[info] Using makefile-style concurrent boot in runlevel 2. [ 41.041666][ T26] audit: type=1800 audit(1575892122.776:21): pid=7450 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 41.097292][ T26] audit: type=1800 audit(1575892122.776:22): pid=7450 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.29' (ECDSA) to the list of known hosts. 2019/12/09 11:48:54 fuzzer started 2019/12/09 11:48:56 dialing manager at 10.128.0.105:38631 2019/12/09 11:48:56 syscalls: 2689 2019/12/09 11:48:56 code coverage: enabled 2019/12/09 11:48:56 comparison tracing: enabled 2019/12/09 11:48:56 extra coverage: extra coverage is not supported by the kernel 2019/12/09 11:48:56 setuid sandbox: enabled 2019/12/09 11:48:56 namespace sandbox: enabled 2019/12/09 11:48:56 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/09 11:48:56 fault injection: enabled 2019/12/09 11:48:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/09 11:48:56 net packet injection: enabled 2019/12/09 11:48:56 net device setup: enabled 2019/12/09 11:48:56 concurrency sanitizer: enabled 2019/12/09 11:48:56 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 62.422094][ T7616] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/09 11:49:17 adding functions to KCSAN blacklist: 'inet_unhash' 'mm_update_next_owner' 'vfs_readlink' 'pcpu_alloc' '__snd_rawmidi_transmit_ack' 'generic_fillattr' 'do_syslog' 'batadv_tt_local_add' 'netlink_getname' 'generic_write_end' '__find_get_block' 'lruvec_lru_size' '__add_to_page_cache_locked' 'relay_switch_subbuf' '__delete_from_page_cache' 'commit_echoes' '__hrtimer_run_queues' 'ep_insert' 'vm_area_dup' 'wbt_done' 'ext4_mb_good_group' 'shmem_file_read_iter' 'tcp_add_backlog' 'ep_poll' 'list_lru_count_one' 'pid_update_inode' '__ext4_new_inode' 'evict' 'mod_timer' 'process_srcu' '__anon_vma_prepare' 'hsr_forward_skb' 'do_mpage_readpage' 'filemap_map_pages' 'dd_has_work' 'audit_log_start' 'wbt_issue' 'kernfs_refresh_inode' 'common_perm_cond' 'generic_file_read_iter' 'taskstats_exit' 'ktime_get_real_seconds' 'page_counter_try_charge' '__perf_event_overflow' 'snd_seq_check_queue' 'balance_dirty_pages' '__rb_rotate_set_parents' 'ext4_free_inodes_count' 'rcu_gp_fqs_loop' 'kvm_mmu_notifier_invalidate_range_end' 'ext4_da_write_end' 'rcu_gp_fqs_check_wake' '__splice_from_pipe' 'poll_schedule_timeout' '__skb_try_recv_from_queue' 'do_nanosleep' 'p9_poll_workfn' '__process_echoes' 'percpu_counter_add_batch' '__skb_wait_for_more_packets' 'do_group_exit' 'tick_sched_do_timer' 'ext4_ext_insert_extent' 'ext4_has_free_clusters' 'ext4_mark_iloc_dirty' 'ext4_free_inode' 'mem_cgroup_select_victim_node' '__writeback_single_inode' '__fsnotify_recalc_mask' 'packet_sendmsg' 'ip_finish_output2' 'get_task_mm' 'fasync_remove_entry' 'shmem_getpage_gfp' 'pipe_poll' '__percpu_ref_switch_mode' 'shmem_add_to_page_cache' 'vti_tunnel_xmit' 'exit_signals' 'dput' 'fib6_ifup' 'run_timer_softirq' '__remove_hrtimer' '__dev_queue_xmit' 'calc_timer_values' '__dentry_kill' 'flush_old_exec' 'find_get_pages_range_tag' 'ext4_nonda_switch' 'generic_update_time' 'add_timer' 'd_instantiate_new' 'pipe_wait' 'yama_ptracer_del' 'ext4_setattr' 'ktime_get_seconds' 'tomoyo_supervisor' 'blk_mq_dispatch_rq_list' 'kauditd_thread' '__filemap_fdatawrite_range' 'snd_seq_timer_get_cur_tick' 'blk_stat_add' 'install_new_memslots' '__mark_inode_dirty' 'pollwake' 'blk_mq_sched_dispatch_requests' 'tick_nohz_idle_stop_tick' 'do_exit' 'futex_wait_queue_me' 'do_recvmmsg' 'add_timer_on' 'tick_do_update_jiffies64' 'xas_find_marked' 'snd_seq_prioq_cell_out' 'inactive_list_is_low' 'do_signal_stop' 'echo_char' 'blk_mq_run_hw_queue' 'get_signal' 'watchdog' 'n_tty_receive_buf_common' 'wq_watchdog_reset_touched' 'atime_needs_update' 'timer_clear_idle' 'blk_mq_get_request' 'sit_tunnel_xmit' 'sctp_poll' '__wb_update_bandwidth' 'ipip_tunnel_xmit' 'find_next_bit' 'copy_process' 'sync_inodes_sb' 'wbt_wait' 11:52:55 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x100000) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v1={0x1000000, [{0x0, 0x6}]}, 0xc, 0x1) r1 = accept4$rose(0xffffffffffffffff, &(0x7f0000000080)=@short={0xb, @dev, @remote, 0x1, @null}, &(0x7f00000000c0)=0x1c, 0x80000) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000100)={{0x2, 0x0, @identifier="8d1377511120fdc55ffa2d084131a368"}, 0xea, [], "e8f12eda090da1d3366166c2a70b0e4b4ea054dc8e5af437bd8a576dfd8dcee349b1a64f01a1b5b93c9ed6fda6077702f315449606a8fda6930aea7adab01b63f3b0e60f71cc2f33001478cf6d4ffe560d9269ba9b9e20a6a1b7e551234646df72fd645dc118533aa11eeb2eab812824abb6b1bd64acc53d0cbcffef8e4099d7a710981b6cf869aa013de212f9913906ae23fe03e87d50339438877b3fc6bd2308632abf5de7dc85620db848e6da32c567ec2ae00c63a5af6d6e286e7384c5d88e74cad35e58930b6ee2b0bf6c6e0d2cbf6e0162b5814d71c181b2046582e3a4008e9686b07f1703e928"}) r2 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x1, 0x202000) ioctl$RTC_VL_CLR(r2, 0x7014) readlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/179, 0xb3) pwritev(r2, &(0x7f0000000700)=[{&(0x7f0000000380)="93349aae6c604b99f7192eb06ea91017ac787ec49e9120c8b34900f08f19f1a0ba9baa4fa285227309b72973c4811ce0bfa6dc3a568b79254e029e61ad81b8cb7779438ebdf04bfc57f6f393f0fae5ec09c435ae5e92f71784f866a3da6bc8de501a9b56124957bd275c7c46e42e621d768e0f51dbf471d6359c5e2cd393faf88f725cfcad1847251365d67e1a02897f098db3038ccf41ed246df9a4bd968561991dbb96acd5", 0xa6}, {&(0x7f0000000440)="d0f1ae2d712b3610a7e7bc05293e2b754800f40caea9fd085faeda650066e7774167db43078b27fc83b3db7ffc3d5dd66c958d4f630d11eb0a7d0648b5261e4de7d3f105b318b24fcef147daa5d80123c33f0e4de33c4f4ce1b1fae80265dba7b5d7fbc9c2612cbb4120832822e64dd9e6a39bd29bef2817a561ba9c1693d60887441144a277bf29ebe039d42f939412f45d6000d8f96ef2e0a4a19950b882667fa606bba76ba1bda6534d9c5ec3825dbdb99b9efe46338d5ea1c40852c9b4a1dc666430a84e1190f6699cf7c703945bfe59224e5b305633ba", 0xd9}, {&(0x7f0000000540)="d89a05e11f1639ddeef6eea97582cdc8dd4c483a8c3543ce1858961173474fa1ad76e3a409bf1ceb0476f75efd7b7cae000fe376c5ff9c2f5596d7ecc1654b68ca674be875378f34a585510da07b1ad2ceab67245953616d7d0e394bfa879b58cf2fd2955de8d4540d87157415cadaee253b882b062fb9cc3779809e79aefeab7f5546704c32b29212bccac316b510527c0dd4bd57754369d7ef219abca3d6057593a7cf8bea091eb63ff0b6ad2c113ab3197dff27808ce3fde27809aa905253b92a073a61638d790f42de41eee994557c8d1db853ed173b434efed55854bfaee8f7bb9b8c6e2845af16f2ab0b233f55291a7dfea2ccf57d22", 0xf9}, {&(0x7f0000000640)="3a450b22193b0c4b84711ea46b3cf0fd10f47aa172fde9077f81c3ba95ba6e67ed043fbe14daa33e2e1f253eb404615a4721a6e199c4fbdc0aac9a88b4e2c612fa538ec505bd373ff30be3cb92730c65fc124040daa19de747a10a222f9e15c4699d29331af4becdfbd86d63f6fc18c6fffe136b9abd53408f02a56ada6e20332fab76b02f7d15591cb45d2bf86e89278635b328e9abcb8f71413e603c0fc52a71f11a10b96384152533b84bf4", 0xad}], 0x4, 0x8) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000740)='/dev/dlm-control\x00', 0x82205, 0x0) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000780)=0x3, 0x4) close(0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f00000007c0)='net/packet\x00') getsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f0000000800), &(0x7f0000000840)=0x4) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0)={0x0, 0x0}, &(0x7f0000000b00)=0xc) r7 = getuid() syz_mount_image$iso9660(&(0x7f0000000880)='iso9660\x00', &(0x7f00000008c0)='./file0\x00', 0x80000000, 0x1, &(0x7f00000009c0)=[{&(0x7f0000000900)="0dc5bf55e900230443b41097f4e273f48e731a3ab6ae4d01a9e472f69ed92ed0a2b28ecb5af46368ae853c6b25367814bb3aa09d81963861f7c9bd2484e792c0fb0b2af8ab4e65d7426fdd43d6c672bc7b974a55c89a193698155a3ffce8a7c689120c19dbdf82bcfd807ff9191e478a463766077f622f4b023ea785bc8c0d8b0e4ea0c0e17d615dffaceea9e0d2cc1eafab5977c012f3da", 0x98, 0x8}], 0x46b5d48d3167f5ed, &(0x7f0000000b40)={[{@map_off='map=off'}, {@map_acorn='map=acorn'}], [{@uid_gt={'uid>', r5}}, {@subj_role={'subj_role', 0x3d, ':#{#vboxnet0.*-\\selinux-\\eth1!usertrusted'}}, {@euid_lt={'euid<', r6}}, {@measure='measure'}, {@euid_lt={'euid<', r7}}, {@pcr={'pcr', 0x3d, 0x1}}, {@obj_role={'obj_role'}}, {@smackfsdef={'smackfsdef', 0x3d, 'em1'}}]}) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/dlm-monitor\x00', 0x101080, 0x0) ioctl$SNDCTL_DSP_SPEED(r8, 0xc0045002, &(0x7f0000000c80)=0x7ca) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x32) r9 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000d00)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x20200000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x2c, r9, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x10001}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x40}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000011}, 0x4014) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x7000, 0x70074036e442422, &(0x7f0000ff9000/0x7000)=nil) r10 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000e40)='/proc/capi/capi20ncci\x00', 0x8400, 0x0) renameat(r0, &(0x7f0000000e00)='./file0\x00', r10, &(0x7f0000000e80)='./file0\x00') ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000ec0)=0xae6) r11 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001080)='/dev/dlm_plock\x00', 0x880, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r11, 0x111, 0x2, 0x1, 0x4) r12 = gettid() mq_notify(r8, &(0x7f00000010c0)={0x0, 0x3f, 0x2, @tid=r12}) 11:52:56 executing program 1: setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:unconfined_exec_t:s0\x00', 0x27, 0x6) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x2, 0x0) fchmodat(r0, &(0x7f0000000100)='./file0/file0\x00', 0x80) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x203800, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r2, 0x629a22504a2ca99c, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x3, @bearer=@udp='udp:syz1\x00'}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x10) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) ioctl$PPPOEIOCDFWD(r3, 0xb101, 0x0) fanotify_init(0x16, 0x800) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f0000000300)=0x1000000, 0x4) socketpair(0xa, 0x5, 0xff, &(0x7f0000000340)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x20, &(0x7f0000000380)=[@in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e21, @empty}]}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000440)={r5, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x6, 0x3f, 0x2, 0x2, 0x1}, &(0x7f0000000500)=0x98) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) readv(r6, &(0x7f0000000600)=[{&(0x7f0000000540)=""/154, 0x9a}], 0x1) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000640)='/dev/dlm-control\x00', 0x2, 0x0) ioctl$PPPIOCATTCHAN(r7, 0x40047438, &(0x7f0000000680)=0x2) r8 = syz_open_dev$audion(&(0x7f00000006c0)='/dev/audio#\x00', 0xb6e, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a00)=0xe8) getresuid(&(0x7f0000000a40)=0x0, &(0x7f0000000a80), &(0x7f0000000ac0)) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000b00)={{{@in6=@remote, @in6=@mcast1, 0x4e22, 0x3, 0x4e23, 0x0, 0x2, 0x80, 0x20, 0x62, r9, r10}, {0x3f, 0x4, 0x3, 0x40, 0x1, 0x6, 0x1, 0x2}, {0x5, 0x7, 0x1, 0x4}, 0x9b3, 0x6e6bb0, 0x1, 0xdac4006c27d8aaf5, 0x2}, {{@in6=@mcast2, 0x4d2, 0x6c}, 0xa, @in=@local, 0x3500, 0x8, 0x3, 0x1f, 0x3, 0x2, 0x7fffffff}}, 0xe8) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000c00)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) rt_sigpending(&(0x7f0000000c40), 0x8) r11 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_G_OUTPUT(r11, 0x8004562e, &(0x7f0000000cc0)) r12 = openat(0xffffffffffffff9c, &(0x7f0000000d00)='./file0/file0\x00', 0x101300, 0x2) setsockopt$netrom_NETROM_T2(r12, 0x103, 0x2, &(0x7f0000000d40)=0x2, 0x4) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, &(0x7f0000000d80)={0x0, 0x9}) r13 = socket$bt_bnep(0x1f, 0x3, 0x4) recvmmsg(r13, &(0x7f0000002a40)=[{{&(0x7f0000000dc0)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000010c0)=[{&(0x7f0000000e40)=""/131, 0x83}, {&(0x7f0000000f00)=""/224, 0xe0}, {&(0x7f0000001000)=""/170, 0xaa}], 0x3}, 0x7}, {{&(0x7f0000001100)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000001240)=[{&(0x7f0000001180)=""/163, 0xa3}], 0x1, &(0x7f0000001280)=""/23, 0x17}}, {{&(0x7f00000012c0)=@vsock, 0x80, &(0x7f0000001380)=[{&(0x7f0000001340)=""/25, 0x19}], 0x1, &(0x7f00000013c0)=""/222, 0xde}, 0x8001}, {{&(0x7f00000014c0)=@ll, 0x80, &(0x7f0000002900)=[{&(0x7f0000001540)=""/150, 0x96}, {&(0x7f0000001600)=""/30, 0x1e}, {&(0x7f0000001640)=""/4096, 0x1000}, {&(0x7f0000002640)=""/129, 0x81}, {&(0x7f0000002700)=""/241, 0xf1}, {&(0x7f0000002800)=""/253, 0xfd}], 0x6, &(0x7f0000002980)=""/150, 0x96}, 0xff}], 0x4, 0x40000000, 0x0) [ 294.353870][ T7620] IPVS: ftp: loaded support on port[0] = 21 [ 294.479456][ T7620] chnl_net:caif_netlink_parms(): no params data found [ 294.481104][ T7622] IPVS: ftp: loaded support on port[0] = 21 [ 294.508511][ T7620] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.515602][ T7620] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.523690][ T7620] device bridge_slave_0 entered promiscuous mode [ 294.533749][ T7620] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.541221][ T7620] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.549681][ T7620] device bridge_slave_1 entered promiscuous mode 11:52:56 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400200, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000040)={0x2, 0x80000001, 0xcf72d5ad9710c035}) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@ipv4_delroute={0x38, 0x19, 0x0, 0x70bd2d, 0x25dfdbfc, {0x2, 0x10, 0x14, 0x1f, 0xff, 0x0, 0x190, 0x4, 0x1580}, [@RTA_MULTIPATH={0xc, 0x9, {0x203, 0x1, 0xef, r1}}, @RTA_PRIORITY={0x8, 0x6, 0x43e4}, @RTA_GATEWAY={0x8, 0x5, @rand_addr=0x7ff}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x1) membarrier(0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r0, 0xc0884113, &(0x7f0000000240)={0x0, 0x9, 0x1, 0x10001, 0x4, 0x1, 0x8268, 0x9, 0x6, 0x3f, 0x2}) clock_getres(0x2, &(0x7f0000000300)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x20080, 0x0) ioctl$SNDRV_PCM_IOCTL_REWIND(r2, 0x40084146, &(0x7f0000000380)=0x5) r3 = syz_open_dev$vcsu(&(0x7f00000003c0)='/dev/vcsu#\x00', 0x81, 0x0) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000400)={"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"}) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/capi/capi20\x00', 0x200802, 0x0) sendmsg$tipc(r4, &(0x7f0000001d40)={&(0x7f0000000a40)=@id={0x1e, 0x3, 0x0, {0x4e24}}, 0x10, &(0x7f0000001cc0)=[{&(0x7f0000000a80)="80afea20c419a2a066b2100d2d6d671e2600e5f77ccb3f1a8223e1b107b53e540393c2cfca522fc5bf8a3fd6a600d2dc1a697fa8379465d1e4f7766d06de88341f53b0eca4e5c54631bda3e1b0964581bac10dc53c481c00c05626794ba16bd04b6b45122340eefcca55ef51c8d4312c77ccaaadb31b7ffe32ce1d41075b773f4538577b8e09f86bcbe6fa5808a80f6699e30a8579b69b801a189736d96ebb88201b809d233b0b2eda2950", 0xab}, {&(0x7f0000000b40)="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", 0x1000}, {&(0x7f0000001b40)="6c6c2ff40e41a680185ad8ea21d055cd2c8cc1ddb7db7d98d64e1b30a231acec42bdbae43c27b82bb0faf9f3b7061edc8475cc3ef804b9da845eb33b8d3d8b0ebc09c0ba1050be0dd052edba7544040d", 0x50}, {&(0x7f0000001bc0)="f5dd1dfeb9122457711c0cbf5b7ce5c70cc5d07ca03cf70050d38090052a3b4f26931fc3c70b4a0eacecb2d54e3169f3191ca11576453b41f06a38f2c7a74359d246896e36b7f01b5ec392aae00f0cef61d1afa0c63d108d8f1139b6acfed4cb8e95631bf38b80b281baf8cd172d4320f4121781b5203cf260d62f19c59fc24f76558ca2e16108fdeda8d7fba1cb8160e25088cb98f0f5758bbbe779b6cdce815acb4c1205d3d7b2744784a4e93c0f8bb3cf59e18fa9a16e8f16087997235d7dd35e170f328f3a1eed2ae61a5e7f138efafd1da6601828eb", 0xd8}], 0x4, &(0x7f0000001d00)="e681a2", 0x3, 0x40004109}, 0x800) accept4(r0, &(0x7f0000001d80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000001e00)=0x80, 0xebe2493e3347d06b) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000001e40)={0x7a0, 0x1, 0x2, 0x1f, 0x0}, &(0x7f0000001e80)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000001ec0)={0x1, 0x18, 0x0, 0x8001, 0x7, 0xfff, 0x2, 0xfffffff7, r6}, 0x20) openat$audio1(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/audio1\x00', 0x410080, 0x0) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/dlm_plock\x00', 0x2c00, 0x0) ioctl$SNDCTL_DSP_POST(r7, 0x5008, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000001f80)='/dev/input/mouse#\x00', 0xa77c, 0x400) ioctl$DRM_IOCTL_MODE_SETCRTC(r8, 0xc06864a2, &(0x7f0000002000)={&(0x7f0000001fc0)=[0x4, 0x24, 0x4, 0x101, 0x9, 0x8], 0x6, 0x3, 0x10001, 0x2, 0x46, 0x9, {0x3, 0x20, 0x0, 0x0, 0x8, 0x3f, 0x0, 0x20, 0x4, 0x9, 0x8, 0x4, 0xc93, 0x0, "b367b782e1258c07826c40652fea216a1d61465ccdb6d68cc2cb5c50a09b4d93"}}) r9 = openat$bsg(0xffffffffffffff9c, &(0x7f0000002080)='/dev/bsg\x00', 0x200800, 0x0) ioctl$KVM_X86_SET_MCE(r9, 0x4040ae9e, &(0x7f00000020c0)={0x8500000000000000, 0x4000, 0x5, 0x8, 0x13}) pipe2(&(0x7f0000002100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x18b94170f8738ad6) setsockopt$IP_VS_SO_SET_ADD(r10, 0x0, 0x482, &(0x7f0000002140)={0x0, @rand_addr=0xbf, 0x4e23, 0x793e44a0, 'lblc\x00', 0x2, 0x400, 0x4e}, 0x2c) getsockopt$TIPC_DEST_DROPPABLE(r9, 0x10f, 0x81, &(0x7f0000002180), &(0x7f00000021c0)=0x4) r11 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000002200)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$ASHMEM_SET_NAME(r11, 0x41007701, &(0x7f0000002240)='-\'GPL-\x00') sendto$isdn(r3, &(0x7f0000002280)={0x10001, 0xffff, "548fc7291ce5d8974305981899afeb18666010c00694be2f1a41c8a7584bb37a518362a40e9324b309def7ed41f50ad1b1845ee3fa4e78108b11434bb08c676eb0c8cff72f7233ebc05b64ee649291be859ed4995e1535a801114d61c24c9b3e88600410af8b6499df59868d1c3a6d7fdfa2d4b5d7c911aa3543d7d2e4280dc772534e72a037dd2065d41e3897c061583654982566b75bff208a600c8c2328ebc4d697c3a85968d1d26402596e3c9c35a6162af768fdd5b18ab0f53eb9add38ef28c823161173388145b04d6228216cd007820"}, 0xdb, 0x4000080, &(0x7f0000002380)={0x22, 0x2, 0x1, 0x0, 0x7f}, 0x6) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000023c0)={'bond_slave_1\x00', {0x2, 0x4e21, @empty}}) [ 294.581384][ T7620] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 294.593272][ T7620] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 294.621607][ T7620] team0: Port device team_slave_0 added [ 294.661239][ T7620] team0: Port device team_slave_1 added [ 294.694863][ T7622] chnl_net:caif_netlink_parms(): no params data found 11:52:56 executing program 3: ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000000)={{0xadef51b2d12922f, 0x0, 0xa, 0x2, 0x5, 0x5, 0xe9, 0x65, 0x1, 0x26, 0x9, 0x81}, {0x2, 0x479b7893baae1dd7, 0x9, 0x3, 0xff, 0x80, 0x2, 0x6, 0x8, 0x1f, 0x8, 0x1}, {0x11000, 0x0, 0xa, 0x1, 0x3f, 0x1, 0x9, 0x7, 0x0, 0x0, 0x7}, {0x5000, 0xf000, 0x0, 0xe, 0x6, 0x53, 0x7, 0x7, 0x6, 0x2, 0x0, 0x6}, {0x2000, 0x1, 0xc, 0x4, 0x9, 0x3f, 0x7f, 0xd7, 0x85, 0x8, 0xff, 0x3f}, {0xd000, 0x1000, 0xc, 0x9, 0x6, 0x2, 0x63, 0x2, 0x0, 0x3, 0x7f, 0x21}, {0x0, 0x100000, 0x9, 0x2, 0x8, 0x7, 0x80, 0x6, 0x1a, 0x5, 0x0, 0x7f}, {0xf000, 0xd000, 0x15, 0xf3, 0x8b, 0x40, 0x1, 0x40, 0x8, 0xbf, 0x1, 0x81}, {0x5000, 0x1}, {0x3000, 0xf000}, 0x1, 0x0, 0xf000, 0x210000, 0x9, 0x1, 0xd000, [0x6, 0x5, 0x3f, 0x7ff]}) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bsg\x00', 0x101000, 0x0) ioctl$USBDEVFS_DISCARDURB(r0, 0x550b, &(0x7f0000000180)=0x5) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x400, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@empty}}, &(0x7f0000000300)=0xe8) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000340)=r2) write$P9_RXATTRCREATE(r1, &(0x7f0000000380)={0x7, 0x21, 0x2}, 0x7) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', 0x101080, 0x0) fcntl$getown(r3, 0x9) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-vsock\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r4, &(0x7f0000000440)={0x80000000}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000480)={{0x0, 0x0, @descriptor="e7b37bc7d65229e2"}, 0xae, [], "c4061c5d193cd6bb32dbebdba8ca14e54f78f7fe0047cf9f07d4da00241f4184e3000b9f85532916fd05068ddd0f927655c92f2287414e156eddb5a63f112af762253a12b8e4018d0ab0f5c95f6b9ba4cfc19ca19a915619321f82753eae590a40f569207d8441c4e4ab45a15e487c0f2d61546b594ce02a3ee7f0369140b977de78e1ee855b1382092a8824a1ec4f1d6e35fde2102d7b3443e4e148e7e21a502c47c6ac46e4e04c2903b382174d"}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000003540)='/dev/ubi_ctrl\x00', 0x10000, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r5, 0x40806685, &(0x7f0000003780)={0x1, 0x0, 0x1000, 0xe8, &(0x7f0000003580)="9ef1615589df3582da7500000049922e4ed7506db4a37de3481c760da0f74f9abb51afce33adf0cc2ddba1c58d1ee1f4da4a4fd7f9e3a6caaa97329090a54ccea374af358da10cbedbe19b387cad6c8ef2bc281d13472467cadf6c95b47b8161ba36973b6a713add85e2e7e52a5d466d4054d0d540db22ef5d79d62e7033be91ee82c82b342e51a611787dd5130eb630326dbd37e3056cbab5c50b2072ab7b3ccedca6fe37794fd969318a456bf8b52839e1d3fcdf0b7dc445f4db5382391f9fd184628bf431d67167024b1986066e9e5c9eb6a68254c7a1dc36c0ea395e8624f26415c3669feaca", 0xe2, 0x0, &(0x7f0000003680)="ea9b2059bf2a2b401682803759c56b9a49a29c4b022eab4ca4643fa8ce3f3e8f895d71f46101dbc81c8764cb102aa48ae5507940912f95a6f075887e7d08675efbf1a102ef200e7ac5cc38b37daa3c6e171b564d047b1b996545d6984c09bcc22af2b5df5f8788753d3f3d97d61d467d3f083e490e298312414f32c999a6793977d5aae4a2df3e785b1f15b7db3bcd5ef6128cb1b2c68c34fb1428cc59819e334d0de814ac174a964a355eb77648fec79a44480c99415fe8f27bc8e6b5a197df5b4dba722882b2bcf3283b2dd2f1b78aeeb79d10696f7e440e96e8032c9d9709d1c2"}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003a00)={r5, 0xc0, &(0x7f0000003940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003800)=0x1, 0x0, 0x0, 0x0, &(0x7f0000003840)={0x5, 0x1}, 0x0, 0x0, &(0x7f0000003880)={0x5, 0x3, 0xff, 0x4}, &(0x7f00000038c0)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000003900)=0xffffffff}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003a40)={r6}, 0xc) ioctl$VIDIOC_S_SELECTION(r5, 0xc040565f, &(0x7f0000003a80)={0x8, 0x2, 0x0, {0x1, 0x10001, 0x9, 0x5}}) r7 = add_key$user(&(0x7f0000003ac0)='user\x00', &(0x7f0000003b00)={'syz', 0x2}, &(0x7f0000003b40)="e5542d02f69e7e50e9deff1c75bf714c1e477e899b6c97e57af0c7e4cd1512b61d86da6e24459ff38e0dab0910e2e4b7dd93ec14f4818bfd16632edebaf276f1b32fc3f359b7b820c78023eb421d9258e4374448b0d7fe55697cfb39a030b1940e2d94d6cf1b2c5e1aed26646218b2b4d99cb54bfd0b50be3f5384e9b8d860a673c57a05800ac437fe9b44e2bd1335fc0ce58282c02c0e3aeba09d8f10f81da30506555f1b6763d572f7c844771e2f9e0f73fab19888e7a07244f1def8b6cd600eb6c74f975497b182029b3eaa37a0fe53f95dae6b25fd4d1bad10278479126d6db86c", 0xe3, 0xfffffffffffffffb) keyctl$update(0x2, r7, 0x0, 0x0) userfaultfd(0x80000) r8 = socket$rds(0x15, 0x5, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000003c40)={0x0, r8, 0x100000000, 0x0, 0x9, 0x753789e7}) socket$xdp(0x2c, 0x3, 0x0) r9 = syz_open_dev$media(&(0x7f0000003c80)='/dev/media#\x00', 0x9, 0x400) write$P9_RWSTAT(r9, &(0x7f0000003cc0)={0x7, 0x7f, 0x1}, 0x7) r10 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCAUSEDIAG(r10, 0x89ec, &(0x7f0000003d00)={0x1, 0x12}) r11 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000003d40)='/dev/hwrng\x00', 0x4002, 0x0) ioctl$VFIO_IOMMU_MAP_DMA(r11, 0x3b71, &(0x7f0000003d80)={0x20, 0x7b40acd8d83bbeec, 0x1, 0x1, 0x9f91}) pipe2(&(0x7f0000003dc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x81000) setsockopt$inet_tcp_TCP_MD5SIG(r12, 0x6, 0xe, &(0x7f0000003e00)={@in={{0x2, 0x4e23, @loopback}}, 0x0, 0x4, 0x0, "a399345c34c3a729cb8f596d6e23dd1b6676c699b58361540fd143ea1692652004714a10e629fd2a98c102f766e581dbd9e125536569e0783f254c8b07c0366e08622ec6b06dc703598a39526607a651"}, 0xd8) [ 294.759588][ T7620] device hsr_slave_0 entered promiscuous mode [ 294.797598][ T7620] device hsr_slave_1 entered promiscuous mode [ 294.905296][ T7626] IPVS: ftp: loaded support on port[0] = 21 [ 294.967153][ T7630] IPVS: ftp: loaded support on port[0] = 21 [ 294.982547][ T7620] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.989646][ T7620] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.996908][ T7620] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.003960][ T7620] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.108431][ T7622] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.115506][ T7622] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.178032][ T7622] device bridge_slave_0 entered promiscuous mode [ 295.238246][ T7622] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.245389][ T7622] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.268540][ T7622] device bridge_slave_1 entered promiscuous mode [ 295.388199][ T7620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.423096][ T7622] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 295.469817][ T7642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.497500][ T7642] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.537459][ T7642] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.558067][ T7642] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 295.589849][ T7622] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 295.653618][ T7620] 8021q: adding VLAN 0 to HW filter on device team0 [ 295.671376][ T7622] team0: Port device team_slave_0 added 11:52:57 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x7d61, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x6, 0x2}, 0x0, 0x0, &(0x7f0000000080)={0x3, 0x5, 0x2, 0x68f8}, &(0x7f00000000c0)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x5}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={r0}, 0xc) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) getpeername$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0xfe99, 0x1) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000380)={0x29, 0x6, 0x0, {0x3, 0x5}}, 0x29) r3 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x81, 0x800) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000400)=0x3, 0x2) r4 = creat(&(0x7f0000000440)='./file0\x00', 0x140) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000480), &(0x7f00000004c0)=0x4) setsockopt$netrom_NETROM_IDLE(0xffffffffffffffff, 0x103, 0x7, &(0x7f0000000500)=0x10000, 0x4) getresuid(&(0x7f0000000600)=0x0, &(0x7f0000000640), &(0x7f0000000680)) mount$9p_virtio(&(0x7f0000000540)='syz\x00', &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='9p\x00', 0x1100084, &(0x7f00000006c0)={'trans=virtio,', {[{@nodevmap='nodevmap'}], [{@euid_gt={'euid>', r5}}, {@audit='audit'}, {@smackfstransmute={'smackfstransmute', 0x3d, '\'+cgroup\xa1$ppp0'}}, {@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) r6 = syz_open_dev$vcsu(&(0x7f0000000740)='/dev/vcsu#\x00', 0x8, 0x200) read$dsp(r6, &(0x7f0000000780)=""/53, 0x35) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000007c0)=0x0) ptrace(0x10, r7) openat$ppp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ppp\x00', 0x10000, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000840)='./file0\x00', 0x4001, 0x60) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000000880)=[@in6={0xa, 0x4e21, 0x7f, @dev={0xfe, 0x80, [], 0x20}, 0x50}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e21, 0x200, @mcast2, 0xc8}, @in6={0xa, 0x4e24, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xff}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e23, 0x7, @rand_addr="15a7e7bfe44b4a124102e279d49fd650", 0x400}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e24, 0x9, @empty, 0xc3}], 0xcc) r9 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000980)='/dev/vcsa\x00', 0x2, 0x0) write$binfmt_elf64(r9, &(0x7f00000009c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x2, 0x7f, 0xc0, 0x1, 0x0, 0x3, 0x7, 0x180, 0x40, 0x1f4, 0x8000, 0x8000, 0x38, 0x1, 0x4, 0x80, 0x20}, [{0x2, 0x3f, 0x14, 0x3e, 0x7fff, 0x8dc, 0x2, 0xbbc90d8}], "fc20fe2ff675ba501915fa29cb0caf7f9ef4a77eae6042d742b867ecca2f4038cca7fc0f1b86227d9ce0bcf45eef92a1cb393624e7c89d699c4ef9be54fd3018b4f3865d503a595dc41579d0c39dcf577c075eab72907bc728d3047e8aaef9f98622f2e6dcb7cf17", [[], [], [], [], []]}, 0x5e0) r10 = openat$full(0xffffffffffffff9c, &(0x7f0000000fc0)='/dev/full\x00', 0x200000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001200)={r10, 0xc0, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=0x10001, 0x0, 0x0, 0x0, &(0x7f0000001040)={0x5, 0x2}, 0x0, 0x0, &(0x7f0000001080)={0x3, 0x9, 0x5, 0x7fffffff}, &(0x7f00000010c0)=0x10000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001100)=0xffffffff7fffffff}}, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000001240)='TIPC\x00') socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000001280)) epoll_create1(0x80000) openat$vcs(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vcs\x00', 0x80, 0x0) [ 295.723628][ T7622] team0: Port device team_slave_1 added [ 295.759488][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.777726][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.786076][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.793156][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.867888][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.876498][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.927816][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.934969][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.049770][ T7622] device hsr_slave_0 entered promiscuous mode [ 296.067552][ T7622] device hsr_slave_1 entered promiscuous mode [ 296.107280][ T7622] debugfs: Directory 'hsr0' with parent '/' already present! [ 296.159639][ T7642] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 296.232627][ T7656] IPVS: ftp: loaded support on port[0] = 21 [ 296.255309][ T7626] chnl_net:caif_netlink_parms(): no params data found [ 296.297732][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 296.326967][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 296.360030][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 296.403755][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 296.440001][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 11:52:58 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x800, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={r1, 0x80, 0x8, [0x5, 0x1000, 0x0, 0x8, 0x1, 0xc2f, 0x1ff, 0x1ff]}, &(0x7f0000000140)=0x18) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x408200, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x99806311244b2acf, 0x0) write$UHID_CREATE(r2, &(0x7f0000000240)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000200)=""/14, 0xe, 0x3, 0x2, 0x6, 0x7f, 0x3}, 0x120) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_opts(r3, 0x29, 0x3b, &(0x7f0000000380)=""/52, &(0x7f00000003c0)=0x34) r4 = syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x80000001, 0xbdd8f3fd81d197c3) ioctl$BLKREPORTZONE(r4, 0xc0101282, &(0x7f0000000440)={0xb1, 0x2, 0x0, [{0x570, 0x3, 0x3, 0x1, 0x93, 0xf7}, {0x3, 0x5, 0x40, 0x20, 0x6, 0x1f}]}) r5 = shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT(r5, 0xd, &(0x7f0000000500)=""/208) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x12, &(0x7f0000000600)='/dev/input/mouse#\x00'}, 0x30) ptrace(0x4200, r6) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ubi_ctrl\x00', 0x117000, 0x0) ioctl$RTC_UIE_OFF(r7, 0x7004) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFNETMASK(r8, 0x891b, &(0x7f0000000700)={'sit0\x00', {0x2, 0x4e20, @empty}}) r9 = syz_open_procfs(r6, &(0x7f0000000740)='statm\x00') ioctl$GIO_UNISCRNMAP(r9, 0x4b69, &(0x7f0000000780)=""/151) r10 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000840)='/dev/nullb0\x00', 0x400203, 0x0) ioctl$BLKZEROOUT(r10, 0x127f, &(0x7f0000000880)={0x9, 0x659}) r11 = socket$pptp(0x18, 0x1, 0x2) ioctl$sock_inet_SIOCGIFNETMASK(r11, 0x891b, &(0x7f00000010c0)={'veth1\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x16}}}) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/cachefiles\x00', 0x44101, 0x0) connect$inet(r12, &(0x7f0000001200)={0x2, 0x4e20, @broadcast}, 0x10) r13 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001240)='/dev/dlm-monitor\x00', 0x200000, 0x0) r14 = syz_genetlink_get_family_id$tipc(&(0x7f00000012c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r13, &(0x7f0000001380)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x30, r14, 0x300, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x40) [ 296.491420][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 296.548928][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.577105][ T7620] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 296.609561][ T7620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 296.645398][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 296.655538][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 296.687877][ T3516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.735658][ T7630] chnl_net:caif_netlink_parms(): no params data found [ 296.754981][ T7620] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 296.819447][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 296.826949][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 296.885215][ T7626] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.888934][ T7688] IPVS: ftp: loaded support on port[0] = 21 [ 296.917322][ T7626] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.947396][ T7626] device bridge_slave_0 entered promiscuous mode [ 297.025573][ T7626] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.043743][ T7626] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.070564][ T7626] device bridge_slave_1 entered promiscuous mode [ 297.132760][ T7630] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.149538][ T7630] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.177301][ T7630] device bridge_slave_0 entered promiscuous mode [ 297.193632][ T7622] 8021q: adding VLAN 0 to HW filter on device bond0 [ 297.223485][ T7656] chnl_net:caif_netlink_parms(): no params data found [ 297.280025][ T7630] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.287101][ T7630] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.324747][ T7630] device bridge_slave_1 entered promiscuous mode [ 297.395186][ T7626] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 297.452046][ T7622] 8021q: adding VLAN 0 to HW filter on device team0 [ 297.541012][ T7660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 297.558775][ T7660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 297.567733][ T7626] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 11:52:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='V\xfd\x00\x00\x00\x00\x06\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x299}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0xd, 0x0, 0x40, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 297.591814][ T7688] chnl_net:caif_netlink_parms(): no params data found [ 297.677110][ T7630] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 297.698664][ T7630] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 11:52:59 executing program 0: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3000003, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x1000000000000000, 0xffffffffffffffff, 0x1) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$VIDIOC_S_MODULATOR(0xffffffffffffffff, 0x40445637, &(0x7f0000000280)={0xd1cf, "8cea5ec5b58e4c123a784f93a51268cca6065a90c990b3cf19d9bffce053eed0", 0x4, 0x7893, 0x3, 0x2, 0x4}) fanotify_mark(r2, 0x8, 0x8, 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x0) socket(0x10, 0x4019198ee16572dc, 0x0) kcmp(0x0, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00001da000/0x18000)=nil, 0x0, 0xfffffe72, 0x0, 0x0, 0xa00000000000000) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt(r4, 0x3a, 0x1, &(0x7f0000000040)="a70c79ff7822c34d8244c4a2494dded77bb3712956253d56a42d54026baf316e55", 0x21) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000040)=@ccm_128={{}, "6880781c7ea2d92d", "f97f57faed0075c0f77f0e3799e93cb8", "6d533804", "ff9027b19c4cccfa"}, 0x28) [ 297.731278][ T7660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.763900][ T7660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.807821][ T7660] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.814966][ T7660] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.841829][ C1] hrtimer: interrupt took 26125 ns [ 297.848869][ T7716] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 297.868935][ T7660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 297.887562][ T7660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.895942][ T7660] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.903052][ T7660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.959111][ T7626] team0: Port device team_slave_0 added [ 297.965232][ T7660] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 297.978121][ T7660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 298.025857][ T7622] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 298.041348][ T7622] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 298.053764][ T7626] team0: Port device team_slave_1 added [ 298.062759][ T7656] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.070176][ T7656] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.080208][ T7656] device bridge_slave_0 entered promiscuous mode [ 298.091359][ T7656] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.098451][ T7656] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.106212][ T7656] device bridge_slave_1 entered promiscuous mode [ 298.130687][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 298.140066][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 298.148434][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 298.156954][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 298.165401][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 298.173993][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 298.182430][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 298.191151][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 298.199369][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 298.207863][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 298.215688][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 298.232691][ T7630] team0: Port device team_slave_0 added [ 298.243323][ T7688] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.250569][ T7688] bridge0: port 1(bridge_slave_0) entered disabled state [ 298.261475][ T7688] device bridge_slave_0 entered promiscuous mode [ 298.277204][ T7630] team0: Port device team_slave_1 added 11:53:00 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) unshare(0x20000) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x4007) close(r1) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000000c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x10}}}}, 0x38) ioctl$USBDEVFS_RESET(r1, 0x5514) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000400)={0x9, @sdr={0x0, 0x1fffe}}) getpid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fstat(0xffffffffffffffff, 0x0) syz_open_dev$media(0x0, 0x9, 0x10d200) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x380000, @loopback}, 0x1c) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfe, 0x8}, 0xc, &(0x7f0000000500)=[{}, {&(0x7f0000001640)={0x2c, 0x0, 0x0, 0x0, 0x0, "", [@generic, @typed={0x8, 0x0, @uid}, @generic="6b1d789c552953e59a9dcfc7", @typed={0x4}, @typed={0x4, 0x15, @binary}]}, 0x2c}], 0x2, &(0x7f00000040c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88, 0x20000000}, 0x0) getpid() r4 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r4, 0x0) [ 298.286998][ T7656] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 298.305277][ T7622] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 298.313412][ T7688] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.321345][ T7688] bridge0: port 2(bridge_slave_1) entered disabled state [ 298.329805][ T7688] device bridge_slave_1 entered promiscuous mode [ 298.380238][ T7626] device hsr_slave_0 entered promiscuous mode [ 298.420240][ T7626] device hsr_slave_1 entered promiscuous mode [ 298.443161][ T7731] IPVS: ftp: loaded support on port[0] = 21 [ 298.457722][ T7626] debugfs: Directory 'hsr0' with parent '/' already present! [ 298.499391][ T7630] device hsr_slave_0 entered promiscuous mode [ 298.537695][ T7630] device hsr_slave_1 entered promiscuous mode [ 298.577362][ T7630] debugfs: Directory 'hsr0' with parent '/' already present! [ 298.586136][ T7660] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 298.593671][ T7660] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 298.602358][ T7656] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 298.694122][ T7688] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 298.711847][ T7656] team0: Port device team_slave_0 added [ 298.777553][ T7688] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 298.869085][ T7656] team0: Port device team_slave_1 added [ 298.910329][ T7688] team0: Port device team_slave_0 added [ 298.958602][ T7765] ================================================================== [ 298.966736][ T7765] BUG: KCSAN: data-race in d_alloc_parallel / d_set_d_op [ 298.973747][ T7765] [ 298.976072][ T7765] read to 0xffff888128a349c0 of 4 bytes by task 7758 on cpu 0: [ 298.983616][ T7765] d_alloc_parallel+0x884/0xe00 [ 298.988465][ T7765] proc_fill_cache+0x182/0x290 [ 298.993240][ T7765] proc_pid_readdir+0x1c4/0x3ce [ 298.998095][ T7765] proc_root_readdir+0x8f/0xb0 [ 299.002865][ T7765] iterate_dir+0x312/0x380 [ 299.007275][ T7765] __x64_sys_getdents+0x14b/0x280 [ 299.012303][ T7765] do_syscall_64+0xcc/0x370 [ 299.016907][ T7765] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 299.018311][ T7688] team0: Port device team_slave_1 added [ 299.022787][ T7765] [ 299.030642][ T7765] write to 0xffff888128a349c0 of 4 bytes by task 7765 on cpu 1: [ 299.038262][ T7765] d_set_d_op+0x10c/0x230 [ 299.042587][ T7765] proc_pid_instantiate+0xdc/0x110 [ 299.047693][ T7765] proc_fill_cache+0x1db/0x290 [ 299.052448][ T7765] proc_pid_readdir+0x1c4/0x3ce [ 299.057298][ T7765] proc_root_readdir+0x8f/0xb0 [ 299.062052][ T7765] iterate_dir+0x312/0x380 [ 299.066478][ T7765] __x64_sys_getdents+0x14b/0x280 [ 299.071504][ T7765] do_syscall_64+0xcc/0x370 [ 299.076007][ T7765] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 299.081881][ T7765] [ 299.084199][ T7765] Reported by Kernel Concurrency Sanitizer on: [ 299.090340][ T7765] CPU: 1 PID: 7765 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 299.097521][ T7765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.107828][ T7765] ================================================================== [ 299.115877][ T7765] Kernel panic - not syncing: panic_on_warn set ... [ 299.122461][ T7765] CPU: 1 PID: 7765 Comm: ps Not tainted 5.4.0-syzkaller #0 [ 299.129643][ T7765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.139686][ T7765] Call Trace: [ 299.142980][ T7765] dump_stack+0x11d/0x181 [ 299.147315][ T7765] panic+0x210/0x640 [ 299.151215][ T7765] ? vprintk_func+0x8d/0x140 [ 299.155818][ T7765] kcsan_report.cold+0xc/0xd [ 299.160419][ T7765] kcsan_setup_watchpoint+0x3fe/0x460 [ 299.165799][ T7765] __tsan_unaligned_write4+0xc4/0x100 [ 299.171170][ T7765] d_set_d_op+0x10c/0x230 [ 299.175495][ T7765] proc_pid_instantiate+0xdc/0x110 [ 299.180601][ T7765] proc_fill_cache+0x1db/0x290 [ 299.185362][ T7765] ? proc_task_lookup+0x1a0/0x1a0 [ 299.190385][ T7765] proc_pid_readdir+0x1c4/0x3ce [ 299.195243][ T7765] proc_root_readdir+0x8f/0xb0 [ 299.200009][ T7765] iterate_dir+0x312/0x380 [ 299.204443][ T7765] __x64_sys_getdents+0x14b/0x280 [ 299.209462][ T7765] ? filldir64+0x340/0x340 [ 299.213882][ T7765] do_syscall_64+0xcc/0x370 [ 299.218387][ T7765] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 299.224270][ T7765] RIP: 0033:0x7f750707b575 [ 299.228685][ T7765] Code: 83 c7 13 e9 ed 53 fd ff 90 90 90 90 90 90 90 90 90 90 90 90 90 41 56 49 89 f0 48 63 ff b8 4e 00 00 00 41 55 41 54 55 53 0f 05 <48> 3d 00 f0 ff ff 77 58 4d 8d 24 00 49 89 c5 4d 39 e0 73 40 4c 89 [ 299.248287][ T7765] RSP: 002b:00007ffea1028890 EFLAGS: 00000246 ORIG_RAX: 000000000000004e [ 299.256870][ T7765] RAX: ffffffffffffffda RBX: 00000000020b1270 RCX: 00007f750707b575 [ 299.264848][ T7765] RDX: 0000000000008000 RSI: 00000000020b12a0 RDI: 0000000000000005 [ 299.272816][ T7765] RBP: ffffffffffffffa8 R08: 00000000020b12a0 R09: 0000000000000000 [ 299.280779][ T7765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 299.288760][ T7765] R13: 00000000020b12a0 R14: 0000000000000005 R15: 0000000000000000 [ 299.298167][ T7765] Kernel Offset: disabled [ 299.302530][ T7765] Rebooting in 86400 seconds..