x0) 08:32:38 executing program 0: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:32:38 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x5, 0x102) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f00000001c0), &(0x7f0000000240)=0x80) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x7, [@dev={[], 0xe}, @link_local, @dev, @empty, @remote, @remote, @remote]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) socket(0x10, 0x5, 0x8) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) 08:32:38 executing program 0: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)={0x15, 0x65, 0xffff, 0x8001, 0x8, '9P2000.L'}, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000400)={0xa0}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 08:32:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'system.', 'selinux(+\x00'}, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) umount2(&(0x7f0000000100)='./file0\x00', 0x2) read$FUSE(r0, 0x0, 0x0) 08:32:38 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:39 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:39 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:39 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) [ 56.659745][ T26] device bridge_slave_1 left promiscuous mode [ 56.666031][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.758026][ T26] device bridge_slave_0 left promiscuous mode [ 56.764379][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.507437][ T26] device hsr_slave_0 left promiscuous mode [ 57.557423][ T26] device hsr_slave_1 left promiscuous mode [ 57.635916][ T26] team0 (unregistering): Port device team_slave_1 removed [ 57.647064][ T26] team0 (unregistering): Port device team_slave_0 removed [ 57.658605][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 57.701533][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 57.773261][ T26] bond0 (unregistering): Released all slaves 08:32:41 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000002c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180), 0x10}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000001740)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000480)=""/173}, {&(0x7f0000000040)=""/54, 0xfffffffffffffe4d}, {&(0x7f0000000540)=""/190}, {&(0x7f0000000600)=""/152}, {&(0x7f0000000100)=""/109}], 0x0, &(0x7f0000000740)=""/4096, 0xffffffffffffff85}}], 0x2db, 0x2, 0x0) 08:32:41 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:41 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:41 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:41 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) [ 58.741605][ T7437] IPVS: ftp: loaded support on port[0] = 21 [ 59.006317][ T7437] chnl_net:caif_netlink_parms(): no params data found [ 59.166904][ T7437] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.182353][ T7437] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.193996][ T7437] device bridge_slave_0 entered promiscuous mode [ 59.204998][ T7437] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.215107][ T7437] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.226361][ T7437] device bridge_slave_1 entered promiscuous mode [ 59.262622][ T7437] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 59.280151][ T7437] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 59.314076][ T7437] team0: Port device team_slave_0 added [ 59.323877][ T7437] team0: Port device team_slave_1 added [ 59.419954][ T7437] device hsr_slave_0 entered promiscuous mode [ 59.464306][ T7437] device hsr_slave_1 entered promiscuous mode [ 59.557507][ T7437] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.617636][ T7437] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.624763][ T7437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.632099][ T7437] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.639185][ T7437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.760000][ T7437] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.856073][ T7437] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.884112][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.081935][ T7279] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.103423][ T7279] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.119738][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 60.171779][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.188639][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.197232][ T7279] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.204308][ T7279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.218667][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.231086][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.240652][ T7279] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.247872][ T7279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.255964][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.265247][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.274031][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.282679][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.291326][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.300014][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.308796][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.317102][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.327489][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 60.335747][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.344186][ T7279] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.353937][ T7437] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.369460][ T7437] 8021q: adding VLAN 0 to HW filter on device batadv0 08:32:43 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:43 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:43 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:43 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:43 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:43 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:44 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:44 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:44 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:44 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) 08:32:44 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x33}, 0x0, @in6=@local, 0x0, 0x0, 0x0, 0x6, 0xfffffffffffffffd}}, 0xe8) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x400000000000058, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TIOCSRS485(0xffffffffffffffff, 0x542f, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x101801, 0x0) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x20000) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4b0000, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0x72c, 0x1}, 0x4) [ 61.469141][ T7239] ================================================================== [ 61.477340][ T7239] BUG: KCSAN: data-race in tomoyo_supervisor / tomoyo_supervisor [ 61.485047][ T7239] [ 61.487383][ T7239] write to 0xffffffff860bff44 of 4 bytes by task 7403 on cpu 0: [ 61.495013][ T7239] tomoyo_supervisor+0x1c9/0xd20 [ 61.499973][ T7239] tomoyo_path_permission+0x121/0x160 [ 61.505371][ T7239] tomoyo_path_perm+0x23e/0x390 [ 61.510227][ T7239] tomoyo_inode_getattr+0x26/0x40 [ 61.515422][ T7239] security_inode_getattr+0x9b/0xd0 [ 61.520617][ T7239] vfs_getattr+0x2e/0x70 [ 61.524857][ T7239] vfs_statx_fd+0x7a/0xd0 [ 61.530311][ T7239] __do_sys_newfstat+0x49/0xa0 [ 61.535494][ T7239] __x64_sys_newfstat+0x3a/0x50 [ 61.540373][ T7239] do_syscall_64+0xcf/0x2f0 [ 61.544912][ T7239] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.550787][ T7239] [ 61.553219][ T7239] read to 0xffffffff860bff44 of 4 bytes by task 7239 on cpu 1: [ 61.560762][ T7239] tomoyo_supervisor+0x1b0/0xd20 [ 61.565696][ T7239] tomoyo_path_permission+0x121/0x160 [ 61.571083][ T7239] tomoyo_path_perm+0x23e/0x390 [ 61.575943][ T7239] tomoyo_inode_getattr+0x26/0x40 [ 61.580973][ T7239] security_inode_getattr+0x9b/0xd0 [ 61.586177][ T7239] vfs_getattr+0x2e/0x70 [ 61.590509][ T7239] vfs_statx_fd+0x7a/0xd0 [ 61.594854][ T7239] __do_sys_newfstat+0x49/0xa0 [ 61.599631][ T7239] __x64_sys_newfstat+0x3a/0x50 [ 61.604489][ T7239] do_syscall_64+0xcf/0x2f0 [ 61.609828][ T7239] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.615725][ T7239] [ 61.618041][ T7239] Reported by Kernel Concurrency Sanitizer on: [ 61.624190][ T7239] CPU: 1 PID: 7239 Comm: udevd Not tainted 5.3.0+ #0 [ 61.630951][ T7239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.641023][ T7239] ================================================================== [ 61.649226][ T7239] Kernel panic - not syncing: panic_on_warn set ... [ 61.655818][ T7239] CPU: 1 PID: 7239 Comm: udevd Not tainted 5.3.0+ #0 [ 61.662486][ T7239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 61.672673][ T7239] Call Trace: [ 61.675972][ T7239] dump_stack+0xf5/0x159 [ 61.680218][ T7239] panic+0x209/0x639 [ 61.684114][ T7239] ? vprintk_func+0x8d/0x140 [ 61.688706][ T7239] kcsan_report.cold+0x57/0xeb [ 61.693473][ T7239] __kcsan_setup_watchpoint+0x342/0x500 [ 61.699033][ T7239] __tsan_read4+0x2c/0x30 [ 61.703376][ T7239] tomoyo_supervisor+0x1b0/0xd20 [ 61.708670][ T7239] ? tomoyo_path_matches_pattern+0xa1/0x160 [ 61.714580][ T7239] ? __tsan_write1+0x32/0x40 [ 61.719179][ T7239] ? tomoyo_compare_name_union+0xa0/0xa0 [ 61.724831][ T7239] tomoyo_path_permission+0x121/0x160 [ 61.730210][ T7239] tomoyo_path_perm+0x23e/0x390 [ 61.735106][ T7239] tomoyo_inode_getattr+0x26/0x40 [ 61.740133][ T7239] security_inode_getattr+0x9b/0xd0 [ 61.745345][ T7239] vfs_getattr+0x2e/0x70 [ 61.749765][ T7239] vfs_statx_fd+0x7a/0xd0 [ 61.754098][ T7239] __do_sys_newfstat+0x49/0xa0 [ 61.758862][ T7239] ? putname+0xb1/0xe0 [ 61.762939][ T7239] ? __tsan_read8+0x2c/0x30 [ 61.767449][ T7239] __x64_sys_newfstat+0x3a/0x50 [ 61.772306][ T7239] do_syscall_64+0xcf/0x2f0 [ 61.776819][ T7239] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 61.782795][ T7239] RIP: 0033:0x7f7328adecb4 [ 61.787241][ T7239] Code: 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 90 90 83 ff 01 89 f0 77 19 48 63 f8 48 89 d6 b8 05 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 18 f3 c3 66 90 48 8b 05 51 51 2b 00 64 c7 00 [ 61.807637][ T7239] RSP: 002b:00007fff6d046988 EFLAGS: 00000246 ORIG_RAX: 0000000000000005 [ 61.816070][ T7239] RAX: ffffffffffffffda RBX: 0000000001cf1450 RCX: 00007f7328adecb4 [ 61.824043][ T7239] RDX: 00007fff6d046990 RSI: 00007fff6d046990 RDI: 0000000000000005 [ 61.832014][ T7239] RBP: 00000000ffffffff R08: 00007f73293d77a0 R09: 00007f73293d77a0 [ 61.839980][ T7239] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000420724 [ 61.847973][ T7239] R13: 0000000000000002 R14: 0000000000420724 R15: 0000000000420724 [ 61.857373][ T7239] Kernel Offset: disabled [ 61.861695][ T7239] Rebooting in 86400 seconds..