Warning: Permanently added '10.128.1.17' (ECDSA) to the list of known hosts. 2019/10/26 11:41:40 fuzzer started 2019/10/26 11:41:41 dialing manager at 10.128.0.105:33655 2019/10/26 11:41:41 syscalls: 2533 2019/10/26 11:41:41 code coverage: enabled 2019/10/26 11:41:41 comparison tracing: enabled 2019/10/26 11:41:41 extra coverage: extra coverage is not supported by the kernel 2019/10/26 11:41:41 setuid sandbox: enabled 2019/10/26 11:41:41 namespace sandbox: enabled 2019/10/26 11:41:41 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/26 11:41:41 fault injection: enabled 2019/10/26 11:41:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/26 11:41:41 net packet injection: enabled 2019/10/26 11:41:41 net device setup: enabled 2019/10/26 11:41:41 concurrency sanitizer: enabled 2019/10/26 11:41:42 adding functions to KCSAN blacklist: '__hrtimer_run_queues' 'tomoyo_supervisor' 'pipe_poll' 'find_next_bit' 11:41:44 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x200, 0x1) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045515, 0x0) 11:41:44 executing program 1: add_key(&(0x7f00000002c0)='trusted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1) msgget$private(0x0, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f00000000c0)='asymmetric\x00\xf3\xad\xe75\xf9\x03\x00AU\xa0\xe1\x94N\xd8\xdfLA\x1e0\x89dm\x10\xb4e\xa6\x91\v\x13', &(0x7f0000000200)=@secondary='builtin_and_secondary_trusted\x00') keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000040)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8', &(0x7f0000000180)=@chain={'key_or_keyring:', r4, ':chain\x00'}) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r4, 0xa3, 0x59}, &(0x7f0000000340)={'enc=', 'oaep', ' hash=', {'michael_mic\x00'}}, &(0x7f00000003c0)="b2817300a3567838bdc096ac163e71ae748fd31063df601295927ca768144cc6e9e189ee91bb4eece639fe301f7d5ec31f77722103926e85a976c7eb66d4a2c0ef6b200964efecd6eb69d35f2f1aedfe28278c975d03278a9bcdcd8f5dcfff2afa328647246056c612eb1cf0458022759e08d5d31126d1467f6aee6e61fcf22db7a8da82e5e20c973d528d5dc90ecccc27540f3e3c90f126dbd06f4e7b0398e8c1baef", &(0x7f0000000480)=""/89) r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r5, 0x10e, 0xa, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3800f0ff24000705000000", @ANYRES32=r8, @ANYBLOB="00000000fffffffff6ffffff0b000100"], 0x3}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) syzkaller login: [ 51.106932][ T7227] IPVS: ftp: loaded support on port[0] = 21 [ 51.289852][ T7229] IPVS: ftp: loaded support on port[0] = 21 [ 51.301968][ T7227] chnl_net:caif_netlink_parms(): no params data found 11:41:44 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) socket(0x0, 0x3, 0x0) sched_setscheduler(0x0, 0x5, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000100)='./file1\x00', 0x0) syncfs(r2) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000001c0)=0x0) sched_getattr(r3, &(0x7f0000000200)={0x30}, 0x30, 0x0) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r4, &(0x7f00000000c0)='./file0\x00') mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r5, &(0x7f0000000280)='./file0/file0\x00') renameat2(r5, &(0x7f0000000100)='./file0/file0\x00', r5, &(0x7f0000000340)='./file0\x00', 0x2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$LOOP_SET_DIRECT_IO(r4, 0x4c08, 0x2) r6 = creat(&(0x7f0000000100)='./file1\x00', 0x0) syncfs(r6) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r6, 0xc0a85320, &(0x7f0000000480)={{0x40, 0x2}, 'port0\x00', 0x9a, 0x8000a, 0x3, 0x4, 0xffffffff, 0x0, 0xfffffffd, 0x0, 0x6, 0x5}) msgget(0x1, 0xc1) [ 51.381948][ T7227] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.389562][ T7227] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.397680][ T7227] device bridge_slave_0 entered promiscuous mode [ 51.429701][ T7227] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.436891][ T7227] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.459796][ T7227] device bridge_slave_1 entered promiscuous mode [ 51.537820][ T7229] chnl_net:caif_netlink_parms(): no params data found [ 51.549526][ T7227] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.576457][ T7227] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.610926][ T7229] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.618005][ T7229] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.635558][ T7229] device bridge_slave_0 entered promiscuous mode [ 51.662864][ T7233] IPVS: ftp: loaded support on port[0] = 21 [ 51.669848][ T7227] team0: Port device team_slave_0 added [ 51.675633][ T7229] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.686248][ T7229] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.694682][ T7229] device bridge_slave_1 entered promiscuous mode [ 51.714603][ T7227] team0: Port device team_slave_1 added [ 51.741196][ T7229] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 11:41:45 executing program 3: socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_bp={0x0, 0x5}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x80\x00\x00\x00\x00\xfa\xfc\xe6s\x89\x9b', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@local}, 0x20) [ 51.765015][ T7229] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.852035][ T7227] device hsr_slave_0 entered promiscuous mode [ 51.908666][ T7227] device hsr_slave_1 entered promiscuous mode [ 51.983740][ T7229] team0: Port device team_slave_0 added [ 52.008196][ T7235] IPVS: ftp: loaded support on port[0] = 21 [ 52.041113][ T7229] team0: Port device team_slave_1 added 11:41:45 executing program 4: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x20011, r0, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2287, &(0x7f0000000000)) [ 52.208009][ T7227] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.215150][ T7227] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.222541][ T7227] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.229702][ T7227] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.441468][ T7229] device hsr_slave_0 entered promiscuous mode [ 52.490316][ T7229] device hsr_slave_1 entered promiscuous mode [ 52.518296][ T7229] debugfs: Directory 'hsr0' with parent '/' already present! [ 52.528540][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.548396][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.603133][ T7233] chnl_net:caif_netlink_parms(): no params data found [ 52.872085][ T7233] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.967961][ T7233] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.019680][ T7233] device bridge_slave_0 entered promiscuous mode [ 53.062492][ T7233] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.118329][ T7233] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.126434][ T7233] device bridge_slave_1 entered promiscuous mode [ 53.276585][ T7263] IPVS: ftp: loaded support on port[0] = 21 [ 53.324479][ T7233] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.351028][ T7233] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.446187][ T7233] team0: Port device team_slave_0 added [ 53.512959][ T7227] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.542571][ T7233] team0: Port device team_slave_1 added 11:41:47 executing program 5: r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_EPOCH_READ(r0, 0xc0287c02, &(0x7f0000000040)) [ 53.718548][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.726640][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.793746][ T7227] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.881186][ T7233] device hsr_slave_0 entered promiscuous mode [ 53.908620][ T7233] device hsr_slave_1 entered promiscuous mode [ 53.958290][ T7233] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.014631][ T7235] chnl_net:caif_netlink_parms(): no params data found [ 54.036777][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.101164][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.148896][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.156078][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.302244][ T7229] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.402253][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.422485][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.461843][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.468991][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.528963][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.585737][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.642921][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.722195][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.808887][ T7229] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.839824][ T7286] IPVS: ftp: loaded support on port[0] = 21 [ 54.891987][ T7227] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 54.965759][ T7227] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.052783][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.082998][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.162551][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.242864][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.309806][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.389938][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.462471][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.529461][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.706717][ T7227] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.769242][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.777796][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.861099][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.922460][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.969004][ T7287] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.976154][ T7287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.048944][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.101925][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.129212][ T7287] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.136322][ T7287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.221906][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.269947][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.322832][ T7235] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.341215][ T7235] bridge0: port 1(bridge_slave_0) entered disabled state [ 56.368327][ T7235] device bridge_slave_0 entered promiscuous mode [ 56.509999][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.542324][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 56.581721][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 56.623194][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 56.649426][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 56.692908][ T7235] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.701850][ T7235] bridge0: port 2(bridge_slave_1) entered disabled state [ 56.719377][ T7235] device bridge_slave_1 entered promiscuous mode [ 56.750671][ T7229] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 56.768340][ T7229] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 56.809988][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 56.819913][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 56.838893][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.848936][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.857578][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.896450][ T7263] chnl_net:caif_netlink_parms(): no params data found [ 56.949242][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.960035][ T7235] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 57.014886][ T7235] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 57.127774][ T7229] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 57.199271][ T7233] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.207802][ T7235] team0: Port device team_slave_0 added [ 57.233731][ T7235] team0: Port device team_slave_1 added [ 57.271319][ T7263] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.283938][ T7263] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.295869][ T7263] device bridge_slave_0 entered promiscuous mode [ 57.314143][ T7233] 8021q: adding VLAN 0 to HW filter on device team0 11:41:50 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x200, 0x1) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045515, 0x0) [ 57.404558][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.429271][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.448841][ T7263] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.455984][ T7263] bridge0: port 2(bridge_slave_1) entered disabled state [ 57.509258][ T7263] device bridge_slave_1 entered promiscuous mode [ 57.573667][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.586821][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.608899][ T7287] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.616055][ T7287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.649182][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.669120][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.688747][ T7287] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.695934][ T7287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.729005][ T7287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 11:41:51 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x200, 0x1) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045515, 0x0) [ 57.805826][ T7235] device hsr_slave_0 entered promiscuous mode 11:41:51 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x200, 0x1) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045515, 0x0) [ 57.868662][ T7235] device hsr_slave_1 entered promiscuous mode [ 57.912214][ T7235] debugfs: Directory 'hsr0' with parent '/' already present! [ 57.940330][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.953878][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 11:41:51 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x200, 0x1) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045515, 0x0) [ 57.982001][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 58.016187][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 58.026623][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.040884][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.059661][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 58.068459][ C0] hrtimer: interrupt took 29917 ns [ 58.079445][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.099082][ T7286] chnl_net:caif_netlink_parms(): no params data found 11:41:51 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x200, 0x1) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045515, 0x0) [ 58.142187][ T7233] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 58.156226][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 58.199115][ T7263] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.218525][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.229741][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 58.248824][ T2862] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.285996][ T7263] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.407176][ T7286] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.442180][ T7286] bridge0: port 1(bridge_slave_0) entered disabled state 11:41:52 executing program 1: add_key(&(0x7f00000002c0)='trusted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1) msgget$private(0x0, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f00000000c0)='asymmetric\x00\xf3\xad\xe75\xf9\x03\x00AU\xa0\xe1\x94N\xd8\xdfLA\x1e0\x89dm\x10\xb4e\xa6\x91\v\x13', &(0x7f0000000200)=@secondary='builtin_and_secondary_trusted\x00') keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000040)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8', &(0x7f0000000180)=@chain={'key_or_keyring:', r4, ':chain\x00'}) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r4, 0xa3, 0x59}, &(0x7f0000000340)={'enc=', 'oaep', ' hash=', {'michael_mic\x00'}}, &(0x7f00000003c0)="b2817300a3567838bdc096ac163e71ae748fd31063df601295927ca768144cc6e9e189ee91bb4eece639fe301f7d5ec31f77722103926e85a976c7eb66d4a2c0ef6b200964efecd6eb69d35f2f1aedfe28278c975d03278a9bcdcd8f5dcfff2afa328647246056c612eb1cf0458022759e08d5d31126d1467f6aee6e61fcf22db7a8da82e5e20c973d528d5dc90ecccc27540f3e3c90f126dbd06f4e7b0398e8c1baef", &(0x7f0000000480)=""/89) r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r5, 0x10e, 0xa, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3800f0ff24000705000000", @ANYRES32=r8, @ANYBLOB="00000000fffffffff6ffffff0b000100"], 0x3}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) [ 58.467652][ T7286] device bridge_slave_0 entered promiscuous mode 11:41:52 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x200, 0x1) ioctl$USBDEVFS_RELEASE_PORT(r0, 0x80045515, 0x0) [ 58.525804][ T7233] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.543544][ T7263] team0: Port device team_slave_0 added [ 58.594597][ T7286] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.615536][ T7286] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.670414][ T7286] device bridge_slave_1 entered promiscuous mode [ 58.768678][ T7263] team0: Port device team_slave_1 added [ 58.865101][ T7286] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.935966][ T7286] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 11:41:52 executing program 0: add_key(&(0x7f00000002c0)='trusted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1) msgget$private(0x0, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f00000000c0)='asymmetric\x00\xf3\xad\xe75\xf9\x03\x00AU\xa0\xe1\x94N\xd8\xdfLA\x1e0\x89dm\x10\xb4e\xa6\x91\v\x13', &(0x7f0000000200)=@secondary='builtin_and_secondary_trusted\x00') keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000040)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8', &(0x7f0000000180)=@chain={'key_or_keyring:', r4, ':chain\x00'}) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r4, 0xa3, 0x59}, &(0x7f0000000340)={'enc=', 'oaep', ' hash=', {'michael_mic\x00'}}, &(0x7f00000003c0)="b2817300a3567838bdc096ac163e71ae748fd31063df601295927ca768144cc6e9e189ee91bb4eece639fe301f7d5ec31f77722103926e85a976c7eb66d4a2c0ef6b200964efecd6eb69d35f2f1aedfe28278c975d03278a9bcdcd8f5dcfff2afa328647246056c612eb1cf0458022759e08d5d31126d1467f6aee6e61fcf22db7a8da82e5e20c973d528d5dc90ecccc27540f3e3c90f126dbd06f4e7b0398e8c1baef", &(0x7f0000000480)=""/89) r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r5, 0x10e, 0xa, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3800f0ff24000705000000", @ANYRES32=r8, @ANYBLOB="00000000fffffffff6ffffff0b000100"], 0x3}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) [ 59.066639][ T7286] team0: Port device team_slave_0 added [ 59.150967][ T7286] team0: Port device team_slave_1 added [ 59.201407][ T7263] device hsr_slave_0 entered promiscuous mode [ 59.238919][ T7263] device hsr_slave_1 entered promiscuous mode [ 59.293405][ T7263] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.476545][ T7286] device hsr_slave_0 entered promiscuous mode [ 59.549048][ T7286] device hsr_slave_1 entered promiscuous mode [ 59.598383][ T7286] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.665756][ T7235] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.906940][ T7262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.919820][ T7262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 59.956719][ T7235] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.063409][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 60.098977][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 60.187354][ T7261] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.194466][ T7261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.355754][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 60.499001][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 60.507608][ T7261] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.514735][ T7261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.693845][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.830598][ T7262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.873458][ T7262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.929691][ T7262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.012925][ T7262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.079482][ T7262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.158348][ T7262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.265795][ T7235] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 61.348345][ T7235] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 61.440844][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.479614][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.578641][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.587444][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.749163][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.908764][ T7263] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.000355][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 62.055977][ T7263] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.123996][ T7286] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.189484][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.197480][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.304961][ T7235] 8021q: adding VLAN 0 to HW filter on device batadv0 11:41:55 executing program 1: add_key(&(0x7f00000002c0)='trusted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1) msgget$private(0x0, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000001000)='keyring\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f00000000c0)='asymmetric\x00\xf3\xad\xe75\xf9\x03\x00AU\xa0\xe1\x94N\xd8\xdfLA\x1e0\x89dm\x10\xb4e\xa6\x91\v\x13', &(0x7f0000000200)=@secondary='builtin_and_secondary_trusted\x00') keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000040)='asymmetric\x00\x81\x15\xeba\xc9*\xdb\xd0\xefg\xcb\xcf\f\xb1\x9c?=\x14\xe1\xdc\x85\xf15k\xb8?\xfb\xb3>\xc8\x8b\xc0XE\xce\xda\xf9\x01hE\xa7\xa8\a\xc3\xaa\xd0\xed\x9ao\xb5\xe0\x1a\xd6\xb8\x15[-K\xe79J\xfc?\xbd\xab\xe1\xca,G\x87\xd1\x02L\t]Kn\xbe\x11\xa5\xe8x3_8', &(0x7f0000000180)=@chain={'key_or_keyring:', r4, ':chain\x00'}) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r4, 0xa3, 0x59}, &(0x7f0000000340)={'enc=', 'oaep', ' hash=', {'michael_mic\x00'}}, &(0x7f00000003c0)="b2817300a3567838bdc096ac163e71ae748fd31063df601295927ca768144cc6e9e189ee91bb4eece639fe301f7d5ec31f77722103926e85a976c7eb66d4a2c0ef6b200964efecd6eb69d35f2f1aedfe28278c975d03278a9bcdcd8f5dcfff2afa328647246056c612eb1cf0458022759e08d5d31126d1467f6aee6e61fcf22db7a8da82e5e20c973d528d5dc90ecccc27540f3e3c90f126dbd06f4e7b0398e8c1baef", &(0x7f0000000480)=""/89) r5 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r5, 0x10e, 0xa, &(0x7f0000000000), 0x4) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r8}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="3800f0ff24000705000000", @ANYRES32=r8, @ANYBLOB="00000000fffffffff6ffffff0b000100"], 0x3}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) [ 62.378305][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.387064][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.468942][ T7261] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.476152][ T7261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.587938][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.672129][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.747803][ T7261] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.754957][ T7261] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.839199][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.909314][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.975134][ T7286] 8021q: adding VLAN 0 to HW filter on device team0 [ 63.007214][ T7463] ================================================================== [ 63.015355][ T7463] BUG: KCSAN: data-race in pid_update_inode / pid_update_inode [ 63.022892][ T7463] [ 63.025221][ T7463] write to 0xffff888124919ac8 of 2 bytes by task 7440 on cpu 0: [ 63.032852][ T7463] pid_update_inode+0x51/0x70 [ 63.037533][ T7463] pid_revalidate+0x91/0xd0 [ 63.042041][ T7463] lookup_fast+0x6f2/0x700 [ 63.046466][ T7463] walk_component+0x6d/0xe80 [ 63.046664][ T7263] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 63.051059][ T7463] link_path_walk.part.0+0x5d3/0xa90 [ 63.051071][ T7463] path_openat+0x14f/0x36e0 [ 63.051081][ T7463] do_filp_open+0x11e/0x1b0 [ 63.051092][ T7463] do_sys_open+0x3b3/0x4f0 [ 63.051116][ T7463] __x64_sys_open+0x55/0x70 [ 63.084559][ T7463] do_syscall_64+0xcc/0x370 [ 63.089064][ T7463] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 63.094939][ T7463] [ 63.097268][ T7463] read to 0xffff888124919ac8 of 2 bytes by task 7463 on cpu 1: [ 63.104805][ T7463] pid_update_inode+0x44/0x70 [ 63.109478][ T7463] pid_revalidate+0x91/0xd0 [ 63.113971][ T7463] lookup_fast+0x6f2/0x700 [ 63.118395][ T7463] walk_component+0x6d/0xe80 [ 63.122981][ T7463] link_path_walk.part.0+0x5d3/0xa90 [ 63.128260][ T7463] path_openat+0x14f/0x36e0 [ 63.132757][ T7463] do_filp_open+0x11e/0x1b0 [ 63.137255][ T7463] do_sys_open+0x3b3/0x4f0 [ 63.141665][ T7463] __x64_sys_open+0x55/0x70 [ 63.146169][ T7463] do_syscall_64+0xcc/0x370 [ 63.150672][ T7463] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 63.156548][ T7463] [ 63.158869][ T7463] Reported by Kernel Concurrency Sanitizer on: [ 63.159899][ T7263] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 63.165016][ T7463] CPU: 1 PID: 7463 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 63.165025][ T7463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.165043][ T7463] ================================================================== [ 63.200186][ T7463] Kernel panic - not syncing: panic_on_warn set ... [ 63.206776][ T7463] CPU: 1 PID: 7463 Comm: ps Not tainted 5.4.0-rc3+ #0 [ 63.213530][ T7463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 63.223594][ T7463] Call Trace: [ 63.226884][ T7463] dump_stack+0xf5/0x159 [ 63.231126][ T7463] panic+0x210/0x640 [ 63.235021][ T7463] ? __x64_sys_open+0x55/0x70 [ 63.239697][ T7463] ? vprintk_func+0x8d/0x140 [ 63.244288][ T7463] kcsan_report.cold+0xc/0x10 [ 63.248968][ T7463] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 63.254513][ T7463] ? task_dump_owner+0xf7/0x260 [ 63.254549][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 63.259363][ T7463] __tsan_read2+0x2c/0x30 [ 63.259378][ T7463] pid_update_inode+0x44/0x70 [ 63.259394][ T7463] pid_revalidate+0x91/0xd0 [ 63.259421][ T7463] lookup_fast+0x6f2/0x700 [ 63.267530][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 63.271098][ T7463] walk_component+0x6d/0xe80 [ 63.271114][ T7463] ? __tsan_read8+0x2c/0x30 [ 63.271142][ T7463] ? security_inode_permission+0xa5/0xc0 [ 63.306525][ T7463] link_path_walk.part.0+0x5d3/0xa90 [ 63.311812][ T7463] path_openat+0x14f/0x36e0 [ 63.316317][ T7463] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.321958][ T7463] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.323015][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 63.327584][ T7463] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.327608][ T7463] ? __tsan_write4+0x32/0x40 [ 63.344981][ T7463] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.350624][ T7463] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 63.356520][ T7463] ? __kcsan_setup_watchpoint+0x6b/0x4a0 [ 63.356723][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.362157][ T7463] do_filp_open+0x11e/0x1b0 [ 63.362176][ T7463] ? __alloc_fd+0x316/0x4c0 [ 63.362211][ T7463] do_sys_open+0x3b3/0x4f0 [ 63.383836][ T7463] __x64_sys_open+0x55/0x70 [ 63.388348][ T7463] do_syscall_64+0xcc/0x370 [ 63.392864][ T7463] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 63.398748][ T7463] RIP: 0033:0x7f23fd6e6120 [ 63.403162][ T7463] Code: 48 8b 15 1b 4d 2b 00 f7 d8 64 89 02 83 c8 ff c3 90 90 90 90 90 90 90 90 90 90 83 3d d5 a4 2b 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 5e 8c 01 00 48 89 04 24 [ 63.416287][ T7261] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.423291][ T7463] RSP: 002b:00007ffee2b5bee8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 63.423305][ T7463] RAX: ffffffffffffffda RBX: 0000000000616760 RCX: 00007f23fd6e6120 [ 63.423314][ T7463] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f23fdbb4d00 [ 63.423322][ T7463] RBP: 0000000000001000 R08: 0000000000000000 R09: 00007f23fd9aea10 [ 63.423330][ T7463] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f23fdbb3d00 [ 63.423352][ T7463] R13: 00000000008971c0 R14: 0000000000000005 R15: 0000000000000000 [ 63.480835][ T7463] Kernel Offset: disabled [ 63.485184][ T7463] Rebooting in 86400 seconds..