[ 58.461578][ T26] audit: type=1800 audit(1573288473.946:26): pid=7925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 58.496879][ T26] audit: type=1800 audit(1573288473.956:27): pid=7925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [ 58.517439][ T26] audit: type=1800 audit(1573288473.956:28): pid=7925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 59.468327][ T26] audit: type=1800 audit(1573288474.986:29): pid=7925 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.11' (ECDSA) to the list of known hosts. 2019/11/09 08:34:46 fuzzer started 2019/11/09 08:34:49 dialing manager at 10.128.0.105:41185 2019/11/09 08:34:49 syscalls: 2553 2019/11/09 08:34:49 code coverage: enabled 2019/11/09 08:34:49 comparison tracing: enabled 2019/11/09 08:34:49 extra coverage: extra coverage is not supported by the kernel 2019/11/09 08:34:49 setuid sandbox: enabled 2019/11/09 08:34:49 namespace sandbox: enabled 2019/11/09 08:34:49 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/09 08:34:49 fault injection: enabled 2019/11/09 08:34:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/09 08:34:49 net packet injection: enabled 2019/11/09 08:34:49 net device setup: enabled 2019/11/09 08:34:49 concurrency sanitizer: enabled 2019/11/09 08:34:49 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 76.734220][ T8090] KCSAN: could not find function: 'may_open' [ 92.977255][ T8090] KCSAN: could not find function: 'calc_wb_limits' [ 94.109446][ T8090] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/09 08:35:13 adding functions to KCSAN blacklist: 'vm_area_dup' 'shmem_file_read_iter' 'wbt_issue' 'shrink_node' 'virtqueue_disable_cb' '__ext4_abort' 'exit_signals' 'mod_timer' 'futex_wait_queue_me' 'add_timer_on' 'snd_seq_prioq_cell_out' 'xprt_clear_locked' 'inode_sync_complete' 'generic_write_end' 'ext4_free_inode' '__inode_add_bytes' 'writeback_sb_inodes' 'may_open' 'taskstats_exit' 'blk_mq_sched_dispatch_requests' 'queue_access_lock' 'snapshot_refaults' '__add_to_page_cache_locked' 'ext4_mb_find_by_goal' 'kernfs_refresh_inode' 'pipe_wait' 'blk_mq_run_hw_queue' 'generic_fillattr' '__remove_hrtimer' '__generic_block_fiemap' 'process_srcu' 'page_counter_try_charge' 'vti_tunnel_xmit' 'echo_char' 'balance_dirty_pages' 'snd_ctl_notify' '__dentry_kill' 'ima_file_free' 'rcu_gp_fqs_check_wake' 'padata_find_next' 'sctp_association_free' 'dd_has_work' '__d_lookup_done' 'pipe_unlock' 'do_exit' '__dev_queue_xmit' 'bcm_connect' 'blk_mq_dispatch_rq_list' 'p9_poll_workfn' 'timer_clear_idle' 'enqueue_timer' 'ext4_nonda_switch' 'xas_clear_mark' 'audit_log_start' 'd_lru_del' 'generic_file_read_iter' '__hrtimer_run_queues' 'common_perm_cond' 'blk_mq_get_request' 'inactive_list_is_low' 'inet_putpeer' 'wbc_attach_and_unlock_inode' 'file_remove_privs' 'shmem_getpage_gfp' 'pipe_poll' 'add_timer' 'tick_nohz_idle_stop_tick' 'inet_send_prepare' 'tomoyo_supervisor' 'ep_poll' 'fanout_demux_rollover' 'osq_lock' 'rcu_gp_fqs_loop' 'ipip_tunnel_xmit' 'wq_watchdog_reset_touched' '__tcp_transmit_skb' 'xas_find_marked' '__snd_rawmidi_transmit_ack' 'list_lru_count_one' 'ktime_get_real_seconds' 'ext4_mb_good_group' 'wbc_detach_inode' 'fsnotify' 'hrtimer_wakeup' 'wbt_wait' 'tick_sched_do_timer' '__ip6_datagram_connect' 'evict' 'do_syslog' 'blk_stat_add' 'blk_mq_free_request' 'do_nanosleep' 'lruvec_lru_size' 'sit_tunnel_xmit' 'atime_needs_update' 'mm_update_next_owner' 'ext4_mark_iloc_dirty' 'do_sys_open' 'kernfs_fop_open' '__mark_inode_dirty' 'commit_echoes' 'tick_do_update_jiffies64' 'wbt_done' 'kcm_rfree' 'kvm_arch_vcpu_load' '__change_pid' 'filemap_map_pages' '__ext4_new_inode' 'ktime_get_seconds' 'task_dump_owner' 'calc_wb_limits' 'snd_seq_check_queue' 'handle_userfault' 'do_dentry_open' 'poll_schedule_timeout' 'mem_cgroup_select_victim_node' 'ext4_da_write_end' 'lookup_fast' '__find_get_block' 'run_timer_softirq' 'find_get_pages_range_tag' 'ext4_has_free_clusters' 'kauditd_thread' 'icmp_global_allow' 'get_signal' 'pid_update_inode' 'n_tty_receive_buf_common' 'ext4_free_inodes_count' 'inet_unhash' '__perf_event_overflow' 'find_next_bit' 'sctp_assoc_migrate' '__alloc_file' 'generic_permission' 'tcp_add_backlog' 'pcpu_alloc' 'copy_process' 08:39:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='erspan0\x00'}) [ 353.400997][ T8094] IPVS: ftp: loaded support on port[0] = 21 08:39:29 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x200}) [ 353.484030][ T8094] chnl_net:caif_netlink_parms(): no params data found [ 353.549566][ T8094] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.556927][ T8094] bridge0: port 1(bridge_slave_0) entered disabled state [ 353.565652][ T8094] device bridge_slave_0 entered promiscuous mode [ 353.573053][ T8094] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.580535][ T8094] bridge0: port 2(bridge_slave_1) entered disabled state [ 353.588963][ T8094] device bridge_slave_1 entered promiscuous mode [ 353.607446][ T8094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 353.618840][ T8094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 353.640288][ T8094] team0: Port device team_slave_0 added [ 353.647085][ T8094] team0: Port device team_slave_1 added 08:39:29 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x10000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x28240, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000540)) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x14004, 0x0) r1 = openat(r0, 0x0, 0x18440, 0x10) mkdir(&(0x7f0000000580)='./file0\x00', 0x8) getegid() r2 = add_key$user(0x0, &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000280)='f', 0x1, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)="fe", 0x1, 0xfffffffffffffffd) ioctl$DRM_IOCTL_RM_CTX(0xffffffffffffffff, 0xc0086421, &(0x7f00000002c0)={0x0, 0xffd42ecaa1bb834}) keyctl$clear(0x7, r3) r4 = request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='%em1trusted\x00', r3) keyctl$instantiate(0xc, r2, 0x0, 0x0, r4) setresgid(0x0, 0x0, 0x0) chown(&(0x7f00000009c0)='./file0\x00', 0x0, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) lsetxattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)=@known='system.advise\x00', &(0x7f0000000780)='X\x00', 0xfffffffffffffd55, 0x1) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x200000000000013, &(0x7f0000000040)=0x1, 0xfe18) getrusage(0x0, &(0x7f0000000400)) setsockopt$inet6_opts(r5, 0x29, 0x3b, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"/803], 0x1) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) open$dir(&(0x7f0000000080)='./file0\x00', 0x288300, 0x3b8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x4, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) rmdir(&(0x7f0000000100)='./file0\x00') [ 353.707002][ T8094] device hsr_slave_0 entered promiscuous mode [ 353.744751][ T8094] device hsr_slave_1 entered promiscuous mode [ 353.815178][ T8099] IPVS: ftp: loaded support on port[0] = 21 [ 353.871970][ T8094] bridge0: port 2(bridge_slave_1) entered blocking state [ 353.879211][ T8094] bridge0: port 2(bridge_slave_1) entered forwarding state [ 353.886765][ T8094] bridge0: port 1(bridge_slave_0) entered blocking state [ 353.893828][ T8094] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.139395][ T8094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 354.205824][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 354.208448][ T8124] IPVS: ftp: loaded support on port[0] = 21 [ 354.235699][ T2405] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.265014][ T2405] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.295242][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 354.337569][ T8094] 8021q: adding VLAN 0 to HW filter on device team0 [ 354.404865][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 354.424999][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.432072][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 08:39:30 executing program 3: clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x15) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x3f, 0x0, 0x0, 0x3, 0x116, 0xffffffffffffffff}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 354.509328][ T8099] chnl_net:caif_netlink_parms(): no params data found [ 354.533304][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.566519][ T2405] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.574982][ T2405] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.606175][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 354.691669][ T8094] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 354.723813][ T8094] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 354.756100][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 354.766753][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 354.805926][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 354.841334][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 354.884708][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 354.924560][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 354.954494][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 355.007824][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 355.030010][ T8130] IPVS: ftp: loaded support on port[0] = 21 [ 355.081666][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 355.115704][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 355.125378][ T8094] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 355.133060][ T8099] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.155196][ T8099] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.191579][ T8099] device bridge_slave_0 entered promiscuous mode 08:39:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x5, 0x3, 0x0, 0x5}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 355.236491][ T8099] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.243593][ T8099] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.254255][ T8099] device bridge_slave_1 entered promiscuous mode [ 355.325086][ T8124] chnl_net:caif_netlink_parms(): no params data found [ 355.413123][ T8099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 355.530426][ T8099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 355.605885][ T8124] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.612989][ T8124] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.644720][ T8124] device bridge_slave_0 entered promiscuous mode 08:39:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 355.682536][ T8099] team0: Port device team_slave_0 added [ 355.691398][ T8124] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.743862][ T8124] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.753750][ T8124] device bridge_slave_1 entered promiscuous mode [ 355.792193][ T8099] team0: Port device team_slave_1 added [ 355.809094][ T8130] chnl_net:caif_netlink_parms(): no params data found 08:39:31 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1, 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='hugetlbfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) rename(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') llistxattr(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x1000000) [ 355.862518][ T8143] IPVS: ftp: loaded support on port[0] = 21 [ 355.878530][ T8124] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 355.938757][ T8099] device hsr_slave_0 entered promiscuous mode 08:39:31 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r1) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xfffffffffffffd5a, 0x2) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000000100)={0x7, 0x24, [0x80, 0x8001, 0x0, 0x6, 0x8, 0xfffffffe, 0x34e6b69b, 0x1f, 0x6]}) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000140)="adce3469c49e3713312c2bc9c7560bbbbf4714ea7d3ac851cff5eab2bd1062b9d275914d5be4ce29b312221916921cd636c85e39ed4dfa6bc8d4929596909986fd85a124a4a6eded") ioctl$SIOCX25SENDCALLACCPT(0xffffffffffffffff, 0x89e9) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000001c0)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) fchown(0xffffffffffffffff, r3, r4) sendmsg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)="8124691987d104a0aa1cb23621fb65f546a7e195adeb74e66e4595c635ceec8201d5f6eff4e5a9df76c6f99de1e0f6b6f70551a0b039ce5504b77e7ff05dd1fade16b17982bb8e4c95225a4d1fc7535d02cdb1f6a27c9da2ed21e60b2170c9cd125ccd02826eb8edb4755b04317b1120206648b0caaf2828b503af4304be5bcd17dbc10ad821f5d957d9ffcc252817548f6c3958f9a08d140d35657bdf886c0363d1bd2fc17c13a9d64f7455b76fe3c48f385e457ca8418f16d786c6ffca9b2147b852872369143974481d51cd0da799", 0xd0}, {&(0x7f0000000380)="299ac89ead7be9e206adf3f2f0c7fc762b3bcf8d3f04ebd465d8d0fc224bda6572", 0x21}, {&(0x7f00000003c0)}], 0x3}, 0x2) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-monitor\x00', 0x80000, 0x0) ioctl$LOOP_SET_FD(r2, 0x4c00, r5) r6 = syz_open_dev$cec(&(0x7f00000004c0)='/dev/cec#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6b, &(0x7f0000000500)=[@in6={0xa, 0x4e24, 0x1000, @remote, 0x7}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e22, 0x6, @mcast2, 0x1}, @in6={0xa, 0x4e20, 0xffffffff, @ipv4={[], [], @broadcast}, 0x8}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x2, 0x6, @mcast2}, @in={0x2, 0x4e20, @local}], 0xc0) syz_open_dev$usbfs(&(0x7f00000005c0)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x400) r7 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$BLKROGET(r7, 0x125e, &(0x7f0000000640)) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_MODESET_CTL(r8, 0x40086408, &(0x7f0000000680)={0x2, 0x2}) prctl$PR_GET_DUMPABLE(0x3) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x10) r9 = add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)="756de2e5ae803dc0251f1c91c3cd37f78fd454ef690f2e299ff20cfe9775d5f540ed904ad54b8f094e9a157956c5d0d335190b1f7630afae14ce3683d3d52f61de7f792f7b170b5c58fac9a31bca29e133eee99be0ea52ccbe8ca72087679735c2ab9e245a65c5cea81d501a1c4201ea2bf9572ccafa7e3f6254045368b0acb74ff1c7b0e7cabfaafc6c861d04cc5202dd4ab89c2db039096ec794daddfbf1435f143217dba732afc51554edf60ce9d4be48ad64ef1c45eab1629419c2cd853f71a984a38ba2e9b940a5722072d2329f7eda878cc6294cb9bad8334692880d76da5c88", 0xe3, r9) r10 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/dlm-monitor\x00', 0x2, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r10, 0x40044900, 0x1) r11 = shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x5000) shmdt(r11) r12 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$bt_hci_HCI_TIME_STAMP(r12, 0x0, 0x3, &(0x7f0000000900)=0x8, 0x4) 08:39:31 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() socket$nl_route(0x10, 0x3, 0x0) tkill(r1, 0x9) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000180)={0x101, 0x0, 0x4000}, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0xfdfc) socket(0x80000000000000a, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004b40)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x64, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x34, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @rand_addr="868e9715b78214804409dac74bc91325"}, @IFLA_GRE_REMOTE={0x14, 0x7, @rand_addr="b0c7828d68f59b035a09e02eeb03e362"}, @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r7}]]}}}]}, 0x64}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8020}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @rand_addr="31e40a53e2ac5fddd151834af61057bc"}, @gre_common_policy]}}}]}, 0x48}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000004bc0)={0x0, 0xffffffffffffffaa, &(0x7f0000004b80)={0x0, 0xc0}}, 0x21) getsockname$packet(r8, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000004a80)=ANY=[@ANYBLOB="84ffffff10001fff0000000000f7da044206405fdb273dbce58a422a73bb8b87261c17733b266facadd1995a7c184c9f0d1d803e09af33f1820f693ca00872d72a2aec2055b68edbb3aea29226e83ea0b4d5ad", @ANYRES32=0x0, @ANYBLOB="00000000600000004400120000000100707070000000020000000100"], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003580)={'veth1_to_bond\x00', r11}) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 355.994239][ T8099] device hsr_slave_1 entered promiscuous mode [ 356.033919][ T8099] debugfs: Directory 'hsr0' with parent '/' already present! [ 356.049300][ T8124] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 356.173165][ T8124] team0: Port device team_slave_0 added [ 356.192921][ T8130] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.237031][ T8130] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.274667][ T8130] device bridge_slave_0 entered promiscuous mode 08:39:31 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) tkill(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140), 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0xfdfc) r0 = socket(0x80000000000000a, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004b40)=0x14) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x64, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x34, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @rand_addr="868e9715b78214804409dac74bc91325"}, @IFLA_GRE_REMOTE={0x14, 0x7, @rand_addr="b0c7828d68f59b035a09e02eeb03e362"}, @gre_common_policy=[@IFLA_GRE_LINK={0x8}]]}}}]}, 0x64}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003540)={'team0\x00'}) r3 = socket(0x10, 0x803, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x5c, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8020}, [@IFLA_LINKINFO={0x3c, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x2c, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x6, @rand_addr="868e9715b78214804409dac74bc91325"}, @IFLA_GRE_LOCAL={0x14, 0x6, @rand_addr="31e40a53e2ac5fddd151834af61057bc"}]}}}]}, 0x5c}}, 0x0) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x30, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x20, 0x2, [@IFLA_GRE_REMOTE={0x14, 0x7, @rand_addr="b0c7828d68f59b035a09e02eeb03e362"}, @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r5}]]}}}]}, 0x50}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000004a80)=ANY=[@ANYBLOB="84ffffff10001fff0000000000f7da044206405fdb273dbce58a422a73bb8b87261c17733b266facadd1995a7c184c9f0d1d803e09af33", @ANYRES32=0x0, @ANYBLOB="00000000600000004400120000000100707070000000020000000100"], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003580)={'veth1_to_bond\x00', r6}) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x50, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x30, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x20, 0x2, [@IFLA_GRE_REMOTE={0x14, 0x7, @rand_addr="b0c7828d68f59b035a09e02eeb03e362"}, @gre_common_policy=[@IFLA_GRE_LINK={0x8, 0x1, r8}]]}}}]}, 0x50}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x48, &(0x7f00000049c0)={@rand_addr, @multicast1}, &(0x7f0000004a00)=0xc) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000005fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006000)=0x14) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xe0, 0x0, 0x0, @loopback}}}, 0x108) [ 356.308398][ T8124] team0: Port device team_slave_1 added [ 356.364845][ T8130] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.371997][ T8130] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.434836][ T8130] device bridge_slave_1 entered promiscuous mode [ 356.586372][ T8124] device hsr_slave_0 entered promiscuous mode [ 356.614308][ T8124] device hsr_slave_1 entered promiscuous mode [ 356.643933][ T8124] debugfs: Directory 'hsr0' with parent '/' already present! [ 356.683983][ T8099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 356.693722][ T8190] IPVS: ftp: loaded support on port[0] = 21 [ 356.706342][ T8130] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 356.737530][ T8130] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 356.847308][ T8143] chnl_net:caif_netlink_parms(): no params data found [ 356.943176][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 356.953807][ C0] hrtimer: interrupt took 47081 ns [ 356.964698][ T2405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 357.008235][ T8099] 8021q: adding VLAN 0 to HW filter on device team0 [ 357.050447][ T8130] team0: Port device team_slave_0 added [ 357.098056][ T8143] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.143123][ T8143] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.204009][ T8143] device bridge_slave_0 entered promiscuous mode [ 357.294757][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 357.330987][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 357.408624][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.415760][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 357.477756][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 357.515638][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 357.577786][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.585033][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 357.674291][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 357.719217][ T8130] team0: Port device team_slave_1 added [ 357.757173][ T8143] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.768128][ T8143] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.817901][ T8143] device bridge_slave_1 entered promiscuous mode [ 357.864443][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.872602][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 357.937288][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 08:39:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffc82}], 0x1}, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090468fe0704001f00000000ff3f0300000045000600000000141900110015000a12070008002300509b99e54227964f00005d", 0x39}], 0x1) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180), 0x4924924924921e1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) [ 357.990132][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 358.048201][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 358.087719][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 358.155081][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 358.163665][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 358.218612][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 358.261973][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 358.345612][ T8099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 358.374545][ T8223] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 358.417075][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 358.483034][ T8143] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 358.540729][ T8099] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 358.739541][ T8130] device hsr_slave_0 entered promiscuous mode [ 358.794244][ T8130] device hsr_slave_1 entered promiscuous mode [ 358.853834][ T8130] debugfs: Directory 'hsr0' with parent '/' already present! [ 358.872403][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 358.894021][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 358.902767][ T8143] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 358.965394][ T8223] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 359.031386][ T8124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 359.076921][ T8143] team0: Port device team_slave_0 added [ 359.111579][ T8143] team0: Port device team_slave_1 added [ 359.152399][ T8190] chnl_net:caif_netlink_parms(): no params data found [ 359.268855][ T8124] 8021q: adding VLAN 0 to HW filter on device team0 [ 359.306814][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 08:39:34 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\a\'@\x00', @ifru_flags}) [ 359.354687][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 359.576087][ T8143] device hsr_slave_0 entered promiscuous mode [ 359.604140][ T8143] device hsr_slave_1 entered promiscuous mode [ 359.643856][ T8143] debugfs: Directory 'hsr0' with parent '/' already present! [ 359.703292][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 359.730925][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 359.783237][ T3007] bridge0: port 1(bridge_slave_0) entered blocking state [ 359.790476][ T3007] bridge0: port 1(bridge_slave_0) entered forwarding state 08:39:35 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c0000001400210100000000000010000a000000", @ANYRES32=r1, @ANYBLOB="080008000000000014000200000000000000000000000000000000011400010000f70000000000000000ffffac1e000114000600000000000900005e152d260000000000"], 0x5c}}, 0x0) r2 = socket(0x10, 0x200080002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100), 0x2}], 0x492492492492805, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 08:39:35 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r2, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "78395c95d0fdfb60", "520b1e4a8ff7af2c241636098c1c22ff", "a9016007", "f6885a10e7196cef"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 360.065788][ T8190] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.072969][ T8190] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.220217][ T8190] device bridge_slave_0 entered promiscuous mode [ 360.290667][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 360.330862][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 360.414977][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.490979][ T8249] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.498147][ T8249] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.595621][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 360.654455][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 360.729230][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 360.796737][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 360.855440][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 360.902972][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 360.983873][ T8190] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.990946][ T8190] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.073467][ T8190] device bridge_slave_1 entered promiscuous mode [ 361.212417][ T8124] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 361.267327][ T8124] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 361.340181][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.353195][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.414405][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.423061][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 361.506543][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.569107][ T8190] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 361.645824][ T8130] 8021q: adding VLAN 0 to HW filter on device bond0 [ 361.711525][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 361.735496][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 361.743021][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 361.827921][ T8190] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 361.865919][ T8124] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 361.923759][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 361.934984][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.969833][ T8190] team0: Port device team_slave_0 added [ 362.013435][ T8130] 8021q: adding VLAN 0 to HW filter on device team0 [ 362.039618][ T8143] 8021q: adding VLAN 0 to HW filter on device bond0 [ 362.096499][ T8190] team0: Port device team_slave_1 added [ 362.135293][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 362.154052][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.162412][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.169567][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.254362][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 362.314357][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 362.374304][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.381368][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.434539][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 362.489067][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 362.534859][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 362.543321][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 362.628725][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 362.694738][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 362.703549][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.766156][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.802593][ T8143] 8021q: adding VLAN 0 to HW filter on device team0 [ 362.841181][ T8130] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 362.874611][ T8130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 362.909092][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 362.921157][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 362.957619][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 362.984527][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.992390][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 363.024695][ T8249] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 363.087444][ T8130] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 363.186095][ T8190] device hsr_slave_0 entered promiscuous mode [ 363.224164][ T8190] device hsr_slave_1 entered promiscuous mode [ 363.243927][ T8190] debugfs: Directory 'hsr0' with parent '/' already present! [ 363.274446][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 363.283365][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 08:39:38 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000000)) prlimit64(0x0, 0xe, &(0x7f0000000100)={0x9, 0x8d}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, &(0x7f00000004c0)=0x0) setsockopt$inet6_opts(r5, 0x29, 0x3b, &(0x7f0000000580)=ANY=[@ANYBLOB="211600000000000006a1d4ef9060770c0dfed3b02d55ab8e3b1cbf10ae40373125cfda78b190752a1eafdd02ac87a449ff86fe96ae87d3cd15e040e0ceb693d1fe6c82f9d7a141423c87ec44a08d03fbafc12e4eedfbc076bc2fb44b03e6d6ceb4297d1ceecf52bd270c283c548fe63c764511f71b493288bde6b6f365e1201234406544ef4f7ee64b84074237085c8491aacc55b24eff82570217d05c780e3e5c105a7ab0785aea68f7e20502000504010101050000000000000000000000007b986cd4bc0547a875f7107550cf4433ad5a1e5787"], 0xc0) io_submit(r6, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x42, 0x8001, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x8, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') close(r4) preadv(r7, &(0x7f00000017c0), 0x1b4, 0x500000000000000) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x420000a77, 0x0) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) [ 363.323047][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 363.331234][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.388056][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 363.407275][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 363.416242][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.423346][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.431786][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 363.442038][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 363.451697][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 363.460401][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 363.469623][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 363.479880][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 363.490451][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 363.498477][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 363.513871][ T8226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 363.541008][ T8226] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 363.556148][ T8226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 363.566811][ T8226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 363.705104][ T8143] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 363.761263][ T8143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 363.816082][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 363.830636][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 363.901120][ T8143] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 363.949934][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 363.965421][ T8097] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 364.094436][ T8190] 8021q: adding VLAN 0 to HW filter on device bond0 [ 364.127988][ T8226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 364.142280][ T8226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 364.168756][ T8190] 8021q: adding VLAN 0 to HW filter on device team0 [ 364.204549][ T8226] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 364.224453][ T8226] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 364.258202][ T8226] bridge0: port 1(bridge_slave_0) entered blocking state [ 364.265488][ T8226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 364.453982][ T8190] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 364.521333][ T8190] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 364.537243][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 364.547352][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 364.566754][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 364.603330][ T3007] bridge0: port 2(bridge_slave_1) entered blocking state [ 364.610492][ T3007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 364.643258][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 364.666842][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 364.704249][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 364.740906][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 364.767718][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 364.790066][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 364.812953][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 364.847365][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 364.881510][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 364.912400][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 364.948838][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 364.976195][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 365.001838][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 365.027546][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 365.061614][ T8190] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 365.354623][ T8403] QAT: Invalid ioctl 08:39:42 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08004500003c0000ffff00ff907800000000e000000100"/74], &(0x7f0000000040)={0x0, 0x2, [0x0, 0x100]}) 08:39:42 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4c9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000001000000"], 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000140)=0x32, 0x4) ioprio_get$uid(0x3, 0x0) 08:39:42 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='comm\x00(\xb6u\x86S\xca\xe6\x12n\xa1\x80u\xba|\xb8\xeaI\xcd\x88,\xaa\tE\x10x\xfc\xf6\xbc\x93\x8a\x05\x00\x00\x00\x02rI\xe2\xd5\xc7\xdbl+\x8d\x9da\xd8\x87') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x5) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x8925, 0x710000) 08:39:42 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @remote}, 0x10) 08:39:42 executing program 4: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast2, @local}, 0xc) 08:39:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) syz_emit_ethernet(0x6b, &(0x7f0000000280)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5d, 0x0, 0xffff, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @gre={{}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0x0, 0x0]}, {}, {}, {0x8, 0x6558, 0x0, '\n'}}}}}}, 0x0) [ 367.056122][ T8418] device lo entered promiscuous mode [ 367.089351][ T8416] mkiss: ax0: crc mode is auto. 08:39:42 executing program 4: [ 367.123904][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 367.129705][ C1] protocol 88fb is buggy, dev hsr_slave_1 08:39:42 executing program 1: [ 367.253937][ T8417] device lo left promiscuous mode 08:39:42 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='comm\x00(\xb6u\x86S\xca\xe6\x12n\xa1\x80u\xba|\xb8\xeaI\xcd\x88,\xaa\tE\x10x\xfc\xf6\xbc\x93\x8a\x05\x00\x00\x00\x02rI\xe2\xd5\xc7\xdbl+\x8d\x9da\xd8\x87') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x5) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x8925, 0x710000) 08:39:42 executing program 5: [ 367.328928][ T8418] device lo entered promiscuous mode [ 367.363925][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 367.369835][ C0] protocol 88fb is buggy, dev hsr_slave_1 08:39:42 executing program 3: [ 367.376881][ T8417] device lo left promiscuous mode 08:39:43 executing program 4: 08:39:43 executing program 1: 08:39:43 executing program 2: [ 367.583734][ T8454] mkiss: ax0: crc mode is auto. 08:39:43 executing program 5: 08:39:43 executing program 3: 08:39:43 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='comm\x00(\xb6u\x86S\xca\xe6\x12n\xa1\x80u\xba|\xb8\xeaI\xcd\x88,\xaa\tE\x10x\xfc\xf6\xbc\x93\x8a\x05\x00\x00\x00\x02rI\xe2\xd5\xc7\xdbl+\x8d\x9da\xd8\x87') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x5) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x8925, 0x710000) 08:39:43 executing program 2: 08:39:43 executing program 4: 08:39:43 executing program 1: 08:39:43 executing program 5: 08:39:43 executing program 3: [ 368.319496][ T8484] mkiss: ax0: crc mode is auto. 08:39:43 executing program 2: 08:39:43 executing program 4: 08:39:44 executing program 1: 08:39:44 executing program 3: 08:39:44 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='comm\x00(\xb6u\x86S\xca\xe6\x12n\xa1\x80u\xba|\xb8\xeaI\xcd\x88,\xaa\tE\x10x\xfc\xf6\xbc\x93\x8a\x05\x00\x00\x00\x02rI\xe2\xd5\xc7\xdbl+\x8d\x9da\xd8\x87') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x5) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x8925, 0x710000) 08:39:44 executing program 5: 08:39:44 executing program 2: 08:39:44 executing program 4: [ 368.974625][ T8511] mkiss: ax0: crc mode is auto. 08:39:44 executing program 1: 08:39:44 executing program 3: 08:39:44 executing program 5: 08:39:44 executing program 4: 08:39:45 executing program 1: 08:39:45 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='comm\x00(\xb6u\x86S\xca\xe6\x12n\xa1\x80u\xba|\xb8\xeaI\xcd\x88,\xaa\tE\x10x\xfc\xf6\xbc\x93\x8a\x05\x00\x00\x00\x02rI\xe2\xd5\xc7\xdbl+\x8d\x9da\xd8\x87') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x8925, 0x710000) 08:39:45 executing program 2: 08:39:45 executing program 3: 08:39:45 executing program 5: 08:39:45 executing program 1: 08:39:45 executing program 4: [ 369.905182][ T8540] mkiss: ax0: crc mode is auto. 08:39:45 executing program 2: 08:39:45 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='comm\x00(\xb6u\x86S\xca\xe6\x12n\xa1\x80u\xba|\xb8\xeaI\xcd\x88,\xaa\tE\x10x\xfc\xf6\xbc\x93\x8a\x05\x00\x00\x00\x02rI\xe2\xd5\xc7\xdbl+\x8d\x9da\xd8\x87') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x8925, 0x710000) 08:39:45 executing program 3: 08:39:45 executing program 5: 08:39:46 executing program 4: 08:39:46 executing program 1: 08:39:46 executing program 2: 08:39:46 executing program 4: 08:39:46 executing program 3: [ 370.860386][ T8569] mkiss: ax0: crc mode is auto. 08:39:46 executing program 5: 08:39:46 executing program 1: 08:39:46 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='comm\x00(\xb6u\x86S\xca\xe6\x12n\xa1\x80u\xba|\xb8\xeaI\xcd\x88,\xaa\tE\x10x\xfc\xf6\xbc\x93\x8a\x05\x00\x00\x00\x02rI\xe2\xd5\xc7\xdbl+\x8d\x9da\xd8\x87') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x8925, 0x710000) 08:39:46 executing program 4: 08:39:47 executing program 3: 08:39:47 executing program 2: [ 371.666591][ T8595] mkiss: ax0: crc mode is auto. 08:39:47 executing program 5: 08:39:47 executing program 1: 08:39:47 executing program 4: 08:39:47 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='comm\x00(\xb6u\x86S\xca\xe6\x12n\xa1\x80u\xba|\xb8\xeaI\xcd\x88,\xaa\tE\x10x\xfc\xf6\xbc\x93\x8a\x05\x00\x00\x00\x02rI\xe2\xd5\xc7\xdbl+\x8d\x9da\xd8\x87') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x8925, 0x710000) 08:39:47 executing program 2: 08:39:48 executing program 3: 08:39:48 executing program 1: 08:39:48 executing program 5: 08:39:48 executing program 4: 08:39:48 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='comm\x00(\xb6u\x86S\xca\xe6\x12n\xa1\x80u\xba|\xb8\xeaI\xcd\x88,\xaa\tE\x10x\xfc\xf6\xbc\x93\x8a\x05\x00\x00\x00\x02rI\xe2\xd5\xc7\xdbl+\x8d\x9da\xd8\x87') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x8925, 0x710000) 08:39:48 executing program 2: 08:39:48 executing program 1: 08:39:48 executing program 3: 08:39:49 executing program 4: 08:39:49 executing program 5: 08:39:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='comm\x00(\xb6u\x86S\xca\xe6\x12n\xa1\x80u\xba|\xb8\xeaI\xcd\x88,\xaa\tE\x10x\xfc\xf6\xbc\x93\x8a\x05\x00\x00\x00\x02rI\xe2\xd5\xc7\xdbl+\x8d\x9da\xd8\x87') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x8925, 0x710000) 08:39:49 executing program 1: 08:39:49 executing program 3: 08:39:49 executing program 2: 08:39:49 executing program 5: 08:39:49 executing program 4: 08:39:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='comm\x00(\xb6u\x86S\xca\xe6\x12n\xa1\x80u\xba|\xb8\xeaI\xcd\x88,\xaa\tE\x10x\xfc\xf6\xbc\x93\x8a\x05\x00\x00\x00\x02rI\xe2\xd5\xc7\xdbl+\x8d\x9da\xd8\x87') ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x5) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x8925, 0x710000) 08:39:49 executing program 3: 08:39:49 executing program 1: 08:39:50 executing program 5: 08:39:50 executing program 2: [ 374.765006][ T8072] ================================================================== [ 374.773190][ T8072] BUG: KCSAN: data-race in ip_finish_output2 / ip_finish_output2 [ 374.780905][ T8072] [ 374.783251][ T8072] write to 0xffff888121496c18 of 8 bytes by interrupt on cpu 0: [ 374.790892][ T8072] ip_finish_output2+0x3d6/0xe40 [ 374.795846][ T8072] __ip_finish_output+0x23a/0x490 [ 374.800984][ T8072] ip_finish_output+0x41/0x160 [ 374.805763][ T8072] ip_output+0xdf/0x210 [ 374.809929][ T8072] ip_local_out+0x74/0x90 [ 374.814265][ T8072] __ip_queue_xmit+0x3a8/0xa40 [ 374.819058][ T8072] ip_queue_xmit+0x45/0x60 [ 374.823482][ T8072] __tcp_transmit_skb+0xe81/0x1d60 [ 374.828701][ T8072] __tcp_send_ack+0x246/0x300 [ 374.833392][ T8072] tcp_send_ack+0x34/0x40 [ 374.837732][ T8072] __tcp_ack_snd_check+0xd9/0x4f0 [ 374.842760][ T8072] tcp_rcv_established+0xce9/0xf50 [ 374.847887][ T8072] tcp_v4_do_rcv+0x3b5/0x520 [ 374.852480][ T8072] tcp_v4_rcv+0x19ec/0x1bd0 [ 374.856998][ T8072] ip_protocol_deliver_rcu+0x4d/0x420 [ 374.862389][ T8072] ip_local_deliver_finish+0x110/0x140 [ 374.867863][ T8072] ip_local_deliver+0x133/0x210 [ 374.872724][ T8072] ip_rcv_finish+0x121/0x160 [ 374.877326][ T8072] ip_rcv+0x18f/0x1a0 [ 374.881324][ T8072] __netif_receive_skb_one_core+0xa7/0xe0 [ 374.887053][ T8072] __netif_receive_skb+0x37/0xf0 [ 374.892002][ T8072] netif_receive_skb_internal+0x59/0x190 [ 374.897661][ T8072] napi_gro_receive+0x28f/0x330 [ 374.902531][ T8072] receive_buf+0x284/0x30b0 [ 374.907033][ T8072] virtnet_poll+0x436/0x7d0 [ 374.911548][ T8072] net_rx_action+0x3ae/0xa90 [ 374.916139][ T8072] __do_softirq+0x115/0x33f [ 374.920647][ T8072] irq_exit+0xbb/0xe0 [ 374.924642][ T8072] do_IRQ+0xa6/0x180 [ 374.928548][ T8072] ret_from_intr+0x0/0x19 [ 374.932886][ T8072] kcsan_setup_watchpoint+0x205/0x410 [ 374.938298][ T8072] __tsan_unaligned_write8+0x143/0x1f0 [ 374.943766][ T8072] format_decode+0xbc/0xb10 [ 374.948276][ T8072] vsnprintf+0xc9/0xb40 [ 374.952439][ T8072] snprintf+0x6f/0xa0 [ 374.956445][ T8072] tomoyo_init_log+0x372/0x10d0 [ 374.961306][ T8072] tomoyo_supervisor+0x290/0xd20 [ 374.966252][ T8072] tomoyo_path_permission+0x121/0x160 [ 374.971630][ T8072] tomoyo_path_perm+0x23e/0x390 [ 374.976492][ T8072] tomoyo_inode_getattr+0x26/0x40 [ 374.981531][ T8072] security_inode_getattr+0x9b/0xd0 [ 374.986740][ T8072] vfs_getattr+0x2e/0x70 [ 374.990986][ T8072] vfs_statx_fd+0x7a/0xd0 [ 374.995318][ T8072] __do_sys_newfstat+0x49/0xa0 [ 375.000090][ T8072] __x64_sys_newfstat+0x3a/0x50 [ 375.004942][ T8072] do_syscall_64+0xcc/0x370 [ 375.009446][ T8072] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 375.015441][ T8072] [ 375.017787][ T8072] read to 0xffff888121496c18 of 8 bytes by task 8072 on cpu 1: [ 375.025519][ T8072] ip_finish_output2+0x3ab/0xe40 [ 375.030569][ T8072] __ip_finish_output+0x23a/0x490 [ 375.035612][ T8072] ip_finish_output+0x41/0x160 [ 375.040386][ T8072] ip_output+0xdf/0x210 [ 375.044571][ T8072] ip_local_out+0x74/0x90 [ 375.048904][ T8072] __ip_queue_xmit+0x3a8/0xa40 [ 375.053675][ T8072] ip_queue_xmit+0x45/0x60 [ 375.058096][ T8072] __tcp_transmit_skb+0xe81/0x1d60 [ 375.063227][ T8072] tcp_write_xmit+0xa54/0x3120 [ 375.067999][ T8072] __tcp_push_pending_frames+0x7b/0x1d0 [ 375.073552][ T8072] tcp_push+0x1e9/0x3d0 [ 375.077717][ T8072] tcp_sendmsg_locked+0x1d2b/0x1fb0 [ 375.082918][ T8072] tcp_sendmsg+0x39/0x60 [ 375.087172][ T8072] inet_sendmsg+0x6d/0x90 [ 375.091546][ T8072] sock_sendmsg+0x9f/0xc0 [ 375.095905][ T8072] sock_write_iter+0x16b/0x210 [ 375.100675][ T8072] new_sync_write+0x388/0x4a0 [ 375.105361][ T8072] __vfs_write+0xb1/0xc0 [ 375.109611][ T8072] vfs_write+0x18a/0x390 [ 375.113860][ T8072] ksys_write+0xd5/0x1b0 [ 375.118109][ T8072] __x64_sys_write+0x4c/0x60 [ 375.122701][ T8072] do_syscall_64+0xcc/0x370 [ 375.127227][ T8072] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 375.133111][ T8072] [ 375.135432][ T8072] Reported by Kernel Concurrency Sanitizer on: [ 375.141612][ T8072] CPU: 1 PID: 8072 Comm: sshd Not tainted 5.4.0-rc6+ #0 [ 375.148548][ T8072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.158603][ T8072] ================================================================== [ 375.166663][ T8072] Kernel panic - not syncing: panic_on_warn set ... [ 375.173256][ T8072] CPU: 1 PID: 8072 Comm: sshd Not tainted 5.4.0-rc6+ #0 [ 375.180190][ T8072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.190265][ T8072] Call Trace: [ 375.193579][ T8072] dump_stack+0xf5/0x159 [ 375.197837][ T8072] panic+0x210/0x640 [ 375.201751][ T8072] ? vprintk_func+0x8d/0x140 [ 375.206362][ T8072] kcsan_report.cold+0xc/0xe [ 375.210966][ T8072] kcsan_setup_watchpoint+0x3fe/0x410 [ 375.216352][ T8072] __tsan_read8+0x145/0x1f0 [ 375.220867][ T8072] ip_finish_output2+0x3ab/0xe40 [ 375.225809][ T8072] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 375.231808][ T8072] __ip_finish_output+0x23a/0x490 [ 375.236844][ T8072] ip_finish_output+0x41/0x160 [ 375.241644][ T8072] ip_output+0xdf/0x210 [ 375.245815][ T8072] ? __ip_finish_output+0x490/0x490 [ 375.251114][ T8072] ip_local_out+0x74/0x90 [ 375.255459][ T8072] __ip_queue_xmit+0x3a8/0xa40 [ 375.260236][ T8072] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 375.266236][ T8072] ip_queue_xmit+0x45/0x60 [ 375.270666][ T8072] __tcp_transmit_skb+0xe81/0x1d60 [ 375.275924][ T8072] tcp_write_xmit+0xa54/0x3120 [ 375.280697][ T8072] ? kmem_cache_alloc_node_trace+0x1b4/0x670 [ 375.286703][ T8072] __tcp_push_pending_frames+0x7b/0x1d0 [ 375.292256][ T8072] tcp_push+0x1e9/0x3d0 [ 375.296431][ T8072] tcp_sendmsg_locked+0x1d2b/0x1fb0 [ 375.301672][ T8072] tcp_sendmsg+0x39/0x60 [ 375.305929][ T8072] inet_sendmsg+0x6d/0x90 [ 375.310268][ T8072] ? inet_send_prepare+0x200/0x200 [ 375.315406][ T8072] sock_sendmsg+0x9f/0xc0 [ 375.319746][ T8072] sock_write_iter+0x16b/0x210 [ 375.324526][ T8072] new_sync_write+0x388/0x4a0 [ 375.329224][ T8072] __vfs_write+0xb1/0xc0 [ 375.333477][ T8072] vfs_write+0x18a/0x390 [ 375.337742][ T8072] ksys_write+0xd5/0x1b0 [ 375.342000][ T8072] __x64_sys_write+0x4c/0x60 [ 375.346606][ T8072] do_syscall_64+0xcc/0x370 [ 375.351146][ T8072] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 375.357041][ T8072] RIP: 0033:0x7fbfee109370 [ 375.361469][ T8072] Code: 73 01 c3 48 8b 0d c8 4a 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d 85 a2 2b 00 00 75 10 b8 01 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 0e 8a 01 00 48 89 04 24 [ 375.381080][ T8072] RSP: 002b:00007fffd1b6a948 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 375.389499][ T8072] RAX: ffffffffffffffda RBX: 00000000000000c8 RCX: 00007fbfee109370 [ 375.397490][ T8072] RDX: 00000000000000c8 RSI: 00005614ba345260 RDI: 0000000000000003 [ 375.405483][ T8072] RBP: 00005614ba345260 R08: 0000000000000001 R09: 0101010101010101 [ 375.413458][ T8072] R10: 0000000000000008 R11: 0000000000000246 R12: 00007fffd1b6a9ac [ 375.421439][ T8072] R13: 00005614b8b36fb4 R14: 0000000000000028 R15: 00005614b8b38ca0 [ 375.430808][ T8072] Kernel Offset: disabled [ 375.435137][ T8072] Rebooting in 86400 seconds..