[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 35.242674][ T26] audit: type=1800 audit(1570606808.448:25): pid=7059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 35.284818][ T26] audit: type=1800 audit(1570606808.448:26): pid=7059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 35.308356][ T26] audit: type=1800 audit(1570606808.448:27): pid=7059 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.175' (ECDSA) to the list of known hosts. 2019/10/09 07:40:18 fuzzer started 2019/10/09 07:40:20 dialing manager at 10.128.0.105:43333 2019/10/09 07:40:20 syscalls: 2523 2019/10/09 07:40:20 code coverage: enabled 2019/10/09 07:40:20 comparison tracing: enabled 2019/10/09 07:40:20 extra coverage: extra coverage is not supported by the kernel 2019/10/09 07:40:20 setuid sandbox: enabled 2019/10/09 07:40:20 namespace sandbox: enabled 2019/10/09 07:40:20 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/09 07:40:20 fault injection: enabled 2019/10/09 07:40:20 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/09 07:40:20 net packet injection: enabled 2019/10/09 07:40:20 net device setup: enabled 2019/10/09 07:40:20 concurrency sanitizer: enabled 07:40:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000200)=0x1) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r5) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r6, 0x4) r7 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r7) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r8 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r9 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x400000, 0xffffffffffffffff, 0x8001, 0x2000000004, 0x9e6f, 0x73d9, 0x6, 0x0, 0x3f, 0xc25, 0x3ff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8883, 0xc1b}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r10 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r11 = getgid() setregid(0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000880)='./file0\x00', r4, r11, 0x1000) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r10) pread64(r9, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) syzkaller login: [ 49.750833][ T7233] IPVS: ftp: loaded support on port[0] = 21 07:40:23 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) pipe(&(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x121001) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 49.840099][ T7233] chnl_net:caif_netlink_parms(): no params data found [ 49.896287][ T7233] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.918196][ T7233] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.938104][ T7233] device bridge_slave_0 entered promiscuous mode [ 49.945672][ T7233] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.967553][ T7233] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.975637][ T7233] device bridge_slave_1 entered promiscuous mode [ 50.022713][ T7233] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.033537][ T7233] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.076228][ T7233] team0: Port device team_slave_0 added [ 50.095231][ T7236] IPVS: ftp: loaded support on port[0] = 21 [ 50.109035][ T7233] team0: Port device team_slave_1 added 07:40:23 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) [ 50.190492][ T7233] device hsr_slave_0 entered promiscuous mode [ 50.278672][ T7233] device hsr_slave_1 entered promiscuous mode [ 50.402042][ T7233] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.409218][ T7233] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.416607][ T7233] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.423781][ T7233] bridge0: port 1(bridge_slave_0) entered forwarding state 07:40:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = fcntl$dupfd(r0, 0x0, r1) write$P9_RSYMLINK(r2, &(0x7f0000000340)={0x14, 0x11, 0x0, {0x0, 0xffffffff}}, 0x14) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x7e}) [ 50.535953][ T7233] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.546595][ T7238] IPVS: ftp: loaded support on port[0] = 21 [ 50.566004][ T7236] chnl_net:caif_netlink_parms(): no params data found [ 50.585817][ T7233] 8021q: adding VLAN 0 to HW filter on device team0 [ 50.597491][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.608128][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.626477][ T43] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.639688][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 50.698837][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.709869][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.716926][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.749915][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.769563][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.776645][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.833239][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 50.844612][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 50.854434][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 50.872335][ T7233] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 50.886287][ T7233] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 50.904082][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 50.913365][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 07:40:24 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x4002, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x0, 0x8, 0x20}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x1, 0x0) sendmsg$nl_route(r3, 0x0, 0x4000000) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="d3ab27191a01002356ba602dff05000bfef9b9f2a4b200", 0x17) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000300)="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") fcntl$setstatus(r0, 0x4, 0x42000) openat$null(0xffffffffffffff9c, 0x0, 0x10000, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x200) fallocate(r5, 0x0, 0x0, 0x2000002) fallocate(r4, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x0, 0x8, 0x20}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x2000002) fallocate(r6, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000040)={0x0, r7, 0x0, 0x8, 0x20}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r9 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r9, 0x0, 0x0, 0x2000002) fallocate(r8, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000040)={0x0, r9, 0x0, 0x8, 0x20}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r11 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r11, 0x0, 0x0, 0x2000002) fallocate(r10, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000040)={0x0, r11, 0x0, 0x8, 0x20}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(twofish)\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) syz_genetlink_get_family_id$tipc2(0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 50.938706][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 50.978069][ T7236] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.985850][ T7236] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.010370][ T7236] device bridge_slave_0 entered promiscuous mode [ 51.018562][ T7236] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.037474][ T7236] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.057514][ T7236] device bridge_slave_1 entered promiscuous mode [ 51.075503][ T7242] IPVS: ftp: loaded support on port[0] = 21 [ 51.100599][ T7233] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.172292][ T7236] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.200079][ T7236] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.290766][ T7236] team0: Port device team_slave_0 added [ 51.297991][ T7236] team0: Port device team_slave_1 added [ 51.314011][ T7238] chnl_net:caif_netlink_parms(): no params data found [ 51.385386][ T7250] IPVS: ftp: loaded support on port[0] = 21 [ 51.440966][ T7236] device hsr_slave_0 entered promiscuous mode [ 51.458396][ C0] hrtimer: interrupt took 29690 ns 07:40:24 executing program 5: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mISDNtimer\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 51.489992][ T7236] device hsr_slave_1 entered promiscuous mode [ 51.557702][ T7236] debugfs: Directory 'hsr0' with parent '/' already present! [ 51.615053][ T7238] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.651997][ T7238] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.660596][ T7238] device bridge_slave_0 entered promiscuous mode 07:40:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000200)=0x1) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r5) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r6, 0x4) r7 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r7) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r8 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r9 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x400000, 0xffffffffffffffff, 0x8001, 0x2000000004, 0x9e6f, 0x73d9, 0x6, 0x0, 0x3f, 0xc25, 0x3ff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8883, 0xc1b}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r10 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r11 = getgid() setregid(0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000880)='./file0\x00', r4, r11, 0x1000) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r10) pread64(r9, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 51.715806][ T7236] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.722920][ T7236] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.730263][ T7236] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.737317][ T7236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.747014][ T7238] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.754419][ T7238] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.810221][ T7238] device bridge_slave_1 entered promiscuous mode [ 51.844795][ T43] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.852959][ T43] bridge0: port 2(bridge_slave_1) entered disabled state 07:40:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000200)=0x1) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r5) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r6, 0x4) r7 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r7) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r8 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r9 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x400000, 0xffffffffffffffff, 0x8001, 0x2000000004, 0x9e6f, 0x73d9, 0x6, 0x0, 0x3f, 0xc25, 0x3ff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8883, 0xc1b}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r10 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r11 = getgid() setregid(0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000880)='./file0\x00', r4, r11, 0x1000) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r10) pread64(r9, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 51.884543][ T7259] IPVS: ftp: loaded support on port[0] = 21 [ 51.923797][ T7242] chnl_net:caif_netlink_parms(): no params data found [ 51.955315][ T7238] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.968595][ T7238] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.998978][ T7265] debugfs: File 'dropped' in directory 'loop3' already present! [ 52.007847][ T7265] debugfs: File 'msg' in directory 'loop3' already present! [ 52.020404][ T7265] debugfs: File 'trace0' in directory 'loop3' already present! [ 52.039246][ T7238] team0: Port device team_slave_0 added 07:40:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000200)=0x1) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r5) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r6, 0x4) r7 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r7) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r8 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r9 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x400000, 0xffffffffffffffff, 0x8001, 0x2000000004, 0x9e6f, 0x73d9, 0x6, 0x0, 0x3f, 0xc25, 0x3ff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8883, 0xc1b}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r10 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r11 = getgid() setregid(0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000880)='./file0\x00', r4, r11, 0x1000) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r10) pread64(r9, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 52.072251][ T7242] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.080665][ T7242] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.088715][ T7242] device bridge_slave_0 entered promiscuous mode [ 52.096183][ T7242] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.113617][ T7242] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.128379][ T7242] device bridge_slave_1 entered promiscuous mode [ 52.153495][ T7238] team0: Port device team_slave_1 added [ 52.163950][ T7268] debugfs: File 'dropped' in directory 'loop3' already present! [ 52.164528][ T7236] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.177865][ T7268] debugfs: File 'msg' in directory 'loop3' already present! [ 52.192707][ T7268] debugfs: File 'trace0' in directory 'loop3' already present! 07:40:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000200)=0x1) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r5) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r6, 0x4) r7 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r7) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r8 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r9 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x400000, 0xffffffffffffffff, 0x8001, 0x2000000004, 0x9e6f, 0x73d9, 0x6, 0x0, 0x3f, 0xc25, 0x3ff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8883, 0xc1b}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r10 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r11 = getgid() setregid(0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000880)='./file0\x00', r4, r11, 0x1000) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r10) pread64(r9, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 52.232375][ T7242] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.246158][ T7242] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.270318][ T7236] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.301239][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 52.321467][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 07:40:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000200)=0x1) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r5) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r6, 0x4) r7 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r7) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r8 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r9 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x400000, 0xffffffffffffffff, 0x8001, 0x2000000004, 0x9e6f, 0x73d9, 0x6, 0x0, 0x3f, 0xc25, 0x3ff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8883, 0xc1b}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r10 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r11 = getgid() setregid(0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000880)='./file0\x00', r4, r11, 0x1000) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r10) pread64(r9, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 52.351586][ T7273] debugfs: File 'dropped' in directory 'loop3' already present! [ 52.361068][ T7273] debugfs: File 'msg' in directory 'loop3' already present! [ 52.372858][ T7273] debugfs: File 'trace0' in directory 'loop3' already present! [ 52.385289][ T7238] device hsr_slave_0 entered promiscuous mode [ 52.437967][ T7238] device hsr_slave_1 entered promiscuous mode [ 52.475666][ T7276] debugfs: File 'dropped' in directory 'loop3' already present! [ 52.483529][ T7276] debugfs: File 'msg' in directory 'loop3' already present! [ 52.491457][ T7238] debugfs: Directory 'hsr0' with parent '/' already present! [ 52.495602][ T7276] debugfs: File 'trace0' in directory 'loop3' already present! [ 52.502573][ T7250] chnl_net:caif_netlink_parms(): no params data found [ 52.533833][ T7242] team0: Port device team_slave_0 added [ 52.541716][ T7242] team0: Port device team_slave_1 added [ 52.564056][ T7270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 52.576976][ T7270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 07:40:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000200)=0x1) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r5) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r6, 0x4) r7 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r7) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r8 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r9 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x400000, 0xffffffffffffffff, 0x8001, 0x2000000004, 0x9e6f, 0x73d9, 0x6, 0x0, 0x3f, 0xc25, 0x3ff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8883, 0xc1b}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r10 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r11 = getgid() setregid(0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000880)='./file0\x00', r4, r11, 0x1000) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r10) pread64(r9, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 52.585751][ T7270] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.592875][ T7270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.618921][ T7270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 52.633347][ T7270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 52.644737][ T7270] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.652489][ T7270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.696511][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 52.706377][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 52.715738][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 52.725295][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.728996][ T7279] debugfs: File 'dropped' in directory 'loop3' already present! [ 52.734527][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 52.744692][ T7279] debugfs: File 'msg' in directory 'loop3' already present! [ 52.750077][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.758241][ T7279] debugfs: File 'trace0' in directory 'loop3' already present! [ 52.765695][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 52.780137][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 07:40:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000200)=0x1) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r5) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r6, 0x4) r7 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r7) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r8 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r9 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x400000, 0xffffffffffffffff, 0x8001, 0x2000000004, 0x9e6f, 0x73d9, 0x6, 0x0, 0x3f, 0xc25, 0x3ff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8883, 0xc1b}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r10 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r11 = getgid() setregid(0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000880)='./file0\x00', r4, r11, 0x1000) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r10) pread64(r9, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 52.827040][ T7236] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 52.840066][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 52.890721][ T7242] device hsr_slave_0 entered promiscuous mode [ 52.901163][ T7284] debugfs: File 'dropped' in directory 'loop3' already present! [ 52.909272][ T7284] debugfs: File 'msg' in directory 'loop3' already present! [ 52.920425][ T7284] debugfs: File 'trace0' in directory 'loop3' already present! [ 52.938817][ T7242] device hsr_slave_1 entered promiscuous mode [ 52.987537][ T7242] debugfs: Directory 'hsr0' with parent '/' already present! [ 52.996098][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.016139][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.024723][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.050456][ T7259] chnl_net:caif_netlink_parms(): no params data found [ 53.086171][ T7236] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.095961][ T7250] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.104100][ T7250] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.112396][ T7250] device bridge_slave_0 entered promiscuous mode [ 53.121479][ T7250] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.128914][ T7250] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.136618][ T7250] device bridge_slave_1 entered promiscuous mode [ 53.198081][ T7250] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.209763][ T7250] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.227374][ T7242] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.239678][ T7242] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.246727][ T7259] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.254963][ T7259] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.264040][ T7259] device bridge_slave_0 entered promiscuous mode [ 53.279163][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.286943][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.305778][ T7259] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.313023][ T7259] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.321050][ T7259] device bridge_slave_1 entered promiscuous mode [ 53.334913][ T7238] 8021q: adding VLAN 0 to HW filter on device bond0 [ 53.349329][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.360344][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.384027][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.391200][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.399630][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.408649][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.417330][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.424442][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.432425][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.441843][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.451322][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.460140][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.469598][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.478786][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.492332][ T7242] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 53.505695][ T7242] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 53.532029][ T7238] 8021q: adding VLAN 0 to HW filter on device team0 [ 53.540996][ T7250] team0: Port device team_slave_0 added [ 53.547618][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.555927][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 53.565110][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 53.574842][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 53.584527][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 53.594686][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 53.605605][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 53.616490][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 53.630765][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.657353][ T7250] team0: Port device team_slave_1 added [ 53.673653][ T7242] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.686145][ T7259] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.703421][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 53.712942][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 53.721929][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.729097][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 53.737267][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 53.746153][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 53.754662][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.761806][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.770496][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 53.779661][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 53.802238][ T7259] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.820726][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 53.830499][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 53.840416][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 53.849862][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 53.858819][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 53.899906][ T7250] device hsr_slave_0 entered promiscuous mode [ 53.937697][ T7250] device hsr_slave_1 entered promiscuous mode [ 53.977502][ T7250] debugfs: Directory 'hsr0' with parent '/' already present! [ 53.996057][ T7238] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 54.006937][ T7238] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.019139][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.028200][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.036622][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.045550][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.054223][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.063200][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.078431][ T7259] team0: Port device team_slave_0 added [ 54.085208][ T7259] team0: Port device team_slave_1 added [ 54.124844][ T7238] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.160872][ T7259] device hsr_slave_0 entered promiscuous mode 07:40:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000200)=0x1) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r5) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r6, 0x4) r7 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r7) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r8 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r9 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x400000, 0xffffffffffffffff, 0x8001, 0x2000000004, 0x9e6f, 0x73d9, 0x6, 0x0, 0x3f, 0xc25, 0x3ff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8883, 0xc1b}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r10 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r11 = getgid() setregid(0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000880)='./file0\x00', r4, r11, 0x1000) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r10) pread64(r9, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) [ 54.211256][ T7259] device hsr_slave_1 entered promiscuous mode [ 54.287483][ T7259] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.325265][ T7308] debugfs: File 'dropped' in directory 'loop3' already present! [ 54.386514][ T7308] debugfs: File 'msg' in directory 'loop3' already present! [ 54.395919][ T7250] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.410447][ T7308] debugfs: File 'trace0' in directory 'loop3' already present! [ 54.424367][ T7259] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.439160][ T7259] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.453782][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.464910][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.488605][ T7259] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 54.499222][ T7259] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.525104][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.544448][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.567555][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.574647][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.593044][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.602114][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.610954][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.618050][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.626811][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.636113][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.645472][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.654098][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.663120][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.671907][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.680768][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.689802][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 54.697791][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.705644][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 54.720509][ T7250] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.732131][ T7270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.739857][ T7270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.756624][ T7259] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.772788][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 54.781738][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 54.790744][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.797826][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.806337][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 54.815194][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 54.823634][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.830696][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 54.839777][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 54.847816][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 54.859591][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 54.876113][ T7250] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 54.893086][ T7250] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 54.904670][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 54.916865][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 54.925724][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 54.934673][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 54.943411][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 54.951968][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 54.960670][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 54.969227][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 54.990255][ T7250] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 54.999199][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.013699][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 07:40:30 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) 07:40:30 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) pipe(&(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x121001) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:40:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = fcntl$dupfd(r0, 0x0, r1) write$P9_RSYMLINK(r2, &(0x7f0000000340)={0x14, 0x11, 0x0, {0x0, 0xffffffff}}, 0x14) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x7e}) 07:40:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffed0, 0x10000000, 0x0, 0xc0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000200)=0x1) r3 = perf_event_open(&(0x7f0000000bc0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), 0x0) ioctl$KDDISABIO(r2, 0x4b37) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) getpgrp(r5) prctl$PR_SET_UNALIGN(0x6, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe3}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r6, 0x4) r7 = gettid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) getpgid(r7) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x4, 0x3, 0x9, 0x4}) r8 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x3, 0x44000) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x7d, 0xfffe, 0x100000005}) r9 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2003, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x400000, 0xffffffffffffffff, 0x8001, 0x2000000004, 0x9e6f, 0x73d9, 0x6, 0x0, 0x3f, 0xc25, 0x3ff, 0x2, 0x4, 0x0, 0x5, 0x3, 0x0, 0x3, 0x1, 0x6, 0x401, 0x1, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8883, 0xc1b}, 0x0, 0x3, r3, 0x0) request_key(&(0x7f00000005c0)='cifs.idmap\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0) r10 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r11 = getgid() setregid(0xffffffffffffffff, 0xffffffffffffffff) fchownat(r2, &(0x7f0000000880)='./file0\x00', r4, r11, 0x1000) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, r10) pread64(r9, &(0x7f0000000480)=""/177, 0xb1, 0x0) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000003c0)) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x4e20, @broadcast}}) 07:40:30 executing program 5: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mISDNtimer\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:40:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x4002, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x0, 0x8, 0x20}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x1, 0x0) sendmsg$nl_route(r3, 0x0, 0x4000000) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="d3ab27191a01002356ba602dff05000bfef9b9f2a4b200", 0x17) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000300)="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") fcntl$setstatus(r0, 0x4, 0x42000) openat$null(0xffffffffffffff9c, 0x0, 0x10000, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x200) fallocate(r5, 0x0, 0x0, 0x2000002) fallocate(r4, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x0, 0x8, 0x20}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x2000002) fallocate(r6, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000040)={0x0, r7, 0x0, 0x8, 0x20}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r9 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r9, 0x0, 0x0, 0x2000002) fallocate(r8, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000040)={0x0, r9, 0x0, 0x8, 0x20}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r11 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r11, 0x0, 0x0, 0x2000002) fallocate(r10, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000040)={0x0, r11, 0x0, 0x8, 0x20}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(twofish)\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) syz_genetlink_get_family_id$tipc2(0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 57.751991][ T7351] debugfs: File 'dropped' in directory 'loop3' already present! [ 57.791844][ T7351] debugfs: File 'msg' in directory 'loop3' already present! [ 57.814391][ T7351] debugfs: File 'trace0' in directory 'loop3' already present! 07:40:31 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) 07:40:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = fcntl$dupfd(r0, 0x0, r1) write$P9_RSYMLINK(r2, &(0x7f0000000340)={0x14, 0x11, 0x0, {0x0, 0xffffffff}}, 0x14) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x7e}) 07:40:31 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) 07:40:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) r2 = fcntl$dupfd(r0, 0x0, r1) write$P9_RSYMLINK(r2, &(0x7f0000000340)={0x14, 0x11, 0x0, {0x0, 0xffffffff}}, 0x14) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x7e}) 07:40:31 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) pipe(&(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x121001) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:40:31 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) 07:40:31 executing program 5: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mISDNtimer\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:40:31 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x4002, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x0, 0x8, 0x20}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x1, 0x0) sendmsg$nl_route(r3, 0x0, 0x4000000) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="d3ab27191a01002356ba602dff05000bfef9b9f2a4b200", 0x17) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000300)="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") fcntl$setstatus(r0, 0x4, 0x42000) openat$null(0xffffffffffffff9c, 0x0, 0x10000, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x200) fallocate(r5, 0x0, 0x0, 0x2000002) fallocate(r4, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0x0, r5, 0x0, 0x8, 0x20}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x2000002) fallocate(r6, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000040)={0x0, r7, 0x0, 0x8, 0x20}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r9 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r9, 0x0, 0x0, 0x2000002) fallocate(r8, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000040)={0x0, r9, 0x0, 0x8, 0x20}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r11 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r11, 0x0, 0x0, 0x2000002) fallocate(r10, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000040)={0x0, r11, 0x0, 0x8, 0x20}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(twofish)\x00'}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000200)) syz_genetlink_get_family_id$tipc2(0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 59.033160][ T7389] ================================================================== [ 59.041315][ T7389] BUG: KCSAN: data-race in pipe_poll / pipe_write [ 59.047718][ T7389] [ 59.050047][ T7389] read to 0xffff888103893f38 of 4 bytes by task 7393 on cpu 0: [ 59.057593][ T7389] pipe_poll+0x84/0x1d0 [ 59.061748][ T7389] do_select+0x7d0/0x1020 [ 59.066076][ T7389] core_sys_select+0x38b/0x520 [ 59.070840][ T7389] __x64_sys_pselect6+0x22a/0x280 [ 59.075882][ T7389] do_syscall_64+0xcf/0x2f0 [ 59.080397][ T7389] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.086281][ T7389] [ 59.088611][ T7389] write to 0xffff888103893f38 of 4 bytes by task 7389 on cpu 1: [ 59.096367][ T7389] pipe_write+0x268/0x970 [ 59.100717][ T7389] new_sync_write+0x388/0x4a0 [ 59.105409][ T7389] __vfs_write+0xb1/0xc0 [ 59.109669][ T7389] vfs_write+0x18a/0x390 [ 59.113927][ T7389] ksys_write+0xd5/0x1b0 [ 59.118183][ T7389] __x64_sys_write+0x4c/0x60 [ 59.122772][ T7389] do_syscall_64+0xcf/0x2f0 [ 59.127276][ T7389] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.133172][ T7389] [ 59.135490][ T7389] Reported by Kernel Concurrency Sanitizer on: [ 59.141642][ T7389] CPU: 1 PID: 7389 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 59.149196][ T7389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.159242][ T7389] ================================================================== [ 59.167301][ T7389] Kernel panic - not syncing: panic_on_warn set ... [ 59.173901][ T7389] CPU: 1 PID: 7389 Comm: syz-executor.1 Not tainted 5.3.0+ #0 [ 59.181347][ T7389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.191415][ T7389] Call Trace: [ 59.194710][ T7389] dump_stack+0xf5/0x159 [ 59.198974][ T7389] panic+0x209/0x639 [ 59.202892][ T7389] ? vprintk_func+0x8d/0x140 [ 59.207503][ T7389] kcsan_report.cold+0xc/0x1b [ 59.212201][ T7389] __kcsan_setup_watchpoint+0x3ee/0x510 [ 59.217759][ T7389] __tsan_write4+0x32/0x40 [ 59.222179][ T7389] pipe_write+0x268/0x970 [ 59.226520][ T7389] new_sync_write+0x388/0x4a0 07:40:32 executing program 5: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mISDNtimer\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 59.231209][ T7389] __vfs_write+0xb1/0xc0 [ 59.235457][ T7389] vfs_write+0x18a/0x390 [ 59.239706][ T7389] ksys_write+0xd5/0x1b0 [ 59.243952][ T7389] __x64_sys_write+0x4c/0x60 [ 59.248540][ T7389] do_syscall_64+0xcf/0x2f0 [ 59.253051][ T7389] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.258947][ T7389] RIP: 0033:0x459a59 [ 59.262846][ T7389] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 59.282448][ T7389] RSP: 002b:00007f27d0e15c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 59.290853][ T7389] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 59.298825][ T7389] RDX: 0000000041395527 RSI: 0000000020000340 RDI: 0000000000000007 [ 59.306792][ T7389] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 59.314796][ T7389] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f27d0e166d4 [ 59.322786][ T7389] R13: 00000000004c6229 R14: 00000000004e0cc8 R15: 00000000ffffffff [ 59.332086][ T7389] Kernel Offset: disabled [ 59.336439][ T7389] Rebooting in 86400 seconds..