[ 34.831611][ T26] audit: type=1800 audit(1553412775.639:30): pid=7387 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.173' (ECDSA) to the list of known hosts. 2019/03/24 07:33:02 fuzzer started 2019/03/24 07:33:05 dialing manager at 10.128.0.26:44023 2019/03/24 07:33:05 syscalls: 1 2019/03/24 07:33:05 code coverage: enabled 2019/03/24 07:33:05 comparison tracing: enabled 2019/03/24 07:33:05 extra coverage: extra coverage is not supported by the kernel 2019/03/24 07:33:05 setuid sandbox: enabled 2019/03/24 07:33:05 namespace sandbox: enabled 2019/03/24 07:33:05 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/24 07:33:05 fault injection: enabled 2019/03/24 07:33:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/24 07:33:05 net packet injection: enabled 2019/03/24 07:33:05 net device setup: enabled 07:34:45 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040)={0x7fffffff}, 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x2, 0x400000) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) r2 = dup2(r0, r0) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f00000000c0)={0x5000, 0x0, 0xfffffffffffffffb, 0x2565, 0x5}) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x5) r3 = openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r2) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000140)=0x400) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180)=0x2, 0x4) connect$bt_rfcomm(r1, &(0x7f00000001c0)={0x1f, {0x0, 0x5, 0x100, 0x1, 0x8}}, 0xa) r4 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x9, 0x20000) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20008000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r5, 0x100, 0x70bd29, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24004800}, 0x8000) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000380)) flock(r1, 0xe) fsetxattr$security_smack_transmute(r2, &(0x7f00000003c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x4, 0x3) sendmsg$nl_route(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200200}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@ipv6_getnetconf={0x1c, 0x52, 0x305, 0x70bd29, 0x25dfdbfd, {}, [@IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0xc001) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000540)={0xffffffffffffffff}, 0x117, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r6, 0x7fffffff, 0x0, 0x0, 0x0, @in={0x2, 0x4e24, @rand_addr=0xffff}, @in6={0xa, 0x4e23, 0x7fffffff, @empty, 0x9fd2}}}, 0x118) r7 = syz_open_dev$midi(&(0x7f0000000700)='/dev/midi#\x00', 0x4, 0x20000) openat$ppp(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ppp\x00', 0x80000, 0x0) sendfile(r7, r3, &(0x7f0000000780), 0x9) r8 = semget$private(0x0, 0x2, 0x2) semctl$SETALL(r8, 0x0, 0x11, &(0x7f00000007c0)=[0x80000001, 0x7, 0x1, 0x4, 0x7fffffff, 0x9]) connect$netlink(r4, &(0x7f0000000800)=@kern={0x10, 0x0, 0x0, 0x364425}, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000840)=0xe, 0x4) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000880)={0x0, 0x0, [0x8, 0x6, 0xc0, 0x2903]}) syzkaller login: [ 144.479442][ T7551] IPVS: ftp: loaded support on port[0] = 21 07:34:45 executing program 1: prctl$PR_GET_KEEPCAPS(0x7) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x20000) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e24, 0x6, @loopback, 0xad6}, {0xa, 0x4e20, 0x7, @local, 0x8}, 0x7, [0x81, 0x10001, 0x7fff, 0x13ad, 0x3, 0x2, 0x8, 0x4]}, 0x5c) r1 = getpid() fcntl$setown(r0, 0x8, r1) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f00000000c0)="904d94855c0a275a96cf28cd91c94baa53ad565317226c0396f874310d43d45575176ea7f9c87fbe988d08ca27495552935fd61e9cb2787c0afc6bac5ea5f3d15a2932b554e6fba2df566d731929a8dc11ba08efc31de7eeee74fd5d502a3e4cb2d645d7225d1d4146a11b57161c94fba0209e938f3680d89278938bf7714f563a4836b8bf62091d3b89b3d70e6f5230198081f7d1b4eb0e6644083889029d3de16ccbea20b2f387a1fb67be04de5ad942641f7b36662302dcdb1e47628f2a156ee2436002a0aebe950be91fa87bb16e2e19e5f674584d02fd6b9c52d6a2591c37e6da6855cea2f3d33f9fa02d8e1cc44b9d5fbdbc") ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f00000001c0)) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x1}, 0x8) setsockopt(r0, 0x9, 0x4, &(0x7f0000000240)="d8064fc0ba2e6c357c7c9a242d7e38d48f7a781fe914fa910096c30fd3658caa93c0f5ea0b6212b60bb74c33e1d510b3ffdcaedd0dc51ba2e5da90b4e2a3636cd1bfe96e2151895bbcd45290644ce9afd7995f46b3fb1290e5c2a8b7302a6fff16", 0x61) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$DRM_IOCTL_GET_STATS(r0, 0x807c6406, &(0x7f00000002c0)=""/3) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000400)={&(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x8, 0x8, 0x8}) mknod$loop(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000480)={0xf, @output={0x1000, 0x1, {0x5, 0x5}, 0x5}}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000580)=0xfff, 0x4) mq_open(&(0x7f00000005c0)='/dev/snd/pcmC#D#c\x00', 0x40, 0x60, &(0x7f0000000600)={0x8, 0x81, 0x10001, 0x3ff, 0x9, 0x59, 0x44f, 0x8}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000640)={0x0, @in={{0x2, 0x4e21, @empty}}, [0x3, 0x4, 0x3f, 0x2, 0x1, 0x3640, 0x4, 0x100000001, 0x100000000, 0x2, 0x9, 0x1, 0x80, 0x6]}, &(0x7f0000000740)=0x100) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000780)=@assoc_value={r2, 0x160}, &(0x7f00000007c0)=0x8) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000800)) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000840)=0x6) rename(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='./file0\x00') ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000940)={0x0, 0xffffffffffffffe1, 0x3, &(0x7f0000000900)=0x4}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000009c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000a80)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x30, r3, 0x400, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x40) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000ac0)) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000b00)) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000b80)={'filter\x00', 0x7, 0x4, 0x57c, 0x0, 0x0, 0x0, 0x498, 0x498, 0x498, 0x4, &(0x7f0000000b40), {[{{@arp={@multicast2, @dev={0xac, 0x14, 0x14, 0x1d}, 0xff, 0x0, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, @empty, {[0xff, 0x0, 0xff, 0xff, 0xff, 0xff]}, 0x81, 0x4, 0x1, 0x6, 0x1, 0x8, 'bcsf0\x00', 'ifb0\x00', {0xff}, {0xff}, 0x0, 0x340}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x100000001, 'system_u:object_r:autofs_device_t:s0\x00'}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xa, 0xffffffff}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @mac=@link_local, @empty, @remote, 0xf, 0xffffffff}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0x5c8) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000001180)=0x56b4dbcc) write$P9_RMKNOD(r0, &(0x7f00000011c0)={0x14, 0x13, 0x1, {0x84, 0x4, 0x6}}, 0x14) [ 144.579511][ T7551] chnl_net:caif_netlink_parms(): no params data found [ 144.666275][ T7551] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.673807][ T7551] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.690667][ T7554] IPVS: ftp: loaded support on port[0] = 21 [ 144.693869][ T7551] device bridge_slave_0 entered promiscuous mode [ 144.708709][ T7551] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.715910][ T7551] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.724964][ T7551] device bridge_slave_1 entered promiscuous mode [ 144.752470][ T7551] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 144.764540][ T7551] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 144.800033][ T7551] team0: Port device team_slave_0 added [ 144.808639][ T7551] team0: Port device team_slave_1 added 07:34:45 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000000)={0x80000000, 0x8, "054c93e46c146cb90f1e0a114c278b9e3cb80bfd83d553660b70b06977ae6e37", 0x365b, 0xd0a, 0x0, 0x9, 0x40}) fgetxattr(r0, &(0x7f0000000080)=@known='system.posix_acl_access\x00', &(0x7f00000000c0)=""/141, 0x8d) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000180)={0x5, 0x0, 0xfff}) r1 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x1f, 0xb0000) r2 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x3, 0x2) ioctl$sock_ifreq(r1, 0x8935, &(0x7f0000000240)={'dummy0\x00', @ifru_ivalue=0x101}) clock_adjtime(0x7, &(0x7f0000000280)={0x6, 0x6, 0x1, 0x73a, 0x3ff, 0xfffffffffffffff8, 0x1142, 0x80000000, 0xffff, 0x7fffffff, 0xff, 0x4, 0x100, 0x3, 0x8, 0x5, 0x800, 0x7fff, 0x800, 0x4, 0x6, 0x5, 0x5, 0x3, 0x5d7b, 0x1000}) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000300)={0x1, 0x1, [{r0, 0x0, 0x1000, 0x8000}]}) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000380)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4400}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x54, r3, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x800}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000004c0)={[0x7ff, 0x7, 0x0, 0x80, 0x6, 0x1, 0x39c4d062, 0x7, 0x8001, 0x7, 0xfffffffffffffff9, 0x1, 0x800, 0x100, 0x4, 0xfffffffffffff801], 0x6001, 0x1000}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_open_dev$sndpcmp(&(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', 0x2, 0x200400) r6 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$KVM_S390_VCPU_FAULT(r5, 0x4004ae52, &(0x7f00000005c0)=0x1) fstat(r4, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getgid() r9 = getuid() mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='fuse\x00', 0x12c48, &(0x7f0000000700)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x3000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, r8}, 0x2c, {[], [{@subj_user={'subj_user'}}, {@uid_lt={'uid<', r9}}, {@fsname={'fsname', 0x3d, '/dev/snd/pcmC#D#p\x00'}}, {@appraise='appraise'}, {@pcr={'pcr', 0x3d, 0x37}}, {@fsmagic={'fsmagic'}}]}}) exit(0x101) setsockopt$netlink_NETLINK_PKTINFO(r6, 0x10e, 0x3, &(0x7f0000000800)=0x7, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000880)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000840)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f00000008c0)={0x6, 0x118, 0xfa00, {{0x1000, 0x4, "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", 0xf3, 0x100000000, 0x0, 0x10000, 0x2, 0x20, 0x1}, r10}}, 0x120) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000a00)={0x3f, 0x4, 0x1, 0x1000, 0x4, 0x100, 0x8}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r5) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000a40)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x9, @remote, 0x800}, r10}}, 0x30) syz_open_dev$mouse(&(0x7f0000000a80)='/dev/input/mouse#\x00', 0x5, 0x400) r11 = getpgrp(0xffffffffffffffff) process_vm_readv(r11, &(0x7f0000000d00)=[{&(0x7f0000000ac0)=""/77, 0x4d}, {&(0x7f0000000b40)=""/207, 0xcf}, {&(0x7f0000000c40)=""/185, 0xb9}], 0x3, &(0x7f0000000dc0)=[{&(0x7f0000000d40)=""/17, 0x11}, {&(0x7f0000000d80)}], 0x2, 0x0) [ 144.896292][ T7551] device hsr_slave_0 entered promiscuous mode [ 144.934831][ T7551] device hsr_slave_1 entered promiscuous mode [ 144.969602][ T7558] IPVS: ftp: loaded support on port[0] = 21 [ 145.000924][ T7551] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.008165][ T7551] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.016110][ T7551] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.023361][ T7551] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.042362][ T7554] chnl_net:caif_netlink_parms(): no params data found 07:34:45 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6a29, 0x80) socket$inet6(0xa, 0x1, 0x6) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000040)=0x1) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000080)) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) r1 = getpid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000100)={{0x7, 0x6, 0x1f, 0xffffffffffffffff, 'syz0\x00', 0x3}, 0x2, 0x10b, 0x7, r1, 0x1, 0x8000, 'syz1\x00', &(0x7f00000000c0)=['/dev/audio#\x00'], 0xc, [], [0x6c, 0x80, 0x8, 0x3]}) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000240)=0x2) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') bind$unix(r0, &(0x7f00000002c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000340)={{0x3, @addr=0x101}, 0x8}) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000380)=0x130, 0x4) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000003c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000400)=0x6, 0x4) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000440)) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000480)={0x1}) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000500)='/dev/adsp#\x00', 0x2, 0x800) ioctl$EVIOCGBITKEY(r2, 0x80404521, &(0x7f0000000540)=""/32) lseek(r0, 0x61, 0x3) bind$unix(r0, &(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_proto_private(r2, 0x89ef, &(0x7f0000000600)="74f7698459e97bcf496a77a94adf16096c9957fb08d244a6f462a9e52380300d7a2ca447ef5242375d523177bc04308a129947f1c42523c52da31beaf30ea12990c6d0ec77567b8aecd3133ef3951e241bd9adebca872f83223389add1fa5daf2fbec2dfe739d846958ae6") ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$sock_TIOCOUTQ(r2, 0x5411, &(0x7f0000000680)) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f00000006c0)=0x6, 0x4) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000700)) socket$inet6(0xa, 0x5, 0x2c3d) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000740)={0x0, 'rose0\x00', 0x3}, 0x18) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000780)) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000007c0)=[0x1, 0x3]) [ 145.132933][ T7554] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.143132][ T7554] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.152201][ T7554] device bridge_slave_0 entered promiscuous mode [ 145.212052][ T7558] chnl_net:caif_netlink_parms(): no params data found [ 145.236036][ T7554] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.243097][ T7554] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.266378][ T7554] device bridge_slave_1 entered promiscuous mode [ 145.279454][ T7562] IPVS: ftp: loaded support on port[0] = 21 [ 145.292266][ T7551] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.351926][ T7558] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.359937][ T7558] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.368388][ T7558] device bridge_slave_0 entered promiscuous mode [ 145.378927][ T7554] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 145.399022][ T7551] 8021q: adding VLAN 0 to HW filter on device team0 [ 145.410107][ T7558] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.417471][ T7558] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.426006][ T7558] device bridge_slave_1 entered promiscuous mode [ 145.433296][ T7559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 145.447678][ T7559] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.458301][ T7559] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.468461][ T7559] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 145.484441][ T7554] bond0: Enslaving bond_slave_1 as an active interface with an up link 07:34:46 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x44010000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x8, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x4]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x101]}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x68}}, 0x80) r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x7, 0x600102) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0185648, &(0x7f0000000200)={0x9c0000, 0xdec0, 0x4, [], &(0x7f00000001c0)={0xbb0b7e, 0x8, [], @ptr=0x9}}) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) getpgrp(r3) ioctl$SG_SET_COMMAND_Q(r2, 0x2271, &(0x7f0000000280)=0x1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={0x0, 0x1}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000340)={r4, 0x0, 0x11a1}, &(0x7f0000000380)=0x8) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/cachefiles\x00', 0x200100, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r2, 0xc0245629, &(0x7f0000000440)={0x0, 0x4000000000000000, 0x8, [], &(0x7f0000000400)=0x5}) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r5, &(0x7f0000000800)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000500)={0x294, r6, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xfff, @rand_addr="3e9493202c884acfddf07d34026d9bf8", 0xfffffffffffffffa}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x33, @ipv4={[], [], @broadcast}, 0x4}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}}, {0x14, 0x2, @in={0x2, 0x4e23, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'gretap0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x571, @empty, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e23, @empty}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA={0xa0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb5ee0000000}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}]}, @TIPC_NLA_LINK={0xd4, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x70}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000000000000}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x62e1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff5c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x294}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000080) r7 = syz_open_dev$media(&(0x7f0000000840)='/dev/media#\x00', 0xb257, 0x80000) bind$unix(r5, &(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r7, 0x110, 0x3) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000900)=@assoc_value={r4, 0x200}, &(0x7f0000000940)=0x8) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f00000009c0)={0x3000, &(0x7f0000000980), 0x1, r5, 0x8}) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/video37\x00', 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r7, 0x0, 0x2a, &(0x7f0000000a40)={0x6, {{0x2, 0x4e21, @loopback}}}, 0x84) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, &(0x7f0000000b00)=0x9, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000b40)={{{@in6=@local, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000c40)=0xe8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000c80)={r4}, &(0x7f0000000cc0)=0x8) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000d40)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000e00)={&(0x7f0000000d00), 0xc, &(0x7f0000000dc0)={&(0x7f0000000d80)={0x1c, r8, 0x408, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x69e4c324d63009dd}, 0x40) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f0000000e40)=@req={0x8, 0x4, 0xa96, 0x3}, 0x10) ioctl$KVM_SET_VCPU_EVENTS(r7, 0x4040aea0, &(0x7f0000000e80)={0x4, 0x5, 0x56d4, 0x0, 0xd44, 0x16e, 0xf2, 0x8001, 0xe35, 0x3f, 0x3, 0x7, 0x0, 0xd727, 0x5, 0x6, 0x8, 0x0, 0x4}) ioctl$LOOP_SET_FD(r7, 0x4c00, r2) [ 145.519085][ T7558] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 145.544054][ T7558] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 145.580453][ T7559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 145.597348][ T7559] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.604492][ T7559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 145.628183][ T7559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 145.656716][ T7559] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.663872][ T7559] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.705835][ T7559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 145.727833][ T7559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 07:34:46 executing program 5: get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x4, &(0x7f0000ffd000/0x1000)=nil, 0x4) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8000, &(0x7f0000000080)=0xb8d8, 0x1, 0x2) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x440000, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000100)={0x2e, 0x3, 0x0, {0x2, 0xd, 0x0, '.cpusetvmnet1'}}, 0x2e) syz_open_dev$binder(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x800) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000180)={0x10}) socket$rxrpc(0x21, 0x2, 0xa) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f00000001c0)=0xc59a19) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000200)={0x6, 0x1, 0x82f5}) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000240)=0x1000000, 0x4) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000280)) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f00000002c0)=""/13) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000340)=0x0) r2 = syz_open_procfs$namespace(r1, &(0x7f0000000380)='ns/pid\x00') ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f00000003c0)=0x2c6) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x28, &(0x7f0000000400)}, 0x10) r3 = openat(r0, &(0x7f0000000480)='./file0\x00', 0x400000, 0xa0) connect$netlink(r3, &(0x7f00000004c0)=@proc={0x10, 0x0, 0x25dfdbfb, 0x400001}, 0xc) setxattr$trusted_overlay_upper(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='trusted.overlay.upper\x00', &(0x7f0000000580)={0x0, 0xfb, 0x10c, 0x6, 0xfffffffffffff800, "bd4e1707ffcc5d914eabdaa9e1644a34", "598255cd2b82368699609f51292b18844b28d5371e2e7e71978babed292639d47be0d251f43a1251c4cae8852580344382318fddf6bf90d8773c286999b30227b05a094555d5b4a7770a554728953a74d43f493fa289c18f5668ccc8064ea84d36a97d0b5b9767fe12b4f212ce18ca816afa7d22e6dc345496fa3b8285009eede7d3e3e18b7e10cc97878f364c8e7d692b8c2a519afecebc1309aa5b5139f934738abe22618bffdc909b6bf4c8b0d11a297aaa7a01de08143030288b26eba25b06333d474b7b53d4b8ba9b17e17b73b5d333c37008e117de0cb72ecaff3dadd69057858f8dc852bb674c7de1cbfdcb607246e1b588bc3f"}, 0x10c, 0x1) sendmsg$inet_sctp(r3, &(0x7f0000000bc0)={&(0x7f00000006c0)=@in6={0xa, 0x4e21, 0xd782, @empty, 0x1}, 0x1c, &(0x7f0000000b80)=[{&(0x7f0000000700)="377b3e99508010623e1ebb39fc12c54f6712c8b436db8d59dac11bad0a6c018154eaaea9f43670e4892d9894fd8bc9a4c8bffd069cafd90f0f509e0eb5520ee928e88bbecec79053493dc14029e8", 0x4e}, {&(0x7f0000000780)="1a46e554973f0022fd1bed831f4f3b49b04847c011f88bca39409b7957a8e793c84db0d06f3ae68e19f6c8454e7fe1fa2cb6cbd7f484045630a83b972a67a00969fc05254545dc88eb2e748d6345d1503990f47077062265b3d5f6a570e6554d55f73574af255e74bc064ab0ea5f4a005e3b090c10259db9d971ba55a14b814162fec005ead019e917cb2a5ae609c795c4353093b0bb0214eb15bfc777d1ce", 0x9f}, {&(0x7f0000000840)="653ef40f460e98acdb3af0cee512dd70ba5d4fb239b8eb12550f48fdc8cb8a79fcce1ace9657e9128210720c4fe6442f80555bc70b0b6757ee6a5883098121483ff79f1019c6ed77cc34f4e44cfa95eb7f3c22493aae6179ca27399d36be5f07b93c405e1cfe3766e779fd63fe57f00e80f7a55c0ae9a7239b21c7a180cb27a707d7998834b333d3f39ea10802f0d91e226577", 0x93}, {&(0x7f0000000900)="d5418b03ba22bf2a39ce408d674becd01f36f7e3e460111d14c4946c2457face9bb9473e0ecd404f73206c29c50d015de738d6959357ba382ee07545", 0x3c}, {&(0x7f0000000940)="eeab0895c81915ec7451f93ad8c8232e48152baab48a15d54064c38ac0e17b6c84dee07bfc740f837110c61338a7e1ec2ba0120062227d050c55120eb812accae1267a274fefc401a982e551d23c5b696783eb5002e5d9554d5a18414e8a821b1438b50f4d70e553309cccecbf1841b03ab2c0033c339032b71fa8106057fb348897162ac5e4c04c8281f9de3c2b013790c4b6b7d0ba88d4b2fcf9583a4da39d3bb97062fa3f4dcb101fa4445c", 0xad}, {&(0x7f0000000a00)="cb04542d082348f66b7ad09b3e487d12624cc7d17f6745d0c2eddfbad23f87f695dbe4f7de11a34ba7b6f89d071dba952a915f60df01", 0x36}, {&(0x7f0000000a40)="64f9182bac2479f7ea883d668e4a17f197bae07e2250d83a9e83b12d3d7aeb8385deb1e57f27d5c7e4734e", 0x2b}, {&(0x7f0000000a80)="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", 0xfa}], 0x8, 0x0, 0x0, 0x800}, 0x4000) sendmsg$nl_generic(r0, &(0x7f0000000d00)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x22000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000c40)={0x4c, 0x38, 0x4, 0x70bd27, 0x25dfdbfe, {0x8}, [@generic="d7d62c4ac803b0f83b79cfc6058b5fcc907e3844279baf16591f64bb8526222a6e83f2ca0624a77f7bd7dbffa88b28", @typed={0x8, 0xf, @pid=r1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x14) getgroups(0x1, &(0x7f0000000d40)=[0x0]) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r4, r5) remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x9, 0x800) fstat(r0, &(0x7f0000000e40)) mq_notify(r2, &(0x7f00000010c0)={0x0, 0x0, 0x3, @thr={&(0x7f0000000ec0)="947f4175bebd821276488ecd4dfe7a900e34dddaf719b950d3df118998060259a45b7a83b0c25a3f90004e88ac52aedb418573c8f30f732ff9f5c635103459ac2c1cfc8332a1f777284f6120c7c4742c8dbded514b707bc6b2880469c4b48636d7ec5e4feeda524340df61803f37b5da33294ec0880085127b30580ff52463e4e865a6e1bdade3db9e813aa1ca6697ab90140545d2c506478d65c11d23c36d117d90161c6bd3c268a2716e727aa3f558e101a6046c9f9aa57b4ee46a12f4da1dca949a66f56157d7964c52e0293572269e3cc9db2e38701a30e6a23ef4b5b62e", &(0x7f0000000fc0)="8bbd41501f4e661f72ab58d929fdb5ba99ad9775ae15d4c744490eaf25566c79b3657c8ac2afbdc97ba8e01d51818e1f6606c85ba50535cf19fb17162e4ad66f2c3c3b19936acfa5753dd86cb0c6c13796fde61a6ae49c32c9d10dfd5d4c7663d901acdc04a9d2530934d12494911ddb843940c212fdd353692fdd020ccb2037f4a7507c8a58d4db3ba9307927de1b152b1452865cb4b7e8688764819c46dd62c90a269a1bfaafd78d3d3d5667b5bf73cee14b4df4d530fee7245f397519bf0f9d86faf4dd1eb9af8a21"}}) [ 145.750799][ T7559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 145.766561][ T7559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 145.780140][ T7558] team0: Port device team_slave_0 added [ 145.796936][ T7558] team0: Port device team_slave_1 added [ 145.807259][ T7565] IPVS: ftp: loaded support on port[0] = 21 [ 145.821649][ T7554] team0: Port device team_slave_0 added [ 145.829590][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 145.843241][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 145.852097][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 145.867158][ T7551] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 145.874990][ T7567] IPVS: ftp: loaded support on port[0] = 21 [ 145.879657][ T7551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 145.956871][ T7558] device hsr_slave_0 entered promiscuous mode [ 145.994165][ T7558] device hsr_slave_1 entered promiscuous mode [ 146.034871][ T7554] team0: Port device team_slave_1 added [ 146.047798][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.057547][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.145489][ T7554] device hsr_slave_0 entered promiscuous mode [ 146.194171][ T7554] device hsr_slave_1 entered promiscuous mode [ 146.299055][ T7562] chnl_net:caif_netlink_parms(): no params data found [ 146.353883][ T7551] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.403340][ T7562] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.410623][ T7562] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.418380][ T7562] device bridge_slave_0 entered promiscuous mode [ 146.470161][ T7562] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.478694][ T7562] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.489747][ T7562] device bridge_slave_1 entered promiscuous mode [ 146.507862][ T7567] chnl_net:caif_netlink_parms(): no params data found 07:34:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f00000002c0)=0x3ff, 0x4) sendmmsg(r0, &(0x7f00000006c0)=[{{&(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x3, {{0x40}, 0x2}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)="9407a7438e58cec941c88a45e1258bc7f4899cae5946928e503ff4c9fb8dc9cef0f56fd8a196cb2d406859c9a84882f5d5dfcfe74c9ee2ba979b51e908cf08c36cce5b0ddf58748b4cb156ea", 0x4c}, {&(0x7f0000000180)="2662a02c8066903d4cd8b5b7eaeb3123cf78ce974fd34c8490c77388fbffb46329981945ee1ef2f2bb37f1972b7d36d4bd47d8472960a06fab19eca542222bd53ed482d6a7eabf7f92cc0275f7521dc52539ad0c93f9ac95719a2c7f3f3101fed0fa9ec9339294762e4c229361cb776fd1864d0831cab3e5c91a146dba85b35ebf7aeb667f47853dd761be873aa8df092b3f1cb8b9ce9591451261681ed707ccd65f91006a133b4e053c0cc817ad5bd531ca488e249249dea231d998", 0xbc}, {&(0x7f0000000240)="5c080c9c44a71dafa14e5b6a538b8be24506bdc38abae4bd6c213de86fb792fa7452fa75439bb22b8c26fd76ca5ec02b4275523bb5bcdea3e1dc28a4059c933f243b46d462174f8f658fe5da233022b7c3878dc415cc195b8c72561370973bb3", 0x60}, {&(0x7f0000000300)="00fb7acdc0496413f32e2a708a0dc232d5feaae5307700e5be32cac217e969c02066b661b45bd7353eb8e27bc2ea93631acd40fc2be185d3262d04af86cfc1e11c189797091874ec347a0ed1ff7bd453a8201b09cf1b7a8d1bb06d0311aa0f637934e690ceae8fe1796a03b27d5c8065aa46a56371be2e0420c15c9771cc6829d3ec6ff215a95b18f2a65810a57186ed353d8bff0ceda60164ac9f7064b3fa23cf9a599dfb437439f74eb7544c4e95d90b3c3eb11bad2ac205f25911", 0xbc}], 0x4}, 0x4305a280}, {{&(0x7f00000003c0)=@ipx={0x4, 0xc3e9, 0x5, "d86c78b4edac"}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000440)="3146953675448bb942ee17f06f1d58a757701f0556ae7fb8112a736f12ace9dcb14adc6c2504827a192bd99c1198ee8acd6cbdd773f27fe2a102bd4a48c8eb0f9c36a83a99cbda56371b2d450fd63fa7888c29971537e84c348f9a33d13a78b93b8b111836d255488f796bebe41c99dfe7742f7a", 0x74}, {&(0x7f00000004c0)="13ee99973f0dfb8b526b24462ea3d7cff1e8aaa39486ff79c87b86bb8d2e88bb31033c523164e203", 0x28}], 0x2, &(0x7f0000000540)=[{0x74, 0x115, 0x1, "e51b878743879732d7590e766b25b769cf20753b39c894c57816df3539482c00640d83c45d89a7b2d36ab20cc981408a83c3eff30fe949409a381a16ca03ff0be51df0e26d327e99103826072ebc449ec01b287adcd0a1832610c3ddcf5ac869ee0db70cf24e"}, {0x40, 0x3a, 0x40, "a0106bb312abfbaae89cb43c7c9be5572c7ecd26c521026f6799577def5cc78bc89ebeeb0097cb7d03b568d21d56be9cee2aa514"}, {0x38, 0x119, 0x2, "9a337cd474652582acbc4b4ed8bf7611495bb38f5dacceccab224cccc0f611488bf438ac2d81acd2169e"}, {0x7c, 0x4a3588f7960be8a7, 0x8000, "119eef09458d418f124e610449e2d6af063368364f181b1f4bd07d4e5c4568d7b15f7ec79a4a1e78212eccfeee34fb737802a503d7d5e3c91446d2729f3befc8547902c889c0ef98b37d129033bb12a6d6f3aa6451c7337273c7e6eef5811ef72faba6d70b0583409def6efdfac74bfb"}, {0x10, 0x10f, 0x71e, "9e"}], 0x178}, 0x59a3}], 0x2, 0x4000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 146.553073][ T7565] chnl_net:caif_netlink_parms(): no params data found [ 146.609685][ T7562] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 146.630704][ T7554] 8021q: adding VLAN 0 to HW filter on device bond0 [ 146.644004][ T7558] 8021q: adding VLAN 0 to HW filter on device bond0 [ 146.652294][ T7562] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 146.683673][ C1] hrtimer: interrupt took 41906 ns [ 146.698808][ T7554] 8021q: adding VLAN 0 to HW filter on device team0 [ 146.751387][ T7562] team0: Port device team_slave_0 added [ 146.773289][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 146.786761][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 146.804711][ T7567] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.812648][ T7567] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.821598][ T7567] device bridge_slave_0 entered promiscuous mode [ 146.830455][ T7567] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.838654][ T7567] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.847097][ T7567] device bridge_slave_1 entered promiscuous mode [ 146.867077][ T7558] 8021q: adding VLAN 0 to HW filter on device team0 [ 146.879083][ T7562] team0: Port device team_slave_1 added [ 146.903432][ T7554] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 146.921303][ T7554] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 146.936698][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.948802][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.960384][ T17] bridge0: port 1(bridge_slave_0) entered blocking state 07:34:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000200)={0x100000001, 0x7, 0xad, {0x0, 0x989680}, 0x9, 0x80}) getsockopt$netlink(r1, 0x10e, 0xa, &(0x7f0000000280)=""/208, &(0x7f0000000380)=0xd0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8000}, 0x10) connect$caif(r1, &(0x7f00000003c0)=@rfm={0x25, 0x4, "4e88d5fea362c278b49aef92aef18d1a"}, 0x18) keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x0}) r2 = dup(r1) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f0000000180)={0x5, 0x3, @stop_pts=0x2}) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x8a) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_getrule={0x20, 0x22, 0x201, 0x0, 0x0, {0x2, 0x0, 0x14}}, 0x20}}, 0x0) [ 146.967525][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.982511][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.991554][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.000170][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.007375][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.015188][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 147.023889][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.031503][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.039606][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 147.048665][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 147.057993][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 147.067672][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 147.076602][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 147.085721][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.094214][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.102558][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 147.111080][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.132116][ T7565] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.157239][ T7565] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.165157][ T7565] device bridge_slave_0 entered promiscuous mode [ 147.172956][ T7565] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.180119][ T7565] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.188321][ T7565] device bridge_slave_1 entered promiscuous mode [ 147.207750][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.216432][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 147.228546][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 147.246316][ T7567] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 147.269893][ T7565] bond0: Enslaving bond_slave_0 as an active interface with an up link 07:34:48 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000800)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x4, 0x4}, 0x50) [ 147.286917][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.299058][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.312771][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.319906][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state 07:34:48 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x3, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r2 = openat(r0, &(0x7f00000001c0)='.\x00', 0x40, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x20, 0x20280) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x2, 0x0) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x109c00, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x40002, 0x40) r7 = memfd_create(&(0x7f0000000300)='/dev/video#\x00', 0x3) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000340)={0x0, 0x7, [{r2, 0x0, 0x2000, 0x1000100010000}, {r3, 0x0, 0x2000, 0x1010000}, {r4, 0x0, 0x1fffff000, 0x1000000004000}, {r5, 0x0, 0xfffffffffffff000, 0x1000}, {r6, 0x0, 0x8000, 0x2000}, {r7, 0x0, 0x0, 0x8000}, {r0, 0x0, 0x0, 0x10000}]}) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000400)={0xa, @win={{}, 0x9, 0x0, 0x0, 0x0, 0x0}}) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xffffffff, 0x20000) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) r8 = syz_open_dev$amidi(0x0, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, 0x0) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x103e, 0x0) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000500)={r1, r8, 0x7, 0x1}, 0x10) kcmp(r9, 0x0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) open$dir(&(0x7f0000000040)='./file0\x00', 0x4000000027a, 0x0) [ 147.329506][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.341334][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.358311][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.365530][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.374636][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 147.383272][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 147.392012][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 147.401478][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 147.412823][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 147.421439][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 147.432363][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.440527][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 147.466475][ T7567] bond0: Enslaving bond_slave_1 as an active interface with an up link 07:34:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') listen(r1, 0x9) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r2 = socket$inet6(0xa, 0x6, 0x0) removexattr(0x0, &(0x7f0000000440)=@known='trusted.overlay.redirect\x00') connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f00000001c0)) ioctl$FIGETBSZ(r0, 0x2, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, 0x0, 0x0, &(0x7f0000001d40)}}], 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0xfffffffffffff800, 0x9, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8, 0xa0e4, 0x0, 0x2, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0xe6, 0x8b2f, 0x5, 0x740e038e, 0x0, 0x1, 0x1, 0xffffffffffff0000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, @perf_bp={0x0, 0xd}, 0x1, 0x0, 0x0, 0x2, 0x0, 0x7ff, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) getpid() r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00') preadv(r3, &(0x7f0000000480), 0x10000000000001e3, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) [ 147.526486][ T7562] device hsr_slave_0 entered promiscuous mode [ 147.544093][ T7562] device hsr_slave_1 entered promiscuous mode [ 147.585447][ T7565] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 147.598615][ T7580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 147.607673][ T7580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 147.616020][ T7580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 147.627106][ T7580] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 147.638775][ T7554] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 147.662096][ T7558] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 147.701090][ T7565] team0: Port device team_slave_0 added [ 147.731458][ T7558] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 147.752281][ T7567] team0: Port device team_slave_0 added [ 147.765587][ T7567] team0: Port device team_slave_1 added [ 147.772214][ T7565] team0: Port device team_slave_1 added [ 147.851513][ T7565] device hsr_slave_0 entered promiscuous mode [ 147.857895][ C0] ================================================================== [ 147.857948][ C0] BUG: KASAN: use-after-free in ccid_hc_tx_delete+0xde/0x100 [ 147.857958][ C0] Read of size 8 at addr ffff888061a8b640 by task syz-executor.4/7565 [ 147.857961][ C0] [ 147.857975][ C0] CPU: 0 PID: 7565 Comm: syz-executor.4 Not tainted 5.1.0-rc1+ #34 [ 147.857983][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.857988][ C0] Call Trace: [ 147.857993][ C0] [ 147.858011][ C0] dump_stack+0x172/0x1f0 [ 147.858026][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 147.858043][ C0] print_address_description.cold+0x7c/0x20d [ 147.858055][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 147.858067][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 147.858080][ C0] kasan_report.cold+0x1b/0x40 [ 147.858095][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 147.858112][ C0] __asan_report_load8_noabort+0x14/0x20 [ 147.858125][ C0] ccid_hc_tx_delete+0xde/0x100 [ 147.858141][ C0] dccp_sk_destruct+0x3f/0x90 [ 147.858153][ C0] ? dccp_init_sock+0x3f0/0x3f0 [ 147.858167][ C0] __sk_destruct+0x55/0x6d0 [ 147.858181][ C0] ? proto_unregister+0x4e0/0x4e0 [ 147.858197][ C0] rcu_core+0x928/0x1390 [ 147.858216][ C0] ? rcu_check_gp_start_stall+0x250/0x250 [ 147.858242][ C0] __do_softirq+0x266/0x95a [ 147.858258][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 147.858296][ C0] irq_exit+0x180/0x1d0 [ 147.858311][ C0] smp_apic_timer_interrupt+0x14a/0x570 [ 147.858327][ C0] apic_timer_interrupt+0xf/0x20 [ 147.858333][ C0] [ 147.858349][ C0] RIP: 0010:console_unlock+0xb5c/0xeb0 [ 147.858363][ C0] Code: 92 88 48 c1 e8 03 42 80 3c 30 00 0f 85 c9 02 00 00 48 83 3d e5 14 38 07 00 0f 84 98 01 00 00 e8 ba ed 15 00 48 8b 7d 98 57 9d <0f> 1f 44 00 00 e9 6b ff ff ff e8 a5 ed 15 00 48 8b 7d 08 c7 05 27 [ 147.858376][ C0] RSP: 0018:ffff88806549ee88 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 147.858390][ C0] RAX: ffff888065496640 RBX: 0000000000000200 RCX: 1ffff1100ca92de1 [ 147.858397][ C0] RDX: 0000000000000000 RSI: ffffffff815a81d6 RDI: 0000000000000293 [ 147.858403][ C0] RBP: ffff88806549ef10 R08: ffff888065496640 R09: ffff888065496f08 [ 147.858408][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 147.858415][ C0] R13: ffffffff842092c0 R14: dffffc0000000000 R15: ffffffff88f90410 [ 147.858429][ C0] ? netconsole_netdev_event+0x2a0/0x2a0 [ 147.858443][ C0] ? console_unlock+0xb56/0xeb0 [ 147.858465][ C0] vprintk_emit+0x280/0x6d0 [ 147.858479][ C0] vprintk_default+0x28/0x30 [ 147.858490][ C0] vprintk_func+0x7e/0x189 [ 147.858502][ C0] printk+0xba/0xed [ 147.858512][ C0] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 147.858532][ C0] ? __dev_set_promiscuity+0x157/0x220 [ 147.858546][ C0] __dev_set_promiscuity.cold+0x48/0x345 [ 147.858563][ C0] dev_set_promiscuity+0x57/0xe0 [ 147.858579][ C0] hsr_add_port+0x2bb/0x620 [ 147.858595][ C0] hsr_dev_finalize+0x5a8/0x77f [ 147.858613][ C0] hsr_newlink+0x26b/0x320 [ 147.858628][ C0] ? hsr_dev_change_mtu.cold+0x46/0x46 [ 147.858641][ C0] ? rtnl_create_link+0x192/0xac0 [ 147.858658][ C0] ? hsr_dev_change_mtu.cold+0x46/0x46 [ 147.858673][ C0] __rtnl_newlink+0x107b/0x16c0 [ 147.858698][ C0] ? rtnl_link_unregister+0x250/0x250 [ 147.858712][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 147.858737][ C0] ? is_bpf_text_address+0xd3/0x170 [ 147.858752][ C0] ? kernel_text_address+0x73/0xf0 [ 147.858766][ C0] ? __kernel_text_address+0xd/0x40 [ 147.858783][ C0] ? unwind_get_return_address+0x61/0xa0 [ 147.858797][ C0] ? __save_stack_trace+0x99/0x100 [ 147.858826][ C0] ? save_stack+0xa9/0xd0 [ 147.858841][ C0] ? save_stack+0x45/0xd0 [ 147.858855][ C0] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 147.858866][ C0] ? kasan_kmalloc+0x9/0x10 [ 147.858880][ C0] ? kmem_cache_alloc_trace+0x151/0x760 [ 147.858891][ C0] ? rtnl_newlink+0x4b/0xa0 [ 147.858902][ C0] ? rtnetlink_rcv_msg+0x465/0xb00 [ 147.858970][ C0] rtnl_newlink+0x69/0xa0 [ 147.858983][ C0] ? __rtnl_newlink+0x16c0/0x16c0 [ 147.858997][ C0] rtnetlink_rcv_msg+0x465/0xb00 [ 147.859015][ C0] ? rtnetlink_put_metrics+0x560/0x560 [ 147.859033][ C0] ? netlink_deliver_tap+0x22d/0xc00 [ 147.859048][ C0] ? find_held_lock+0x35/0x130 [ 147.859064][ C0] netlink_rcv_skb+0x17a/0x460 [ 147.859077][ C0] ? rtnetlink_put_metrics+0x560/0x560 [ 147.859090][ C0] ? netlink_ack+0xb50/0xb50 [ 147.859103][ C0] ? kasan_check_read+0x11/0x20 [ 147.859118][ C0] ? netlink_deliver_tap+0x254/0xc00 [ 147.859135][ C0] rtnetlink_rcv+0x1d/0x30 [ 147.859146][ C0] netlink_unicast+0x536/0x720 [ 147.859163][ C0] ? netlink_attachskb+0x770/0x770 [ 147.859176][ C0] ? _copy_from_iter_full+0x259/0x8f0 [ 147.859187][ C0] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 147.859201][ C0] ? __check_object_size+0x3d/0x42f [ 147.859217][ C0] netlink_sendmsg+0x8ae/0xd70 [ 147.859232][ C0] ? netlink_unicast+0x720/0x720 [ 147.859244][ C0] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 147.859257][ C0] ? apparmor_socket_sendmsg+0x2a/0x30 [ 147.859270][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 147.859296][ C0] ? security_socket_sendmsg+0x93/0xc0 [ 147.859307][ C0] ? netlink_unicast+0x720/0x720 [ 147.859323][ C0] sock_sendmsg+0xdd/0x130 [ 147.859339][ C0] __sys_sendto+0x262/0x380 [ 147.859355][ C0] ? __ia32_sys_getpeername+0xb0/0xb0 [ 147.859403][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 147.859416][ C0] ? _copy_from_user+0xdd/0x150 [ 147.859435][ C0] __ia32_compat_sys_socketcall+0x536/0x720 [ 147.859447][ C0] ? _raw_spin_unlock_irq+0x28/0x90 [ 147.859457][ C0] ? task_work_run+0x118/0x1c0 [ 147.859473][ C0] ? __x32_compat_sys_recvmmsg_time32+0x150/0x150 [ 147.859488][ C0] ? trace_hardirqs_on+0x67/0x230 [ 147.859506][ C0] ? blkcg_exit_queue+0x30/0x30 [ 147.859516][ C0] ? _raw_spin_unlock_irq+0x5e/0x90 [ 147.859531][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 147.859544][ C0] ? do_fast_syscall_32+0xd1/0xc98 [ 147.859556][ C0] ? entry_SYSENTER_compat+0x70/0x7f [ 147.859568][ C0] ? do_fast_syscall_32+0xd1/0xc98 [ 147.859582][ C0] ? lockdep_hardirqs_on+0x418/0x5d0 [ 147.859594][ C0] ? trace_hardirqs_on+0x67/0x230 [ 147.859609][ C0] do_fast_syscall_32+0x281/0xc98 [ 147.859624][ C0] entry_SYSENTER_compat+0x70/0x7f [ 147.859635][ C0] RIP: 0023:0xf7f3e869 [ 147.859648][ C0] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 147.859655][ C0] RSP: 002b:000000000845fc10 EFLAGS: 00000206 ORIG_RAX: 0000000000000066 [ 147.859668][ C0] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 000000000845fc28 [ 147.859676][ C0] RDX: 0000000000000000 RSI: 000000000000000a RDI: 0000000000000003 [ 147.859683][ C0] RBP: 000000000845ff2c R08: 0000000000000000 R09: 0000000000000000 [ 147.859691][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 147.859697][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 147.859715][ C0] [ 147.859722][ C0] Allocated by task 7598: [ 147.859735][ C0] save_stack+0x45/0xd0 [ 147.859749][ C0] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 147.859761][ C0] kasan_slab_alloc+0xf/0x20 [ 147.859772][ C0] kmem_cache_alloc+0x11a/0x6f0 [ 147.859785][ C0] ccid_new+0x256/0x3f0 [ 147.859796][ C0] dccp_hdlr_ccid+0x27/0x150 [ 147.859807][ C0] __dccp_feat_activate+0x17a/0x270 [ 147.859820][ C0] dccp_feat_activate_values+0x33a/0x766 [ 147.859834][ C0] dccp_rcv_state_process+0x116f/0x1935 [ 147.859847][ C0] dccp_v6_do_rcv+0x269/0xbf0 [ 147.859858][ C0] __release_sock+0x12e/0x3a0 [ 147.859867][ C0] release_sock+0x59/0x1c0 [ 147.859882][ C0] __inet_stream_connect+0x59f/0xea0 [ 147.859894][ C0] inet_stream_connect+0x58/0xa0 [ 147.859905][ C0] __sys_connect+0x266/0x330 [ 147.859917][ C0] __ia32_sys_connect+0x72/0xb0 [ 147.859929][ C0] do_fast_syscall_32+0x281/0xc98 [ 147.859941][ C0] entry_SYSENTER_compat+0x70/0x7f [ 147.859945][ C0] [ 147.859951][ C0] Freed by task 7602: [ 147.859963][ C0] save_stack+0x45/0xd0 [ 147.859976][ C0] __kasan_slab_free+0x102/0x150 [ 147.859988][ C0] kasan_slab_free+0xe/0x10 [ 147.860001][ C0] kmem_cache_free+0x86/0x260 [ 147.860013][ C0] ccid_hc_tx_delete+0xc1/0x100 [ 147.860025][ C0] dccp_hdlr_ccid+0x7d/0x150 [ 147.860037][ C0] __dccp_feat_activate+0x17a/0x270 [ 147.860049][ C0] dccp_feat_activate_values+0x33a/0x766 [ 147.860061][ C0] dccp_create_openreq_child+0x40c/0x570 [ 147.860073][ C0] dccp_v6_request_recv_sock+0x214/0x1da0 [ 147.860085][ C0] dccp_check_req+0x35c/0x6f0 [ 147.860097][ C0] dccp_v6_rcv+0x6d7/0x191e [ 147.860111][ C0] ip6_protocol_deliver_rcu+0x303/0x16c0 [ 147.860123][ C0] ip6_input_finish+0x84/0x170 [ 147.860135][ C0] ip6_input+0xe4/0x3f0 [ 147.860147][ C0] ip6_rcv_finish+0x1e7/0x320 [ 147.860158][ C0] ipv6_rcv+0x10e/0x420 [ 147.860170][ C0] __netif_receive_skb_one_core+0x115/0x1a0 [ 147.860181][ C0] __netif_receive_skb+0x2c/0x1c0 [ 147.860192][ C0] process_backlog+0x206/0x750 [ 147.860202][ C0] net_rx_action+0x4fa/0x1070 [ 147.860214][ C0] __do_softirq+0x266/0x95a [ 147.860218][ C0] [ 147.860228][ C0] The buggy address belongs to the object at ffff888061a8b640 [ 147.860228][ C0] which belongs to the cache ccid2_hc_tx_sock of size 1240 [ 147.860240][ C0] The buggy address is located 0 bytes inside of [ 147.860240][ C0] 1240-byte region [ffff888061a8b640, ffff888061a8bb18) [ 147.860244][ C0] The buggy address belongs to the page: [ 147.860256][ C0] page:ffffea000186a280 count:1 mapcount:0 mapping:ffff8882165a2a80 index:0x0 compound_mapcount: 0 [ 147.860271][ C0] flags: 0x1fffc0000010200(slab|head) [ 147.860300][ C0] raw: 01fffc0000010200 ffff88809ac6c448 ffff88809ac6c448 ffff8882165a2a80 [ 147.860314][ C0] raw: 0000000000000000 ffff888061a8a040 0000000100000005 0000000000000000 [ 147.860320][ C0] page dumped because: kasan: bad access detected [ 147.860323][ C0] [ 147.860327][ C0] Memory state around the buggy address: [ 147.860338][ C0] ffff888061a8b500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 147.860348][ C0] ffff888061a8b580: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc [ 147.860357][ C0] >ffff888061a8b600: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 147.860362][ C0] ^ [ 147.860377][ C0] ffff888061a8b680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 147.860385][ C0] ffff888061a8b700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 147.860390][ C0] ================================================================== [ 147.860395][ C0] Disabling lock debugging due to kernel taint [ 147.860402][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 147.860417][ C0] CPU: 0 PID: 7565 Comm: syz-executor.4 Tainted: G B 5.1.0-rc1+ #34 [ 147.860423][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.860426][ C0] Call Trace: [ 147.860430][ C0] [ 147.860444][ C0] dump_stack+0x172/0x1f0 [ 147.860460][ C0] panic+0x2cb/0x65c [ 147.860471][ C0] ? __warn_printk+0xf3/0xf3 [ 147.860483][ C0] ? lock_downgrade+0x880/0x880 [ 147.860497][ C0] ? trace_hardirqs_on+0x67/0x230 [ 147.860506][ C0] ? trace_hardirqs_on+0x5e/0x230 [ 147.860519][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 147.860528][ C0] end_report+0x47/0x4f [ 147.860539][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 147.860548][ C0] kasan_report.cold+0xe/0x40 [ 147.860560][ C0] ? ccid_hc_tx_delete+0xde/0x100 [ 147.860574][ C0] __asan_report_load8_noabort+0x14/0x20 [ 147.860585][ C0] ccid_hc_tx_delete+0xde/0x100 [ 147.860596][ C0] dccp_sk_destruct+0x3f/0x90 [ 147.860605][ C0] ? dccp_init_sock+0x3f0/0x3f0 [ 147.860615][ C0] __sk_destruct+0x55/0x6d0 [ 147.860625][ C0] ? proto_unregister+0x4e0/0x4e0 [ 147.860638][ C0] rcu_core+0x928/0x1390 [ 147.860654][ C0] ? rcu_check_gp_start_stall+0x250/0x250 [ 147.860671][ C0] __do_softirq+0x266/0x95a [ 147.860682][ C0] ? sched_clock_cpu+0x1b/0x1b0 [ 147.860698][ C0] irq_exit+0x180/0x1d0 [ 147.860710][ C0] smp_apic_timer_interrupt+0x14a/0x570 [ 147.860724][ C0] apic_timer_interrupt+0xf/0x20 [ 147.860729][ C0] [ 147.860743][ C0] RIP: 0010:console_unlock+0xb5c/0xeb0 [ 147.860756][ C0] Code: 92 88 48 c1 e8 03 42 80 3c 30 00 0f 85 c9 02 00 00 48 83 3d e5 14 38 07 00 0f 84 98 01 00 00 e8 ba ed 15 00 48 8b 7d 98 57 9d <0f> 1f 44 00 00 e9 6b ff ff ff e8 a5 ed 15 00 48 8b 7d 08 c7 05 27 [ 147.860763][ C0] RSP: 0018:ffff88806549ee88 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 147.860775][ C0] RAX: ffff888065496640 RBX: 0000000000000200 RCX: 1ffff1100ca92de1 [ 147.860782][ C0] RDX: 0000000000000000 RSI: ffffffff815a81d6 RDI: 0000000000000293 [ 147.860790][ C0] RBP: ffff88806549ef10 R08: ffff888065496640 R09: ffff888065496f08 [ 147.860797][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 147.860805][ C0] R13: ffffffff842092c0 R14: dffffc0000000000 R15: ffffffff88f90410 [ 147.860821][ C0] ? netconsole_netdev_event+0x2a0/0x2a0 [ 147.860836][ C0] ? console_unlock+0xb56/0xeb0 [ 147.860857][ C0] vprintk_emit+0x280/0x6d0 [ 147.860871][ C0] vprintk_default+0x28/0x30 [ 147.860884][ C0] vprintk_func+0x7e/0x189 [ 147.860897][ C0] printk+0xba/0xed [ 147.860911][ C0] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 147.860928][ C0] ? __dev_set_promiscuity+0x157/0x220 [ 147.860942][ C0] __dev_set_promiscuity.cold+0x48/0x345 [ 147.860955][ C0] dev_set_promiscuity+0x57/0xe0 [ 147.860969][ C0] hsr_add_port+0x2bb/0x620 [ 147.860983][ C0] hsr_dev_finalize+0x5a8/0x77f [ 147.860998][ C0] hsr_newlink+0x26b/0x320 [ 147.861012][ C0] ? hsr_dev_change_mtu.cold+0x46/0x46 [ 147.861025][ C0] ? rtnl_create_link+0x192/0xac0 [ 147.861040][ C0] ? hsr_dev_change_mtu.cold+0x46/0x46 [ 147.861052][ C0] __rtnl_newlink+0x107b/0x16c0 [ 147.861070][ C0] ? rtnl_link_unregister+0x250/0x250 [ 147.861082][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 147.861098][ C0] ? is_bpf_text_address+0xd3/0x170 [ 147.861110][ C0] ? kernel_text_address+0x73/0xf0 [ 147.861121][ C0] ? __kernel_text_address+0xd/0x40 [ 147.861135][ C0] ? unwind_get_return_address+0x61/0xa0 [ 147.861147][ C0] ? __save_stack_trace+0x99/0x100 [ 147.861166][ C0] ? save_stack+0xa9/0xd0 [ 147.861179][ C0] ? save_stack+0x45/0xd0 [ 147.861193][ C0] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 147.861205][ C0] ? kasan_kmalloc+0x9/0x10 [ 147.861217][ C0] ? kmem_cache_alloc_trace+0x151/0x760 [ 147.861228][ C0] ? rtnl_newlink+0x4b/0xa0 [ 147.861239][ C0] ? rtnetlink_rcv_msg+0x465/0xb00 [ 147.861296][ C0] rtnl_newlink+0x69/0xa0 [ 147.861309][ C0] ? __rtnl_newlink+0x16c0/0x16c0 [ 147.861321][ C0] rtnetlink_rcv_msg+0x465/0xb00 [ 147.861334][ C0] ? rtnetlink_put_metrics+0x560/0x560 [ 147.861347][ C0] ? netlink_deliver_tap+0x22d/0xc00 [ 147.861359][ C0] ? find_held_lock+0x35/0x130 [ 147.861376][ C0] netlink_rcv_skb+0x17a/0x460 [ 147.861389][ C0] ? rtnetlink_put_metrics+0x560/0x560 [ 147.861400][ C0] ? netlink_ack+0xb50/0xb50 [ 147.861411][ C0] ? kasan_check_read+0x11/0x20 [ 147.861424][ C0] ? netlink_deliver_tap+0x254/0xc00 [ 147.861436][ C0] rtnetlink_rcv+0x1d/0x30 [ 147.861446][ C0] netlink_unicast+0x536/0x720 [ 147.861458][ C0] ? netlink_attachskb+0x770/0x770 [ 147.861470][ C0] ? _copy_from_iter_full+0x259/0x8f0 [ 147.861482][ C0] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 147.861494][ C0] ? __check_object_size+0x3d/0x42f [ 147.861507][ C0] netlink_sendmsg+0x8ae/0xd70 [ 147.861520][ C0] ? netlink_unicast+0x720/0x720 [ 147.861533][ C0] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 147.861546][ C0] ? apparmor_socket_sendmsg+0x2a/0x30 [ 147.861558][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 147.861569][ C0] ? security_socket_sendmsg+0x93/0xc0 [ 147.861579][ C0] ? netlink_unicast+0x720/0x720 [ 147.861591][ C0] sock_sendmsg+0xdd/0x130 [ 147.861604][ C0] __sys_sendto+0x262/0x380 [ 147.861617][ C0] ? __ia32_sys_getpeername+0xb0/0xb0 [ 147.861640][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 147.861652][ C0] ? _copy_from_user+0xdd/0x150 [ 147.861667][ C0] __ia32_compat_sys_socketcall+0x536/0x720 [ 147.861678][ C0] ? _raw_spin_unlock_irq+0x28/0x90 [ 147.861688][ C0] ? task_work_run+0x118/0x1c0 [ 147.861701][ C0] ? __x32_compat_sys_recvmmsg_time32+0x150/0x150 [ 147.861713][ C0] ? trace_hardirqs_on+0x67/0x230 [ 147.861727][ C0] ? blkcg_exit_queue+0x30/0x30 [ 147.861738][ C0] ? _raw_spin_unlock_irq+0x5e/0x90 [ 147.861753][ C0] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 147.861766][ C0] ? do_fast_syscall_32+0xd1/0xc98 [ 147.861777][ C0] ? entry_SYSENTER_compat+0x70/0x7f [ 147.861789][ C0] ? do_fast_syscall_32+0xd1/0xc98 [ 147.861801][ C0] ? lockdep_hardirqs_on+0x418/0x5d0 [ 147.861813][ C0] ? trace_hardirqs_on+0x67/0x230 [ 147.861827][ C0] do_fast_syscall_32+0x281/0xc98 [ 147.861842][ C0] entry_SYSENTER_compat+0x70/0x7f [ 147.861852][ C0] RIP: 0023:0xf7f3e869 [ 147.861864][ C0] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 147.861870][ C0] RSP: 002b:000000000845fc10 EFLAGS: 00000206 ORIG_RAX: 0000000000000066 [ 147.861881][ C0] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 000000000845fc28 [ 147.861889][ C0] RDX: 0000000000000000 RSI: 000000000000000a RDI: 0000000000000003 [ 147.861896][ C0] RBP: 000000000845ff2c R08: 0000000000000000 R09: 0000000000000000 [ 147.861902][ C0] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 147.861907][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 147.863031][ C0] Kernel Offset: disabled [ 149.581665][ C0] Rebooting in 86400 seconds..