[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 50.826864][ T26] audit: type=1800 audit(1567266914.804:25): pid=8235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 50.881373][ T26] audit: type=1800 audit(1567266914.804:26): pid=8235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 50.902712][ T26] audit: type=1800 audit(1567266914.814:27): pid=8235 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.161' (ECDSA) to the list of known hosts. 2019/08/31 15:55:24 fuzzer started 2019/08/31 15:55:27 dialing manager at 10.128.0.26:45397 2019/08/31 15:55:27 syscalls: 2487 2019/08/31 15:55:27 code coverage: enabled 2019/08/31 15:55:27 comparison tracing: enabled 2019/08/31 15:55:27 extra coverage: extra coverage is not supported by the kernel 2019/08/31 15:55:27 setuid sandbox: enabled 2019/08/31 15:55:27 namespace sandbox: enabled 2019/08/31 15:55:27 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/31 15:55:27 fault injection: enabled 2019/08/31 15:55:27 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/31 15:55:27 net packet injection: enabled 2019/08/31 15:55:27 net device setup: enabled 15:58:15 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7f, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r1, r2}}, 0x18) syncfs(r0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x80, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000001c0)="6426f30fbd8f8000000066baf80cb8e24e578aef66bafc0cb0b5ee3666660f38dc01b9f60b00000f3266b816018ed066b84d008ee80f013e6641642e80bd00000000000f08", 0x45}], 0x1, 0x1, &(0x7f0000000280), 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f00000002c0)={0x7d3, 0x8, 0xfff, 0x7, 0x10, 0xfe}) ioctl$VIDIOC_S_INPUT(r3, 0xc0045627, &(0x7f0000000300)=0x3) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000340)={0xfffffffffffffffb, 0x2, 0x200}) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x23, &(0x7f0000000380), &(0x7f00000003c0)=0x4) sendfile(r0, r2, &(0x7f0000000400), 0x4) bind$inet6(r2, &(0x7f0000000440)={0xa, 0x4e21, 0x5, @empty, 0x101}, 0x1c) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000480)={0x5, 0x0, 0x7fff, 0xfe}, 0x6) fcntl$getownex(r0, 0x10, &(0x7f00000004c0)={0x0, 0x0}) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000500)={0x0, 0x1ff, 0xa0, 0xffffffff, 0x1, 0x2}) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x2) tkill(r4, 0x1c) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000540)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, 0x7, 0x8, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000005c0)=@assoc_value={0x0}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000640)={r5, @in={{0x2, 0x4e20, @loopback}}, 0x1, 0x401, 0x2, 0x9, 0x1f}, &(0x7f0000000700)=0x98) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000740)={'ipddp0\x00', 0x7fffffff}) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000780)={@ipv4={[], [], @local}}, &(0x7f00000007c0)=0x14) r7 = socket(0x5, 0x3, 0x2) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x6) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r7, 0x84, 0x78, &(0x7f0000000800)=r6, 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000840)={r6, @in={{0x2, 0x4e24, @multicast2}}, 0xb1, 0x3, 0x2, 0x800000000000, 0x10}, &(0x7f0000000900)=0x98) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000940)) r8 = syz_open_dev$vcsn(&(0x7f0000000980)='/dev/vcs#\x00', 0x8, 0x100) ioctl$VFIO_SET_IOMMU(r8, 0x3b66, 0x3) 15:58:15 executing program 1: prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x2, 0x0) ioctl$MON_IOCG_STATS(r0, 0x80089203, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x7e8da0afe8a19f52}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x100, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4040) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f00000001c0)={{0x4, 0x7}, {0x4, 0x100000000}, 0xfffffffffffffffb, 0x2, 0x1}) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000240), &(0x7f0000000280)=0x4) write$P9_RXATTRWALK(r0, &(0x7f00000002c0)={0xf, 0x1f, 0x2, 0x1}, 0xf) ioctl$TCSBRK(r0, 0x5409, 0x40) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0x1, 0x6, "a1d94b21fe3274c479b29672030fab56b7587fe1537ca0e6d93f761c61b3c52c6b45dd0241881a994d0b9aa98613662e5a17e26ed03e033ace6826f4e5645e54e7416d8db9afe36a24f72c768a7775e18d3ba672a4bca08e0f4e15efc4e8909ce1fe5107d1fdabc045c8d6240c9ed271b7224ebcfe8118de2c0e67f80f2f3271e334f04d197d9547e79498853730dd41d25c17b66c7e7571b3a63e99e12ee78bfdeb1233f2fc70819cde4d5dc95407e8cad1eaf5a6b1108acf727f1a74889fd346829d2e5eaf9ad5763c0a5f77353c624ae1f41fa799a2bf5d746f5dc1934f0f7f7cd6bea38054c055a95d813a002211b09e82e0837cd3876cae1e1398e349f7", 0x5f, 0x4, 0x0, 0x9, 0x8000, 0x81, 0x848, 0x1}, r2}}, 0x120) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000004c0)=0x7fff, 0x4) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000500)={0x42, 0x0, 0x5a8310e24fcde6f7}, 0x10) r3 = creat(&(0x7f0000000540)='./file0\x00', 0x20) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000580)=""/102) sendmmsg$sock(r0, &(0x7f0000000b80)=[{{&(0x7f0000000600)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e20, 0xff1262, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffffffffff9}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="449edc05a45b5cfde00aee662978fe474713e054842f478626cb6b652bc39713bfd5a4628d2032e49e38ed1a3fdd9d48ebc03ee703df61ad1f86820383d1fb9811e93a6e89547740b494a4cdbfc98cc7c38eeaf243966699102766cedf824183b622c74aed28f01320416a0db6aa85d6cea0ee69ec97dd86033db79a88b5be3543cda790606aa1a359540322be192d37ea18a535694850e6132456de4450abc3fa0971a6a1a78da10fb4c79d66fdc374142ac942a65816c4018ae290d427227fc97cb59635797ca7ce14d631990e26a213c002870f5f37d048c08e8284", 0xdd}, {&(0x7f0000000780)="90f005621bec5adfbccceebac19befecc6f3fdbf40f2abe2dae10745258cfd94f7e3cb38427a8351ac68f4389a5fe3d69e8967b22ab0fa2f6e972c3c2227fa16257422474c935f79f70aff5bb244412d5aa6693ce8c4501025719405d1ac5b13b99e677d81e50d48391d71953775cd6c19adc887cc53a97e287f668ec3657a9c5292016a0db71e056d56aa03fd3e32dc582d5fd1a9655e2d766a235e2c5d4327952c145dc7ad2b2d9582ba8d582c3513f5997605119a6bc4b40af28603429601bf57c6c448022b9ade1c8ac46fdf3aa67696a7581337b137e3e05098dd7494bcf956", 0xe2}, {&(0x7f0000000880)="c4718635a4b15140425f3d184a47ba89501b5f5e8293a784bd63e6f8a928fd6085931327dc995201ab12ce49609c817408d46dcd0f10ee4bc0eba002722752c6589d7f6cecd5dbeb046ea00917fce202241c2de200fec1d623d957cd8bef40d695ca60a50ead3cbc017d1bb3619c293dcdfb4326443ee29cbba01033ee70d27055bea4dcc5247b46", 0x88}, {&(0x7f0000000940)="90ddf11d1741f5943e20b0ff7a6252120bf6b36de32850898816e58f07c1acc2b032e6859a543d45d0d8bbd5c79551", 0x2f}, {&(0x7f0000000980)="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", 0xfc}, {&(0x7f0000000a80)="d27a3318f9cd344fd0346d1a08c2ac981b3878b142eb6f6ff968551097de60ce4f5195fc4a70956826adbcb22dc0def4c6b6d453020703", 0x37}], 0x6, &(0x7f0000000b40)=[@txtime={{0x18, 0x1, 0x3d, 0x80000000}}], 0x18}}], 0x1, 0x80) dup2(r0, r3) r4 = msgget$private(0x0, 0x22) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000bc0)=""/223) r5 = eventfd2(0x3, 0x80001) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000cc0), &(0x7f0000000d00)=0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000d40)={0x0, @in6={{0xa, 0x4e20, 0x7363, @loopback, 0x6e}}, 0x20, 0x16ac, 0x64, 0x8, 0x40}, &(0x7f0000000e00)=0x98) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000e40)={r6, 0x2e, "482d6ea73a38c1eb0579c620034ac0692daada2b847409619ba3855bbff64e75e462240f3f1859b4c875a1fcf530"}, &(0x7f0000000e80)=0x36) sendmsg$key(r3, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={&(0x7f0000000ec0)={0x2, 0xc, 0xffffffff00000001, 0x5, 0x13, 0x0, 0x70bd29, 0x25dfdbfe, [@sadb_spirange={0x2, 0x10, 0x4d5, 0x100000000}, @sadb_address={0x5, 0x5, 0x33, 0x80, 0x0, @in6={0xa, 0x4e22, 0x9, @ipv4={[], [], @empty}, 0xb32}}, @sadb_lifetime={0x4, 0x2, 0x5, 0x8, 0x4f, 0x6}, @sadb_x_filter={0x5, 0x1a, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@mcast1, 0x10, 0x14, 0x10}, @sadb_x_nat_t_type={0x1, 0x14, 0x80}]}, 0x98}}, 0x80) syz_open_dev$ndb(&(0x7f0000001000)='/dev/nbd#\x00', 0x0, 0x20000) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000001040)=0x2) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000001080)={r7, 0x100000001, 0x20, 0x3, 0xb9}, &(0x7f00000010c0)=0x18) splice(r5, &(0x7f0000001100), r3, &(0x7f0000001140), 0x7f, 0x6) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000001180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, {0xa, 0x4e21, 0x1f, @ipv4={[], [], @empty}, 0x9a12}, r2, 0x480}}, 0x48) openat$zero(0xffffffffffffff9c, &(0x7f0000001200)='/dev/zero\x00', 0x1, 0x0) syzkaller login: [ 231.464698][ T8403] IPVS: ftp: loaded support on port[0] = 21 [ 231.563261][ T8405] IPVS: ftp: loaded support on port[0] = 21 15:58:15 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/wireless\x00') getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x1b, "7fc51fec1962a389cab2fe8f294881d143d3f6aee4d8aa4b824345"}, &(0x7f0000000080)=0x23) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={r1, 0x5}, &(0x7f0000000100)=0x8) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000140)=0x5) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000180)=0x100, 0x4) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000280)={0x1, 0x1, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}]}) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000002c0)='#posix_acl_access\x00', &(0x7f0000000300)='net/wireless\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000380)={0x1, 0x9, 0x2}) r2 = socket(0x3, 0x3, 0xd4) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f00000003c0)={@dev}, &(0x7f0000000400)=0x14) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000440)=0x1ff, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000480), &(0x7f00000004c0)=0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000500)={@in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x22}}}, 0x0, 0x4, 0x0, "f5d1e08bad960e18868805a9a7f7a2ead288ef3f5cbfe84e4c7a249a1db24bf1735f169bac03a66212cd2f52966084d5ff4f755d4589843e8411eb38509c25abecc99adad4ab4efe01d2e52bf7a8ebf7"}, 0xd8) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) getsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000600), &(0x7f0000000640)=0x4) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000680)={0x0, 0x48}, 0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000006c0)=@assoc_value={r1, 0xfffffffffffffffa}, 0x8) ioctl$int_out(r0, 0x5460, &(0x7f0000000700)) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000780)={r0, r2, 0x2, 0xa, &(0x7f0000000740)="90c1c8fee5aad35caea6", 0x7f, 0xd9, 0x8000, 0x7f, 0x81, 0x1, 0x401, 'syz1\x00'}) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000840), 0x1) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000880)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f00000008c0)={0x6, 0x2, {0x1, 0x3, 0x101, 0x0, 0x80000001}}) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000940)={0xe3c, 0x1, @value=0x99}) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f0000000980), &(0x7f00000009c0)=0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000a00)=[@in={0x2, 0x4e21, @rand_addr=0x3}, @in6={0xa, 0x4e21, 0x6, @local, 0xff}, @in={0x2, 0x4e23, @rand_addr=0x8}, @in6={0xa, 0x4e23, 0x1f, @dev={0xfe, 0x80, [], 0x18}, 0x4952}, @in={0x2, 0x4e23, @rand_addr=0x32}, @in6={0xa, 0x4e24, 0x6, @remote, 0xe4}, @in={0x2, 0x4e21, @remote}, @in={0x2, 0x4e24, @rand_addr=0x8}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x15}}], 0xc4) [ 231.636411][ T8403] chnl_net:caif_netlink_parms(): no params data found [ 231.725422][ T8403] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.742839][ T8403] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.750876][ T8403] device bridge_slave_0 entered promiscuous mode [ 231.774132][ T8403] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.781253][ T8403] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.789649][ T8403] device bridge_slave_1 entered promiscuous mode [ 231.829340][ T8408] IPVS: ftp: loaded support on port[0] = 21 [ 231.840680][ T8403] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 231.877068][ T8403] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 231.895154][ T8405] chnl_net:caif_netlink_parms(): no params data found 15:58:15 executing program 3: exit_group(0x8001) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1240, 0x40000) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000040)=0x8000) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipmr_getroute={0x1c, 0x1a, 0x200, 0x70bd2b, 0x25dfdbfd, {0x80, 0x80, 0x80, 0x80, 0x0, 0x1, 0xfd, 0xa, 0x2000}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x22800, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000180)='net/sockstat\x00') lsetxattr$security_smack_transmute(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x8f7383934e975380) r4 = shmget$private(0x0, 0x1000, 0x40, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000280)=""/48) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x90804001}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, r5, 0x200, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0xffffffffffffffad, 0x80000000, 0x9}}}, ["", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8054}, 0x90cd2003e555934f) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f0000000400)={0x9, 0xc, 0x5, 0x1, "acd3b64e2b224906d8db387cfcb7343d62cb56c2f589f5f9ded82f5f09060b45"}) write$binfmt_aout(r1, &(0x7f0000000440)={{0x10b, 0x5, 0xfffffffffffffffe, 0x31b, 0x122, 0x80, 0x2b7, 0x9}, "4eb5a3813d115b62af0a47d628375f3458f6b26e99c75227fac334537193769e364a4411c69d920180dc1a7943da7085537899c2a291dc817e78795390b5a6884f110fc232bdd2afa6ac0e4d5c62304502de4072214df2fa04ae7ee38994738f487db98a0adb55b4fd486e0ce64d02bb369c1afe3cb2e152a729baaa0b9061", [[], [], [], [], [], [], [], []]}, 0x89f) prctl$PR_SET_PTRACER(0x59616d61, r2) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000d00)={0xffff, {{0x2, 0x4e20, @multicast1}}, 0x1, 0x3, [{{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}}, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x22}}}]}, 0x210) socket$inet_udplite(0x2, 0x2, 0x88) ptrace(0x4208, r2) mkdir(&(0x7f0000000f40)='./file0/file0\x00', 0x31) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000f80)={0x1, 0x1, {0x2, 0x10, 0x8, 0xa, 0x5, 0x8, 0x2, 0x4}}) ptrace$getregs(0xc1912338b18e21ed, r2, 0x5, &(0x7f0000000fc0)=""/205) getpgrp(r2) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f00000010c0)={0x1, 0x40}) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000001100)) getsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f0000001140), &(0x7f0000001180)=0x4) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000011c0)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r3, 0xc010641d, &(0x7f0000002200)={r6, &(0x7f0000001200)=""/4096}) getsockopt$bt_hci(r1, 0x0, 0x0, &(0x7f0000002240)=""/222, &(0x7f0000002340)=0xde) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000002380)) [ 231.939564][ T8403] team0: Port device team_slave_0 added [ 231.965264][ T8403] team0: Port device team_slave_1 added [ 231.984366][ T8405] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.991448][ T8405] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.014400][ T8405] device bridge_slave_0 entered promiscuous mode [ 232.034242][ T8405] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.041276][ T8405] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.062935][ T8405] device bridge_slave_1 entered promiscuous mode [ 232.079988][ T8405] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.127403][ T8411] IPVS: ftp: loaded support on port[0] = 21 [ 232.135795][ T8405] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:58:16 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xff, 0x280401) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000040)=0x43) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x1, 0x0, 0x8001, 0x7}, 0x1, 0x3, 0x0, 0x0, "e441b0e21d7e0030"}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x40000) write$cgroup_type(r0, &(0x7f00000001c0)='threaded\x00', 0x9) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000200)=0x4) fchdir(r0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x2, 0x0) r3 = fsopen(&(0x7f0000000280)='gfs2\x00', 0x1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x12, 0x16, 0x4, "e4bb927f88ff53b58a28a96c9d6d02beb674a78850b921d5a3dfd9687920c6ce2d1bdbb69e99d01ef78576a3045e6bd5b995623df2b0b5a50e4526903628e259", "2f4089c827751daf9a2887f24f6a0ea5e173f5626bfcb93979d283fdc8aeffe3", [0x80000000, 0x3]}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000380)={r1, @broadcast, @empty}, 0xc) ioctl$SIOCX25SCAUSEDIAG(r2, 0x89ec, &(0x7f00000003c0)={0x20, 0x3ff}) r4 = syz_open_dev$sndctrl(&(0x7f0000000400)='/dev/snd/controlC#\x00', 0x75, 0x100) r5 = fcntl$getown(r3, 0x9) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000480)={{{@in=@multicast2, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000580)=0xe8) r7 = getpgid(0x0) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000b40)=0x0, &(0x7f0000000b80)=0x0, &(0x7f0000000bc0)=0x0) sendmsg$netlink(r2, &(0x7f0000000c80)={&(0x7f0000000440)=@proc={0x10, 0x0, 0x25dfdbfc, 0x10}, 0xc, &(0x7f0000000a40)=[{&(0x7f00000005c0)={0x47c, 0x25, 0x200, 0x70bd29, 0x25dfdbfb, "", [@nested={0x278, 0x64, [@generic="21c0fe2e3e0c16798cc94caaefadce8f53b838ee4696acaa1ab013c5327f5279a68037ec7d6124ea8e12994e05288606f724855b2b9e1eeed810053d5f98f3de253c07f6a11cbd4505e8ba0301ab9b9af532ee704a59e1d52da972ad7e", @generic="dbf399d8facea20f0dd9272bc54abd0d16043641f7246607f9ed8ccf8066cdc2d7874203fcc939ebb619fe8caeebcf7eb2dad97706965dd844258c7a999a406a6a0b20567ca2b3fd338ed100f75f01618f2200bb56d9c8ebc4e20bb27d6c111189de7dd3eb146bfaff1a3dd90f73e2f555dbe5ca2626e99a4596c96f94c459fae7cfd15f4a7ceb8bd70ba7b9fa5e9eba50fb8d73e0594092bfa281046c81b0871217ae1a0a64463bc3525d29fa31c35305a961cecf4dcb596c7f315242d93ee71ce8ce40ec23f4b505be82ba1c92723c90c36515d0be1106080c13ca61872de847d59e9cd627347496391ae6cfa2e4a33611b65d78699f", @generic="0030282bfd77199eb10e2bb2313b0c8d09e577236160feaa72c93d130f86f1d0c60a2ee6146e94647d477ee3964d59dea91f4e0865207762b0eb6f9a373ba96c8ea514fea5f15456b9b2e07fb624a67241673137341188619196fa80011fd2ed24333de910b7079d67274b8c02ab454d31f1e1bdf6da38fffc2c6d139c5d4a6a29e3ba8368446051941e43f8a9e762f496ad25120f922238376cb7e6aaeae5cd74a3713825890f78713d474623e083c01b52fd3ab55151a15e8fa25c63dfbfd6efd94b08278a2a8b1ff6b7d856094557aff8b8f01201734890420712f9f4244d0b79114fd14b79957827b218732d8c0f560a18bea9d5dba5", @generic="78fdf11edd7a89b550ff05633440f56a8ee22c07bda2f0ddf7bb512f528df7a5d75d4ceb1f53"]}, @nested={0xec, 0x4b, [@typed={0x8, 0x4c, @pid=r5}, @generic="41e68a5d7e5852072de03c2464709051af999a2442c7040cc154e4cd191fbf7f642f0f04223a8b649d8f0ef8f918ea7dfbf727bb3ddf5e4bb294fc98d11db157ae80ce617b02f8f6a7ff527648f6d7ce8a021b1e3ac89bb4a1d1ee0cee6e2f47667d799e438eb30f6ae3dd78b6cd6c03739ab5ab1033c7171031e8c38e7399bf0e4c3f30cf754aa30d5662f9fdafff4c2dfd7d650f56451ca1729b9f0ec643bd12eaf9d045a8dabef39dd100cb0606d8b0092246060959", @typed={0x14, 0x78, @ipv6=@rand_addr="ec8abf82026db4c1437c0775ba78a305"}, @generic="1043", @typed={0x8, 0x56, @uid=r6}, @typed={0x8, 0x69, @u32=0x4}]}, @generic="7845ebab9be41c9c14dcd1bca76b5134249499bb4e27b239d551f3b63efd6071d7fe96e2e1c42dba77eb789f742380dfbe0446d0926a8b8c39845e42e2ffeeda41f06cbabccff830126672932de2a8bf05ee0ad5737b5672d8eca81a6bc678604d569f677b7805db2fd98933108ab6ca9cea0b56132aa15213377f5419bb7736f57f5457b5e8843e2cfce25e3f6ba1cc22e06a82b5725ecefa2e9a3ec688d59035bcec56cca50d32", @generic="c068dd839e756f783ffe3a199ab844519fa5d32ef4eb6010fd421a975d4b1962de664c73983356527ee102cd91cebbbae89a3e2da65b31c8d4db1d521fca40998c148eb1b017e8ecbfa0227fc3436ffd7f2269f41601b76d3efc3579d95acf"]}, 0x47c}], 0x1, &(0x7f0000000c00)=[@rights={{0x24, 0x1, 0x1, [r2, r4, r2, r3, r4]}}, @rights={{0x14, 0x1, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {r7, r8, r10}}}, @rights={{0x20, 0x1, 0x1, [r2, r3, r2, r0]}}], 0x80, 0x4000}, 0x200048c0) write$P9_RXATTRCREATE(r2, &(0x7f0000000cc0)={0x7, 0x21, 0x2}, 0x7) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000d00)={@empty, 0x4d, r1}) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000d40)={0x338, 0x0, 0x1, [{{0x3, 0x2, 0x8, 0x8000, 0x2, 0x0, {0x5, 0xb86, 0x1, 0xe4, 0xd532, 0x5, 0xfffffffeffffffff, 0x400, 0x0, 0x3, 0x9, r6, r11, 0x3, 0xfff}}, {0x1, 0x8, 0x17, 0x0, '#em0!trusted}*mime_type'}}, {{0x6, 0x2, 0x6, 0x7, 0x100000000, 0x5, {0x0, 0x80000000, 0x7ff, 0x6, 0x15, 0x8, 0xb5, 0x20, 0x4, 0x3ff, 0xffffffffffffffff, r6, r12, 0x400, 0xffffffffffff4217}}, {0x1, 0x2, 0x6, 0x80000000, 'cpuset'}}, {{0x3, 0x0, 0x2, 0x0, 0x5, 0x7fffffff, {0x3, 0x1, 0x2, 0x7, 0x6, 0x5, 0x947, 0x5, 0x2, 0x2dc8fcd7, 0x10000, r8, r9, 0x7fe, 0x1d}}, {0x2, 0x3, 0x0, 0x1ff}}, {{0x2, 0x2, 0x3ff, 0xfffffffffffffffb, 0x6, 0x1, {0x3, 0x800, 0x80000000, 0x2, 0x8, 0x1, 0x6, 0xff, 0x7f, 0x7fff, 0x8, r8, r9, 0x1, 0x20}}, {0x5, 0x1000, 0x1, 0x80000001, '.'}}, {{0x1, 0x3, 0xff, 0xd4, 0xe31, 0x7, {0x2, 0xf6, 0x40, 0x80, 0x8c9, 0x101, 0x4, 0x4, 0x100, 0x4, 0xffffffff, r8, r12, 0x3, 0x5}}, {0x5, 0x10000, 0x8, 0xe65, 'O#md5sum'}}]}, 0x338) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000001080)={0xace3, 0x8, 0x0, 0x200}) perf_event_open(&(0x7f0000001100)={0x0, 0x70, 0x0, 0x9b, 0x9, 0x8, 0x0, 0x3, 0x200, 0x2, 0x3, 0xdb5, 0xfffffffffffffbff, 0x0, 0xd3f9, 0x0, 0x6, 0x100, 0xccbf, 0x8000, 0xfffffffffffffff8, 0x3e4, 0xfff, 0x145f, 0x5, 0x400, 0x80000001, 0x7, 0x2, 0x0, 0x6, 0x1577, 0x4, 0x9, 0xf94a, 0x1, 0x5, 0x8, 0x0, 0x9, 0xe71179a81af38de6, @perf_bp={&(0x7f00000010c0), 0x4}, 0x20000, 0xfbe0, 0x7, 0x1, 0x341f, 0x7, 0x2}, r7, 0x7, 0xffffffffffffffff, 0x2) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000001180)=0x10000) getsockopt$rose(r2, 0x104, 0x0, &(0x7f00000011c0), &(0x7f0000001200)=0x4) keyctl$session_to_parent(0x12) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000001240)={0x0, 0x3f, 0x0, 0x33849a9a, 0x6}, &(0x7f0000001280)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000012c0)={r13, 0x2}, 0x8) [ 232.326507][ T8403] device hsr_slave_0 entered promiscuous mode 15:58:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x1, 0x1}) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f00000000c0)={0x0, 0x200000000000000, 0x8000, &(0x7f0000000080)=0x33}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000140)={0x0, 0x1, 0x8c, &(0x7f0000000100)=0x4}) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000180)=0x8000000) write$P9_RRENAME(r0, &(0x7f00000001c0)={0x7, 0x15, 0x1}, 0x7) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000200)={0x20000012}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'bcsf0\x00', 0x4e794324f5c25914}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f00000002c0)) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000300)={0x200, 0x0, 0x1}) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000340)) inotify_add_watch(r0, &(0x7f00000004c0)='./file0\x00', 0x2000000) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x7) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0xffffffff, 0xa6fec58582eccd0b) write$input_event(r0, &(0x7f0000000580)={{0x0, 0x7530}, 0x11, 0xbebb, 0x3d8}, 0x18) write$FUSE_POLL(r1, &(0x7f00000005c0)={0x18, 0x0, 0x1, {0x1}}, 0x18) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000600)={{0xe7, @loopback, 0x4e23, 0x0, 'rr\x00', 0x20, 0x8000, 0x35}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x10000, 0x401, 0x1000, 0x200}}, 0x44) ioctl$sock_proto_private(r1, 0x89e2, &(0x7f0000000680)="3037edc091cb964d27f18f417bfb1897e4d22610f378c42aabc48b9f3783bbfc11c09d9503de8fe740b6e7d27178ce7e4af805db691add70d978e3be") setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000006c0)=@int=0x7f, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', r0}, 0x10) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000780)=[r1, r0, r0, r2, r1], 0x5) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000880)={&(0x7f00000007c0), &(0x7f0000000800)=""/75, 0x4b}) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000009c0)={0x15, 0xcb, &(0x7f00000008c0)="0be9f09eb153012ca4e7a03a2de0c336e8128de02c2638038f8c5b69513f251b46ebfc1e7600fb22eead5e96873c2f8ca9f12444b487acda7681298325948ae8e92dd23ebf84892baaee8e69f328abf6da558ef715a9569c3317fe15a218a326278067a9a83b2b8392ee04eae910cf6763a7d7814b93c0330183f60a5cdfb17d0054a5fb546ffd1bf390986120c586417a25284d9f3cec5903fbfc62ae066016a6569de67e242ce6d1a74581d1c3b4489e4cd307e1db41d07867cd7faf27b84dfe15fdea782cb8d5d19934"}) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000a00)={0xffff, 0x3, 0xfffffffffffffe01}) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000a40)={0x73622a85, 0xa, 0x1}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/nullb0\x00', 0x20101, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/hwrng\x00', 0x101000, 0x0) [ 232.382174][ T8403] device hsr_slave_1 entered promiscuous mode [ 232.436111][ T8405] team0: Port device team_slave_0 added [ 232.465532][ T8403] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.472708][ T8403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 232.473136][ T8403] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.486983][ T8403] bridge0: port 1(bridge_slave_0) entered forwarding state [ 232.499252][ T8414] IPVS: ftp: loaded support on port[0] = 21 [ 232.511128][ T8405] team0: Port device team_slave_1 added [ 232.523866][ T8408] chnl_net:caif_netlink_parms(): no params data found [ 232.614874][ T8405] device hsr_slave_0 entered promiscuous mode [ 232.672197][ T8405] device hsr_slave_1 entered promiscuous mode [ 232.732033][ T8405] debugfs: Directory 'hsr0' with parent '/' already present! [ 232.753551][ T8408] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.760604][ T8408] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.762720][ T8416] IPVS: ftp: loaded support on port[0] = 21 [ 232.774214][ T8408] device bridge_slave_0 entered promiscuous mode [ 232.784224][ T2857] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.792007][ T2857] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.810724][ T8408] bridge0: port 2(bridge_slave_1) entered blocking state [ 232.818395][ T8408] bridge0: port 2(bridge_slave_1) entered disabled state [ 232.826048][ T8408] device bridge_slave_1 entered promiscuous mode [ 232.844148][ T8408] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.855925][ T8408] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.881525][ T8408] team0: Port device team_slave_0 added [ 232.889585][ T8408] team0: Port device team_slave_1 added [ 232.964646][ T8408] device hsr_slave_0 entered promiscuous mode [ 233.032221][ T8408] device hsr_slave_1 entered promiscuous mode [ 233.082326][ T8408] debugfs: Directory 'hsr0' with parent '/' already present! [ 233.190471][ T8411] chnl_net:caif_netlink_parms(): no params data found [ 233.207127][ T8414] chnl_net:caif_netlink_parms(): no params data found [ 233.297061][ T8411] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.305774][ T8411] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.313548][ T8411] device bridge_slave_0 entered promiscuous mode [ 233.322702][ T8403] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.329970][ T8411] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.337102][ T8411] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.344739][ T8411] device bridge_slave_1 entered promiscuous mode [ 233.362728][ T8411] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 233.391580][ T8414] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.400011][ T8414] bridge0: port 1(bridge_slave_0) entered disabled state [ 233.407708][ T8414] device bridge_slave_0 entered promiscuous mode [ 233.415491][ T8414] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.422608][ T8414] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.430100][ T8414] device bridge_slave_1 entered promiscuous mode [ 233.442979][ T8411] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 233.479529][ T8414] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 233.491968][ T8405] 8021q: adding VLAN 0 to HW filter on device bond0 [ 233.507757][ T8403] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.518745][ T8414] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 233.533649][ T8416] chnl_net:caif_netlink_parms(): no params data found [ 233.549227][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.557499][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.572126][ T8411] team0: Port device team_slave_0 added [ 233.587246][ T8414] team0: Port device team_slave_0 added [ 233.597579][ T8414] team0: Port device team_slave_1 added [ 233.605388][ T8405] 8021q: adding VLAN 0 to HW filter on device team0 [ 233.616112][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 233.623746][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 233.631224][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.640340][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.648685][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.655716][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.674755][ T8411] team0: Port device team_slave_1 added [ 233.709156][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 233.717875][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 233.726374][ T8422] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.733458][ T8422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.741585][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 233.750506][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 233.759070][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 233.767366][ T8422] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.774395][ T8422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.844571][ T8411] device hsr_slave_0 entered promiscuous mode [ 233.892323][ T8411] device hsr_slave_1 entered promiscuous mode [ 233.952019][ T8411] debugfs: Directory 'hsr0' with parent '/' already present! [ 233.976357][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 233.984379][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.064581][ T8414] device hsr_slave_0 entered promiscuous mode [ 234.122329][ T8414] device hsr_slave_1 entered promiscuous mode [ 234.162082][ T8414] debugfs: Directory 'hsr0' with parent '/' already present! [ 234.173345][ T8416] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.180368][ T8416] bridge0: port 1(bridge_slave_0) entered disabled state [ 234.190917][ T8416] device bridge_slave_0 entered promiscuous mode [ 234.199311][ T8416] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.206516][ T8416] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.214069][ T8416] device bridge_slave_1 entered promiscuous mode [ 234.220685][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.229284][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.237636][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.246063][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.254461][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.262697][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.270695][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.278898][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.287223][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.296208][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.304622][ T2857] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.311661][ T2857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.319510][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 234.328919][ T8403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 234.361314][ T8416] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 234.375152][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.397407][ T8408] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.407403][ T8416] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 234.425329][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.434028][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 234.443168][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 234.451330][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 234.460570][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 234.470367][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 234.478534][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 234.487061][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 234.499946][ T8403] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.538791][ T8408] 8021q: adding VLAN 0 to HW filter on device team0 [ 234.548371][ T8416] team0: Port device team_slave_0 added [ 234.558176][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 234.566092][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 234.576699][ T8405] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 234.588633][ T8405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 234.607862][ T8416] team0: Port device team_slave_1 added [ 234.623088][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 234.631446][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 234.639886][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 234.648542][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 234.657300][ T8417] bridge0: port 1(bridge_slave_0) entered blocking state [ 234.664383][ T8417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 234.672143][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 234.680507][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 234.688921][ T8417] bridge0: port 2(bridge_slave_1) entered blocking state [ 234.695987][ T8417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 234.720460][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.735050][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 234.750832][ T8405] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 234.780316][ T8414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.794986][ T8411] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.805921][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 234.864460][ T8416] device hsr_slave_0 entered promiscuous mode [ 234.912300][ T8416] device hsr_slave_1 entered promiscuous mode [ 234.951948][ T8416] debugfs: Directory 'hsr0' with parent '/' already present! [ 234.986628][ T8414] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.008731][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 15:58:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000880)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffff7f7ffffffe}]}) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000140)=""/68) [ 235.036111][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.050628][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.068519][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.077370][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.092463][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.100651][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.114674][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.130365][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 15:58:19 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x168}}], 0x1, 0x0, 0x0) pipe(0x0) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000080)=ANY=[@ANYBLOB="fc00000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000004000"/249]) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000180)) preadv(r0, &(0x7f00000017c0), 0x382, 0x0) [ 235.140757][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.152723][ T8408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.177966][ T8411] 8021q: adding VLAN 0 to HW filter on device team0 [ 235.185512][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.193866][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 235.201489][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 235.209772][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.218497][ T2857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.237324][ T2857] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.244412][ T2857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.270499][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.278522][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.287215][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.298588][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.305664][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.345318][ T8408] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.395361][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 235.413983][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 235.431878][ C0] hrtimer: interrupt took 46920 ns [ 235.445051][ T8422] bridge0: port 1(bridge_slave_0) entered blocking state [ 235.452196][ T8422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 235.470697][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 235.479778][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 235.488893][ T8422] bridge0: port 2(bridge_slave_1) entered blocking state [ 235.496009][ T8422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 235.504874][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.513997][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.523204][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.532392][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.541082][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.550298][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 15:58:19 executing program 1: unshare(0x8000400) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x2, 0x4, 0x4, 0x100000009}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x18) [ 235.605605][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 235.618440][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.644045][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 235.670459][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 235.711189][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.722934][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.731401][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 15:58:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300), 0x0, 0x0) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)='(^\x00', 0xfffffffffffffffe) add_key$keyring(0x0, &(0x7f00000004c0)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="34000000120001060000000000000000070000", @ANYRES32=0x0, @ANYBLOB="000000000000000014001d00cb00"], 0x3}}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x0, 0x20, &(0x7f0000000180)='^[GPL[trusted:.eth1eth1vboxnet0\x00', 0xffffffffffffffff}, 0x30) fstat(r1, &(0x7f0000000080)) write(0xffffffffffffffff, 0x0, 0x0) [ 235.756476][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.776576][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 235.789044][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 235.812040][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 235.820321][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 235.828961][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.837373][ T8417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.853914][ T8414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 15:58:19 executing program 0: timer_create(0xfffdfffffffffffd, 0x0, &(0x7f0000583ffc)) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, r0+10000000}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) [ 235.882778][ T8411] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 235.908727][ T8411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 235.923096][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 235.931119][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 235.941266][ T8468] ------------[ cut here ]------------ [ 235.946029][ T8422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 235.946836][ T8468] WARNING: CPU: 0 PID: 8468 at kernel/time/posix-cpu-timers.c:401 posix_cpu_timer_del+0x2f0/0x3b0 [ 235.964458][ T8414] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 235.965051][ T8468] Kernel panic - not syncing: panic_on_warn set ... [ 235.971870][ T8414] kobject: 'vlan0' (00000000e50d7b54): kobject_add_internal: parent: 'mesh', set: '' [ 235.978345][ T8468] CPU: 0 PID: 8468 Comm: syz-executor.0 Not tainted 5.3.0-rc6-next-20190827 #74 [ 235.997264][ T8468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.007314][ T8468] Call Trace: [ 236.010609][ T8468] dump_stack+0x172/0x1f0 [ 236.014935][ T8468] ? posix_cpu_timer_del+0x230/0x3b0 [ 236.020218][ T8468] panic+0x2dc/0x755 [ 236.024101][ T8468] ? add_taint.cold+0x16/0x16 [ 236.028775][ T8468] ? printk+0xba/0xed [ 236.032751][ T8468] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 236.038199][ T8468] ? __warn.cold+0x14/0x3c [ 236.042585][ T8468] ? __warn+0xd9/0x1d0 [ 236.046627][ T8468] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 236.051884][ T8468] __warn.cold+0x2f/0x3c [ 236.056102][ T8468] ? report_bug.cold+0x63/0xad [ 236.060858][ T8468] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 236.066115][ T8468] report_bug+0x289/0x300 [ 236.070443][ T8468] do_error_trap+0x11b/0x200 [ 236.075002][ T8468] do_invalid_op+0x37/0x50 [ 236.079387][ T8468] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 236.084651][ T8468] invalid_op+0x23/0x30 [ 236.088781][ T8468] RIP: 0010:posix_cpu_timer_del+0x2f0/0x3b0 [ 236.094677][ T8468] Code: 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 83 bb c8 00 00 00 00 74 16 e8 10 58 0d 00 <0f> 0b e9 87 fe ff ff e8 b4 3e 48 00 e9 dd fd ff ff e8 fa 57 0d 00 [ 236.114250][ T8468] RSP: 0018:ffff888058d1fa30 EFLAGS: 00010093 [ 236.120285][ T8468] RAX: ffff88809358e2c0 RBX: ffff888088321e60 RCX: 1ffff110126b1d6a [ 236.128227][ T8468] RDX: 0000000000000000 RSI: ffffffff8164d5c0 RDI: ffff888088321f28 [ 236.136172][ T8468] RBP: ffff888058d1fac0 R08: 0000000000000002 R09: ffff88809358eb58 [ 236.144117][ T8468] R10: fffffbfff138b140 R11: ffffffff89c58a07 R12: ffff888090856280 [ 236.152059][ T8468] R13: 1ffff1100b1a3f47 R14: ffff888058d1fa98 R15: ffff888088321eb8 [ 236.160010][ T8468] ? posix_cpu_timer_del+0x2f0/0x3b0 [ 236.165269][ T8468] ? lock_acquire+0x190/0x410 [ 236.169920][ T8468] ? thread_cpu_clock_getres+0x90/0x90 [ 236.175357][ T8468] ? thread_cpu_clock_getres+0x90/0x90 [ 236.180789][ T8468] exit_itimers+0xdb/0x2e0 [ 236.185184][ T8468] do_exit+0x1980/0x2e60 [ 236.189399][ T8468] ? get_signal+0x392/0x2500 [ 236.193961][ T8468] ? find_held_lock+0x35/0x130 [ 236.198705][ T8468] ? get_signal+0x392/0x2500 [ 236.203262][ T8468] ? mm_update_next_owner+0x640/0x640 [ 236.208620][ T8468] ? lock_downgrade+0x920/0x920 [ 236.213441][ T8468] ? _raw_spin_unlock_irq+0x28/0x90 [ 236.218617][ T8468] ? get_signal+0x392/0x2500 [ 236.223172][ T8468] ? _raw_spin_unlock_irq+0x28/0x90 [ 236.228339][ T8468] do_group_exit+0x135/0x360 [ 236.232898][ T8468] get_signal+0x47c/0x2500 [ 236.237285][ T8468] ? lock_downgrade+0x920/0x920 [ 236.242112][ T8468] do_signal+0x87/0x1700 [ 236.246330][ T8468] ? __kasan_check_read+0x11/0x20 [ 236.251330][ T8468] ? _copy_to_user+0x118/0x160 [ 236.256064][ T8468] ? setup_sigcontext+0x7d0/0x7d0 [ 236.261061][ T8468] ? exit_to_usermode_loop+0x43/0x380 [ 236.266401][ T8468] ? do_syscall_64+0x65f/0x760 [ 236.271133][ T8468] ? exit_to_usermode_loop+0x43/0x380 [ 236.276476][ T8468] ? lockdep_hardirqs_on+0x418/0x5d0 [ 236.281732][ T8468] ? trace_hardirqs_on+0x67/0x240 [ 236.286727][ T8468] exit_to_usermode_loop+0x286/0x380 [ 236.291989][ T8468] do_syscall_64+0x65f/0x760 [ 236.296565][ T8468] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.302443][ T8468] RIP: 0033:0x459879 [ 236.306311][ T8468] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.325882][ T8468] RSP: 002b:00007f8839785cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 236.334262][ T8468] RAX: 0000000000000001 RBX: 000000000075bfd0 RCX: 0000000000459879 [ 236.342224][ T8468] RDX: 00000000004c8fe7 RSI: 0000000000000081 RDI: 000000000075bfd4 [ 236.350182][ T8468] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 236.358123][ T8468] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bfd4 [ 236.366063][ T8468] R13: 00007ffdcda0654f R14: 00007f88397869c0 R15: 000000000075bfd4 [ 236.375175][ T8468] Kernel Offset: disabled [ 236.379548][ T8468] Rebooting in 86400 seconds..