Warning: Permanently added '10.128.0.19' (ECDSA) to the list of known hosts. 2019/12/05 13:40:02 fuzzer started 2019/12/05 13:40:04 dialing manager at 10.128.0.105:33795 2019/12/05 13:40:10 syscalls: 2684 2019/12/05 13:40:10 code coverage: enabled 2019/12/05 13:40:10 comparison tracing: enabled 2019/12/05 13:40:10 extra coverage: extra coverage is not supported by the kernel 2019/12/05 13:40:10 setuid sandbox: enabled 2019/12/05 13:40:10 namespace sandbox: enabled 2019/12/05 13:40:10 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/05 13:40:10 fault injection: enabled 2019/12/05 13:40:10 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/05 13:40:10 net packet injection: enabled 2019/12/05 13:40:10 net device setup: enabled 2019/12/05 13:40:10 concurrency sanitizer: enabled 2019/12/05 13:40:10 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 66.923022][ T7612] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/05 13:40:20 adding functions to KCSAN blacklist: 'pcpu_alloc' 'page_counter_try_charge' 'do_exit' 'find_next_bit' 'lruvec_lru_size' 'exit_signals' 'pipe_wait' '__snd_rawmidi_transmit_ack' '__ext4_new_inode' 'ext4_free_inode' 'tcp_add_backlog' 'ext4_free_inodes_count' '__tty_hangup' 'mod_timer' 'copy_process' 'xas_clear_mark' 'blk_mq_run_hw_queue' 'common_perm_cond' 'find_get_pages_range_tag' 'add_timer' 'taskstats_exit' 'ext4_nonda_switch' 'poll_schedule_timeout' 'kauditd_thread' 'ep_poll' 'tick_do_update_jiffies64' 'blk_mq_sched_dispatch_requests' 'run_timer_softirq' 'wbt_done' 'tick_sched_do_timer' 'timer_clear_idle' 'ext4_mark_iloc_dirty' '__hrtimer_run_queues' 'rcu_gp_fqs_loop' '__rb_rotate_set_parents' 'audit_log_start' 'rcu_gp_fqs_check_wake' 'tick_nohz_idle_stop_tick' 'wbt_issue' 'vm_area_dup' 'list_lru_count_one' 'do_syslog' 'attach_to_pi_owner' 'blk_stat_add' 'pipe_poll' 'xas_find_marked' 'echo_char' '__mark_inode_dirty' 'do_fcntl' 'dd_has_work' 'p9_poll_workfn' 'futex_wait_queue_me' 'do_nanosleep' 'generic_write_end' 'generic_fillattr' 'tomoyo_supervisor' 'ext4_has_free_clusters' 'blk_mq_dispatch_rq_list' 'n_tty_receive_buf_common' '__perf_event_overflow' 'commit_echoes' 'blk_mq_get_request' 13:42:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/301], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 13:42:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') lseek(r0, 0x0, 0x1) [ 173.081701][ T7614] IPVS: ftp: loaded support on port[0] = 21 [ 173.171268][ T7614] chnl_net:caif_netlink_parms(): no params data found [ 173.240227][ T7614] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.247694][ T7614] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.255341][ T7614] device bridge_slave_0 entered promiscuous mode [ 173.271078][ T7614] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.278266][ T7614] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.286043][ T7614] device bridge_slave_1 entered promiscuous mode [ 173.301710][ T7617] IPVS: ftp: loaded support on port[0] = 21 [ 173.303819][ T7614] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.319671][ T7614] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 13:42:01 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 173.342761][ T7614] team0: Port device team_slave_0 added [ 173.350494][ T7614] team0: Port device team_slave_1 added [ 173.439178][ T7614] device hsr_slave_0 entered promiscuous mode [ 173.486593][ T7614] device hsr_slave_1 entered promiscuous mode [ 173.570781][ T7619] IPVS: ftp: loaded support on port[0] = 21 13:42:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_OKEY={0x8}]]}}}]}, 0x38}}, 0x0) [ 173.665334][ T7614] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.672481][ T7614] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.679918][ T7614] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.686977][ T7614] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.820681][ T7617] chnl_net:caif_netlink_parms(): no params data found [ 173.954653][ T7617] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.009308][ T7617] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.038104][ T7617] device bridge_slave_0 entered promiscuous mode [ 174.080214][ T7617] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.126738][ T7617] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.134567][ T7617] device bridge_slave_1 entered promiscuous mode [ 174.172829][ T7646] IPVS: ftp: loaded support on port[0] = 21 [ 174.175133][ T7614] 8021q: adding VLAN 0 to HW filter on device bond0 [ 174.221960][ T7617] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 174.271511][ T2908] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.317386][ T2908] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.347648][ T2908] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 174.422108][ T7617] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 174.480028][ T7617] team0: Port device team_slave_0 added [ 174.538008][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 174.556806][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 174.566549][ T7617] team0: Port device team_slave_1 added 13:42:02 executing program 4: semop(0x0, &(0x7f0000000380)=[{0x0, 0x0, 0x1800}], 0x1) r0 = semget$private(0x0, 0x3, 0x0) semop(r0, &(0x7f0000000380)=[{0x0, 0x0, 0x1800}], 0x1) [ 174.612389][ T7614] 8021q: adding VLAN 0 to HW filter on device team0 [ 174.658705][ T7619] chnl_net:caif_netlink_parms(): no params data found [ 174.688124][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 174.708332][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 174.728280][ T7645] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.736308][ T7645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.816837][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.847753][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.888209][ T7645] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.895377][ T7645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.937920][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.987405][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 175.007266][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 175.046783][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 13:42:02 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x21, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) [ 175.138657][ T7617] device hsr_slave_0 entered promiscuous mode [ 175.177132][ T7617] device hsr_slave_1 entered promiscuous mode [ 175.256442][ T7617] debugfs: Directory 'hsr0' with parent '/' already present! [ 175.273646][ T7614] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 175.276110][ T7651] IPVS: ftp: loaded support on port[0] = 21 [ 175.284348][ T7614] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 175.301864][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.309866][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 175.318462][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 175.327418][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 175.335588][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 175.344155][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.352769][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.361429][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.398251][ T7614] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.414760][ T7662] IPVS: ftp: loaded support on port[0] = 21 [ 175.427773][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 175.438945][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 175.497580][ T7619] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.504714][ T7619] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.538371][ T7619] device bridge_slave_0 entered promiscuous mode [ 175.598046][ T7619] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.605513][ T7619] bridge0: port 2(bridge_slave_1) entered disabled state [ 175.615841][ T7619] device bridge_slave_1 entered promiscuous mode [ 175.656412][ T7646] chnl_net:caif_netlink_parms(): no params data found [ 175.765016][ T7619] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 175.830552][ T7619] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 175.864859][ T7651] chnl_net:caif_netlink_parms(): no params data found [ 175.913483][ T7646] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.947627][ T7646] bridge0: port 1(bridge_slave_0) entered disabled state [ 175.955389][ T7646] device bridge_slave_0 entered promiscuous mode [ 176.002823][ T7617] 8021q: adding VLAN 0 to HW filter on device bond0 [ 176.029604][ T7646] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.041300][ T7646] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.055272][ C1] hrtimer: interrupt took 22166 ns [ 176.079639][ T7646] device bridge_slave_1 entered promiscuous mode [ 176.097574][ T7619] team0: Port device team_slave_0 added [ 176.110751][ T7617] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.127780][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.138741][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 13:42:03 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/301], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) [ 176.177783][ T7619] team0: Port device team_slave_1 added [ 176.183575][ T7662] chnl_net:caif_netlink_parms(): no params data found [ 176.320375][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.344114][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.366779][ T7648] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.374045][ T7648] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.434601][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 13:42:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/301], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) [ 176.481169][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.536721][ T7648] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.543800][ T7648] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.578847][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.616200][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.638633][ T7646] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 176.666805][ T7651] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.673909][ T7651] bridge0: port 1(bridge_slave_0) entered disabled state 13:42:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/301], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) [ 176.716446][ T7651] device bridge_slave_0 entered promiscuous mode [ 176.798314][ T7619] device hsr_slave_0 entered promiscuous mode [ 176.836535][ T7619] device hsr_slave_1 entered promiscuous mode [ 176.869585][ T7619] debugfs: Directory 'hsr0' with parent '/' already present! [ 176.900373][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.914843][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 176.934775][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 13:42:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/301], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) [ 176.961207][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 177.000071][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.028573][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 177.051122][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.059731][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 177.068573][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 13:42:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/301], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) [ 177.078712][ T7646] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 177.089250][ T7617] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 177.097693][ T7651] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.105889][ T7651] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.135318][ T7651] device bridge_slave_1 entered promiscuous mode [ 177.169948][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 177.192060][ T7646] team0: Port device team_slave_0 added [ 177.202609][ T7646] team0: Port device team_slave_1 added [ 177.214641][ T7651] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 13:42:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/301], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) [ 177.249328][ T7662] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.265631][ T7662] bridge0: port 1(bridge_slave_0) entered disabled state [ 177.282236][ T7662] device bridge_slave_0 entered promiscuous mode [ 177.302531][ T7651] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 177.411177][ T7662] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.420730][ T7662] bridge0: port 2(bridge_slave_1) entered disabled state [ 177.458127][ T7662] device bridge_slave_1 entered promiscuous mode [ 177.520704][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 177.534213][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 13:42:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/301], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) [ 177.584402][ T7651] team0: Port device team_slave_0 added [ 177.689353][ T7646] device hsr_slave_0 entered promiscuous mode [ 177.759140][ T7646] device hsr_slave_1 entered promiscuous mode [ 177.798314][ T7646] debugfs: Directory 'hsr0' with parent '/' already present! [ 177.807435][ T7662] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 177.837724][ T7617] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 177.868470][ T7662] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 177.900883][ T7651] team0: Port device team_slave_1 added [ 177.968460][ T7651] device hsr_slave_0 entered promiscuous mode [ 177.996586][ T7651] device hsr_slave_1 entered promiscuous mode [ 178.036347][ T7651] debugfs: Directory 'hsr0' with parent '/' already present! [ 178.194326][ T7619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 178.265827][ T7662] team0: Port device team_slave_0 added [ 178.350735][ T7662] team0: Port device team_slave_1 added [ 178.426200][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 178.449973][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.531484][ T7619] 8021q: adding VLAN 0 to HW filter on device team0 [ 178.868510][ T7662] device hsr_slave_0 entered promiscuous mode [ 178.946660][ T7662] device hsr_slave_1 entered promiscuous mode [ 178.976318][ T7662] debugfs: Directory 'hsr0' with parent '/' already present! [ 178.983861][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 13:42:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000100100000100000000000000f41b25e406d58937e7e899e05f7d0000000000001ebddf077798b47ab4a76907477a209522adca7e5454b7dec9d9a67305c04a8ccffca56ccbcabfb25cc94628348a24593c5dbdf200796a8fd217367c017f76f131c8693ac43b77471be914707d2c3545b812f7f58f436706f17b26ae3208e5809f51528f2436610cf85441848ae0b7df52b724993141a5cb7a0a9c3dca8116787a4d0c82e2d9829219e3d981d196f1b7256c49aac96b000000002150a4058a8e4347e13f94be6d87fc7ecdafb88b1a03b8d9e4eac3f0076580f6e76aec101fc935e5c25fac970f73d3fe7d1f036c1e5b4046cf69b3a1071a96f3d5fdf7a8e7b907d236e91a85b6e2a13b6b5eb558d081f5b2244a7c5669b224b800"/301], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) [ 179.000160][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.076884][ T7647] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.084337][ T7647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.178823][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.251092][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.309082][ T7647] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.316546][ T7647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.476847][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.485811][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.577724][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.636334][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.645115][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.726989][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.735705][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.828679][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.891185][ T7646] 8021q: adding VLAN 0 to HW filter on device bond0 [ 179.951821][ T7619] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 180.006395][ T7619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.021393][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 180.050094][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 180.110393][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.190523][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.242858][ T7651] 8021q: adding VLAN 0 to HW filter on device bond0 [ 180.304509][ T7646] 8021q: adding VLAN 0 to HW filter on device team0 [ 180.356383][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 180.364424][ T7647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.435399][ T7619] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 180.518093][ T7651] 8021q: adding VLAN 0 to HW filter on device team0 [ 180.526002][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 180.556527][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 180.563990][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 180.649879][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 180.726782][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 180.735357][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 180.846673][ T7648] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.853747][ T7648] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.917003][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 180.925727][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 181.036645][ T7648] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.043981][ T7648] bridge0: port 2(bridge_slave_1) entered forwarding state [ 181.106769][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 181.115892][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 181.227155][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 181.235752][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 181.338000][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 181.345958][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 181.445679][ T7646] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 181.506339][ T7646] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 181.673736][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 181.688515][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 181.767220][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 181.775568][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 181.851984][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 181.887103][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 181.917091][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 181.926099][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.000526][ T44] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.007657][ T44] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.027260][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.035847][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.066939][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.074030][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.097014][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.116793][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.125735][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.150496][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.177207][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 182.196918][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 182.239457][ T7646] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.286777][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 182.294505][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.319438][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.340204][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 182.366499][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 182.373960][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 182.419511][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 182.439878][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 182.460438][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 182.488571][ T7651] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 182.513959][ T7662] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.560168][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 182.585895][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 182.622648][ T7651] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 182.635560][ T7662] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.691972][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.710127][ T7648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.726329][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 182.732432][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:42:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') lseek(r0, 0x0, 0x1) [ 182.776787][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.788878][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.806609][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.813787][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.845518][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.854298][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.871625][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.879004][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.901401][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.913556][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.924495][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.936357][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.945471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.953663][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 182.967627][ T7662] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 182.979116][ T7662] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 182.992431][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.001415][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.010518][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.020733][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.031520][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.040401][ T3018] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.067148][ T7662] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.074978][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.087344][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 183.094968][ T7645] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 13:42:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_OKEY={0x8}]]}}}]}, 0x38}}, 0x0) 13:42:10 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000100100000100000000000000f41b25e406d58937e7e899e05f7d0000000000001ebddf077798b47ab4a76907477a209522adca7e5454b7dec9d9a67305c04a8ccffca56ccbcabfb25cc94628348a24593c5dbdf200796a8fd217367c017f76f131c8693ac43b77471be914707d2c3545b812f7f58f436706f17b26ae3208e5809f51528f2436610cf85441848ae0b7df52b724993141a5cb7a0a9c3dca8116787a4d0c82e2d9829219e3d981d196f1b7256c49aac96b000000002150a4058a8e4347e13f94be6d87fc7ecdafb88b1a03b8d9e4eac3f0076580f6e76aec101fc935e5c25fac970f73d3fe7d1f036c1e5b4046cf69b3a1071a96f3d5fdf7a8e7b907d236e91a85b6e2a13b6b5eb558d081f5b2244a7c5669b224b800"/301], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 13:42:11 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x21, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) 13:42:11 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/301], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 13:42:11 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) 13:42:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') lseek(r0, 0x0, 0x1) 13:42:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_OKEY={0x8}]]}}}]}, 0x38}}, 0x0) 13:42:11 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/301], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 13:42:11 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$inet(0x2, 0x2800080001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r2, 0x0) ioctl$FITRIM(r0, 0xc0185879, 0x0) 13:42:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') lseek(r0, 0x0, 0x1) [ 183.486763][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 183.493024][ C0] protocol 88fb is buggy, dev hsr_slave_1 13:42:11 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000180)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/301], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f00000031c0)=[{{0x0, 0xf000000, 0x0, 0x0, 0x0, 0x78}}], 0x371, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 13:42:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newlink={0x38, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_OKEY={0x8}]]}}}]}, 0x38}}, 0x0) [ 183.737933][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 183.743766][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:42:11 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000190007841dfffd946f6105000a2881001f03fe050400080005001e000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 13:42:11 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r3, &(0x7f0000000640)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r3, 0x0) ppoll(&(0x7f0000000200)=[{r3}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000a1, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) 13:42:11 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$inet(0x2, 0x2800080001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r2, 0x0) ioctl$FITRIM(r0, 0xc0185879, 0x0) 13:42:11 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r2, &(0x7f0000000000)=[{0x21, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xfcc8) 13:42:11 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6b) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0815b5055e0bcfe87b3071") splice(r0, 0x0, r2, 0x0, 0x8002, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc0000001d00", 0x6) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) 13:42:11 executing program 2: r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000000c0)=r1, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000001a3acceed2359b6a7042f95065a090e15e1b23c404f79c61776c1a82ce772b007e62c1012097dee8d6e2a64fa661c0e29a9aaf088552f34aeeaee7eefc55cbca11d1082f44e2649eee73cb488c4b4b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0xc0fe, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 183.962276][ T7937] netlink: 'syz-executor.1': attribute type 30 has an invalid length. [ 183.995623][ T7937] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 184.056314][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 184.062110][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 184.102307][ T7951] ================================================================== [ 184.110473][ T7951] BUG: KCSAN: data-race in queue_access_lock / snd_seq_check_queue [ 184.118358][ T7951] [ 184.120690][ T7951] read to 0xffff8880b1b21ea4 of 1 bytes by interrupt on cpu 0: [ 184.128240][ T7951] snd_seq_check_queue+0x59/0x200 [ 184.133271][ T7951] snd_seq_timer_interrupt+0x243/0x280 [ 184.138747][ T7951] snd_timer_process_callbacks+0x1e4/0x220 [ 184.144585][ T7951] snd_timer_interrupt+0x483/0x930 [ 184.149708][ T7951] snd_hrtimer_callback+0x18f/0x260 [ 184.155053][ T7951] __hrtimer_run_queues+0x274/0x5f0 [ 184.160275][ T7951] hrtimer_interrupt+0x22a/0x480 [ 184.165235][ T7951] smp_apic_timer_interrupt+0xdc/0x280 [ 184.170714][ T7951] apic_timer_interrupt+0xf/0x20 [ 184.175743][ T7951] __tsan_read4+0x1b/0x100 [ 184.180169][ T7951] nf_ct_iterate_cleanup+0xe9/0x2e0 [ 184.185375][ T7951] nf_ct_iterate_cleanup_net+0xe2/0xf0 [ 184.190836][ T7951] masq_device_event+0x8a/0x90 [ 184.195604][ T7951] notifier_call_chain+0xd7/0x160 [ 184.200634][ T7951] raw_notifier_call_chain+0x37/0x50 [ 184.206097][ T7951] call_netdevice_notifiers_info+0x48/0xc0 [ 184.212195][ T7951] dev_close_many+0x264/0x3a0 [ 184.216879][ T7951] rollback_registered_many+0x2fb/0xa00 [ 184.222434][ T7951] unregister_netdevice_many+0x62/0x240 [ 184.228003][ T7951] rtnl_delete_link+0x98/0xd0 [ 184.232825][ T7951] rtnl_dellink+0x21a/0x650 [ 184.237365][ T7951] rtnetlink_rcv_msg+0x1d3/0x500 [ 184.242315][ T7951] netlink_rcv_skb+0xb0/0x260 [ 184.247011][ T7951] rtnetlink_rcv+0x26/0x30 [ 184.251440][ T7951] netlink_unicast+0x354/0x430 [ 184.256243][ T7951] netlink_sendmsg+0x456/0x770 [ 184.261121][ T7951] sock_sendmsg+0x9f/0xc0 [ 184.265458][ T7951] ___sys_sendmsg+0x59d/0x5d0 [ 184.270148][ T7951] __sys_sendmsg+0xa0/0x160 [ 184.274673][ T7951] __x64_sys_sendmsg+0x51/0x70 [ 184.280140][ T7951] do_syscall_64+0xcc/0x370 [ 184.284648][ T7951] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 184.290618][ T7951] [ 184.292957][ T7951] write to 0xffff8880b1b21ea4 of 1 bytes by task 7951 on cpu 1: 13:42:12 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$inet(0x2, 0x2800080001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r2, 0x0) ioctl$FITRIM(r0, 0xc0185879, 0x0) 13:42:12 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$inet(0x2, 0x2800080001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r2, 0x0) ioctl$FITRIM(r0, 0xc0185879, 0x0) [ 184.300636][ T7951] queue_access_lock+0x89/0xc0 [ 184.305415][ T7951] snd_seq_control_queue+0x77/0x350 [ 184.310630][ T7951] event_input_timer+0x2f/0x50 [ 184.315406][ T7951] snd_seq_deliver_single_event.constprop.0+0x3e8/0x4d0 [ 184.322526][ T7951] snd_seq_deliver_event+0x2e9/0x4c0 [ 184.327908][ T7951] snd_seq_dispatch_event+0xa1/0x340 [ 184.333210][ T7951] snd_seq_check_queue+0xeb/0x200 [ 184.338286][ T7951] snd_seq_enqueue_event+0x163/0x2b0 [ 184.343693][ T7951] snd_seq_client_enqueue_event.constprop.0+0x187/0x2a0 [ 184.350667][ T7951] snd_seq_write+0x23f/0x4d0 [ 184.355266][ T7951] __vfs_write+0x67/0xc0 [ 184.359680][ T7951] vfs_write+0x18a/0x390 [ 184.364020][ T7951] ksys_write+0x17b/0x1b0 [ 184.368357][ T7951] __x64_sys_write+0x4c/0x60 [ 184.372968][ T7951] do_syscall_64+0xcc/0x370 [ 184.377584][ T7951] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 184.383468][ T7951] [ 184.385806][ T7951] Reported by Kernel Concurrency Sanitizer on: [ 184.391975][ T7951] CPU: 1 PID: 7951 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 13:42:12 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) getsockname$packet(r2, 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x0, 0x0, @rand_addr="0242fd5c94773fad4114996e5c6b6837"}, {0xa, 0x0, 0x0, @local}}, 0x5c) rt_sigprocmask(0x1, &(0x7f0000000140)={0xde}, &(0x7f00000001c0), 0x8) [ 184.400687][ T7951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.410750][ T7951] ================================================================== [ 184.418822][ T7951] Kernel panic - not syncing: panic_on_warn set ... [ 184.425415][ T7951] CPU: 1 PID: 7951 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 184.434337][ T7951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.444721][ T7951] Call Trace: [ 184.448033][ T7951] dump_stack+0x11d/0x181 [ 184.452384][ T7951] panic+0x210/0x640 [ 184.456293][ T7951] ? vprintk_func+0x8d/0x140 [ 184.460896][ T7951] kcsan_report.cold+0xc/0xd [ 184.465536][ T7951] kcsan_setup_watchpoint+0x3fe/0x460 [ 184.470933][ T7951] __tsan_unaligned_write1+0xc0/0x100 [ 184.476432][ T7951] queue_access_lock+0x89/0xc0 [ 184.481226][ T7951] snd_seq_control_queue+0x77/0x350 [ 184.486433][ T7951] ? preempt_count_add+0x6f/0xb0 [ 184.491501][ T7951] event_input_timer+0x2f/0x50 [ 184.496391][ T7951] snd_seq_deliver_single_event.constprop.0+0x3e8/0x4d0 [ 184.503353][ T7951] ? snd_seq_timer_open.cold+0x20/0x20 [ 184.508845][ T7951] snd_seq_deliver_event+0x2e9/0x4c0 [ 184.514152][ T7951] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 184.519969][ T7951] ? preempt_count_add+0x6f/0xb0 [ 184.525356][ T7951] ? snd_seq_client_use_ptr+0x93/0x2f0 [ 184.530840][ T7951] snd_seq_dispatch_event+0xa1/0x340 [ 184.536160][ T7951] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 184.542158][ T7951] ? snd_seq_prioq_cell_out+0x163/0x210 [ 184.547952][ T7951] snd_seq_check_queue+0xeb/0x200 [ 184.553028][ T7951] snd_seq_enqueue_event+0x163/0x2b0 [ 184.558470][ T7951] snd_seq_client_enqueue_event.constprop.0+0x187/0x2a0 [ 184.566030][ T7951] snd_seq_write+0x23f/0x4d0 [ 184.570663][ T7951] __vfs_write+0x67/0xc0 [ 184.574954][ T7951] ? snd_seq_kernel_client_enqueue+0x160/0x160 [ 184.581131][ T7951] vfs_write+0x18a/0x390 [ 184.585401][ T7951] ksys_write+0x17b/0x1b0 [ 184.589729][ T7951] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 184.595992][ T7951] __x64_sys_write+0x4c/0x60 [ 184.600774][ T7951] do_syscall_64+0xcc/0x370 [ 184.605289][ T7951] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 184.611317][ T7951] RIP: 0033:0x45a679 [ 184.615223][ T7951] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.634933][ T7951] RSP: 002b:00007f8e60252c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 184.643343][ T7951] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 184.651325][ T7951] RDX: 000000000000fcc8 RSI: 0000000020000000 RDI: 0000000000000003 [ 184.659573][ T7951] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 184.667692][ T7951] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8e602536d4 [ 184.675784][ T7951] R13: 00000000004cbd60 R14: 00000000004e5a60 R15: 00000000ffffffff [ 184.685060][ T7951] Kernel Offset: disabled [ 184.689414][ T7951] Rebooting in 86400 seconds..