[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 36.035058][ T25] audit: type=1800 audit(1572050613.199:25): pid=7117 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 36.063388][ T25] audit: type=1800 audit(1572050613.199:26): pid=7117 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 36.097487][ T25] audit: type=1800 audit(1572050613.199:27): pid=7117 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.37' (ECDSA) to the list of known hosts. 2019/10/26 00:43:44 fuzzer started 2019/10/26 00:43:46 dialing manager at 10.128.0.105:32811 2019/10/26 00:43:49 syscalls: 2533 2019/10/26 00:43:49 code coverage: enabled 2019/10/26 00:43:49 comparison tracing: enabled 2019/10/26 00:43:49 extra coverage: extra coverage is not supported by the kernel 2019/10/26 00:43:49 setuid sandbox: enabled 2019/10/26 00:43:49 namespace sandbox: enabled 2019/10/26 00:43:49 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/26 00:43:49 fault injection: enabled 2019/10/26 00:43:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/26 00:43:49 net packet injection: enabled 2019/10/26 00:43:49 net device setup: enabled 2019/10/26 00:43:49 concurrency sanitizer: enabled syzkaller login: [ 54.861011][ T7287] KCSAN: could not find function: 'poll_schedule_timeout' 2019/10/26 00:44:03 adding functions to KCSAN blacklist: 'mod_timer' 'run_timer_softirq' 'tcp_add_backlog' 'wbt_issue' '__dentry_kill' 'smpboot_thread_fn' 'ext4_has_free_clusters' 'echo_char' 'dd_has_work' 'tick_nohz_idle_stop_tick' 'poll_schedule_timeout' 'tomoyo_supervisor' '__ext4_new_inode' 'xas_clear_mark' 'shmem_file_read_iter' 'xas_find_marked' 'task_dump_owner' 'osq_lock' 'generic_fillattr' 'tick_sched_do_timer' 'add_timer' 'do_nanosleep' 'tcp_poll' '__snd_rawmidi_transmit_ack' 'schedule_hrtimeout_range_clock' 'ext4_mark_iloc_dirty' 'mm_update_next_owner' 'p9_poll_workfn' 'ext4_mb_good_group' 'do_syslog' 'unix_release_sock' 'rcu_gp_fqs_check_wake' 'common_perm_cond' 'taskstats_exit' 'ktime_get_seconds' 'add_timer_on' 'find_next_bit' '__nf_ct_refresh_acct' 'generic_write_end' 'blk_mq_sched_dispatch_requests' 'ktime_get_real_seconds' 'pipe_poll' '__hrtimer_run_queues' 'blk_mq_get_request' 'pid_update_inode' 'generic_permission' 'tick_do_update_jiffies64' 'vm_area_dup' '__tcp_select_window' '__splice_from_pipe' 'blk_mq_dispatch_rq_list' '__rb_erase_color' 'ep_poll' 'update_defense_level' 'snd_seq_check_queue' 'timer_clear_idle' 'ext4_free_inode' 00:45:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="fc0000004900071f8a092504090007000aab6000000000000000e293210001c000000000000000000000ffff0000000000001ec28656aa1f9bb94b46fe000000bc000200000300f92fbe780196370d0151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00000100d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab820f06f70cce190a60aa47e9883997f391064e763b6f380f5bd92c83170e5bba4a463a1e00566f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0200000000000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0454e64e00ccf19a494c8cf", 0xfc) 00:45:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x2000036f}], 0x1, 0x20001000) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) [ 165.044191][ T7290] IPVS: ftp: loaded support on port[0] = 21 [ 165.177210][ T7290] chnl_net:caif_netlink_parms(): no params data found [ 165.251122][ T7290] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.272576][ T7290] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.282687][ T7290] device bridge_slave_0 entered promiscuous mode [ 165.290568][ T7290] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.298657][ T7290] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.306997][ T7290] device bridge_slave_1 entered promiscuous mode [ 165.330672][ T7290] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 00:45:42 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000500), 0x4) clock_gettime(0x0, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000abe000)}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RUNLINKAT(r1, &(0x7f00000006c0)={0xffffffffffffffca}, 0xfffffffffffffe3c) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2ce21b6c9a962d45c506d47f5bd5c00c1eb20000000000ad5fc28cf71bb8defab95baf00002c000000"]) write$P9_RREADDIR(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x6c, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0@'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xfc000000]}, 0x8000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}]}]}, 0x6c}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0), 0xc, &(0x7f0000000980)={&(0x7f0000000800)={0x180, r3, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x138, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip6gre0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3ee0, @loopback, 0x9}}}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6erspan0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xfff, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e24, @rand_addr=0x8}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @rand_addr="50180bf65ddcea20e768d3561978a3a7"}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @rand_addr="2c7f1ca3e35dee145aefe9e5970c78f4", 0x40}}}}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcdb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4ee}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x20040108}, 0x10080) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000002c0)={0x14, 0x67, 0x1, {0x102, 0x0, 0x6}}, 0x14) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(0xffffffffffffffff, &(0x7f0000000300)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}, 0x3}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r5 = getpid() socket$vsock_dgram(0x28, 0x2, 0x0) request_key(&(0x7f0000000400)='logon\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='net/mcfilter\x00', 0xffffffffffffffff) rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000100)) ptrace(0x10, r5) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f0000000700)={0x7d7, 0xffffffcd, 0x9f04}) ptrace$pokeuser(0x6, r5, 0x388, 0xffffffffffffffff) [ 165.342861][ T7290] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.367446][ T7290] team0: Port device team_slave_0 added [ 165.372043][ T7293] IPVS: ftp: loaded support on port[0] = 21 [ 165.375195][ T7290] team0: Port device team_slave_1 added [ 165.446440][ T7290] device hsr_slave_0 entered promiscuous mode [ 165.503632][ T7290] device hsr_slave_1 entered promiscuous mode [ 165.659666][ T7295] IPVS: ftp: loaded support on port[0] = 21 [ 165.761784][ T7290] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.768944][ T7290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.776382][ T7290] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.783479][ T7290] bridge0: port 1(bridge_slave_0) entered forwarding state 00:45:43 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000200)={0x43, 0x9, 0x0, {0x6, 0x0, 0x9, 0x0, 0x0, 0xfff}}, 0x43) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x21aa1e1bad06df19, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) [ 166.086179][ T7290] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.122433][ T7293] chnl_net:caif_netlink_parms(): no params data found [ 166.184390][ T7290] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.197515][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.233932][ T3501] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.275222][ T3501] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.305456][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 166.405889][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.425448][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.454494][ T3501] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.461645][ T3501] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.503253][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.533154][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.562951][ T3501] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.570127][ T3501] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.700003][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.734140][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 00:45:43 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000358fe8)) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f00000002c0)={&(0x7f0000001000/0x3000)=nil, 0x3000}) [ 166.775397][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.795636][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.829359][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.875426][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.918474][ T7290] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 166.920409][ T7324] IPVS: ftp: loaded support on port[0] = 21 [ 166.964177][ T7290] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 167.023018][ T7295] chnl_net:caif_netlink_parms(): no params data found [ 167.042783][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.051308][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.094866][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.135471][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.175418][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.209791][ T7293] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.234412][ T7293] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.262627][ T7293] device bridge_slave_0 entered promiscuous mode [ 167.327646][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.345490][ T7293] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.362621][ T7293] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.370576][ T7293] device bridge_slave_1 entered promiscuous mode [ 167.466666][ T7293] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.540788][ T7326] IPVS: ftp: loaded support on port[0] = 21 [ 167.542993][ T7290] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.594035][ T7293] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 167.680928][ T7295] bridge0: port 1(bridge_slave_0) entered blocking state 00:45:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000240)=0x4) [ 167.739553][ T7295] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.763565][ T7295] device bridge_slave_0 entered promiscuous mode [ 167.798923][ T7293] team0: Port device team_slave_0 added [ 167.816265][ T7293] team0: Port device team_slave_1 added [ 167.836801][ T7295] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.862597][ T7295] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.870678][ T7295] device bridge_slave_1 entered promiscuous mode [ 167.938781][ T7295] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.991945][ T7295] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 00:45:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="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", 0xfc) 00:45:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="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", 0xfc) [ 168.135464][ T7293] device hsr_slave_0 entered promiscuous mode [ 168.153023][ T7293] device hsr_slave_1 entered promiscuous mode [ 168.192549][ T7293] debugfs: Directory 'hsr0' with parent '/' already present! [ 168.232268][ T7340] IPVS: ftp: loaded support on port[0] = 21 [ 168.237166][ T7295] team0: Port device team_slave_0 added [ 168.267105][ T7324] chnl_net:caif_netlink_parms(): no params data found [ 168.278312][ T7295] team0: Port device team_slave_1 added 00:45:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="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", 0xfc) [ 168.579378][ T7295] device hsr_slave_0 entered promiscuous mode [ 168.636026][ T7295] device hsr_slave_1 entered promiscuous mode [ 168.675882][ T7295] debugfs: Directory 'hsr0' with parent '/' already present! 00:45:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) ftruncate(r2, 0x200004) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x1}, 0x8) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 168.687401][ T7326] chnl_net:caif_netlink_parms(): no params data found [ 168.721972][ T7324] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.729779][ T7324] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.782735][ T7324] device bridge_slave_0 entered promiscuous mode [ 168.884399][ T7324] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.891498][ T7324] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.926140][ C0] hrtimer: interrupt took 42345 ns [ 168.928306][ T7324] device bridge_slave_1 entered promiscuous mode [ 169.138014][ T7293] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.226050][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.257170][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 00:45:46 executing program 0: socket$inet6(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0xedc4) [ 169.324834][ T7293] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.344407][ T7324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.425165][ T7326] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.436821][ T7326] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.470096][ T7326] device bridge_slave_0 entered promiscuous mode [ 169.596772][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.623289][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.671449][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.678603][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.758204][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.807241][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.854050][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.861331][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.935395][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.997363][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.060456][ T7295] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.103811][ T7324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.170798][ T7326] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.183496][ T7326] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.222234][ T7326] device bridge_slave_1 entered promiscuous mode [ 170.280667][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.300338][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.357442][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.410545][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.468216][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.573831][ T7324] team0: Port device team_slave_0 added [ 170.580671][ T7324] team0: Port device team_slave_1 added [ 170.694585][ T7295] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.730771][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.754625][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.807010][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.867346][ T7340] chnl_net:caif_netlink_parms(): no params data found [ 170.911592][ T7326] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.964239][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.977639][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.998165][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.037324][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.057112][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.077305][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.096877][ T7402] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.104043][ T7402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.137011][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 00:45:48 executing program 0: r0 = timerfd_create(0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(r0, r1) [ 171.156699][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.217042][ T7402] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.224281][ T7402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.238370][ T7402] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.295359][ T7293] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.376548][ T7326] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.452781][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.461048][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.496797][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.556901][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.616882][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.685428][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.733737][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.742260][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.823187][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.852552][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.870261][ T7293] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 171.985870][ T7324] device hsr_slave_0 entered promiscuous mode [ 172.042915][ T7324] device hsr_slave_1 entered promiscuous mode [ 172.072563][ T7324] debugfs: Directory 'hsr0' with parent '/' already present! [ 172.103806][ T7295] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 172.120929][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.201508][ T7340] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.241547][ T7340] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.293885][ T7340] device bridge_slave_0 entered promiscuous mode [ 172.365624][ T7326] team0: Port device team_slave_0 added [ 172.386069][ T7295] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.444568][ T7340] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.451658][ T7340] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.516933][ T7340] device bridge_slave_1 entered promiscuous mode [ 172.574379][ T7326] team0: Port device team_slave_1 added [ 172.785251][ T7340] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 172.906533][ T7326] device hsr_slave_0 entered promiscuous mode [ 172.972972][ T7326] device hsr_slave_1 entered promiscuous mode [ 173.002601][ T7326] debugfs: Directory 'hsr0' with parent '/' already present! [ 173.015291][ T7340] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 173.110953][ T7340] team0: Port device team_slave_0 added [ 173.180956][ T7340] team0: Port device team_slave_1 added [ 173.202788][ T7324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 173.395593][ T7324] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.434779][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.447961][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.595647][ T7340] device hsr_slave_0 entered promiscuous mode [ 173.640031][ T7340] device hsr_slave_1 entered promiscuous mode [ 173.742629][ T7340] debugfs: Directory 'hsr0' with parent '/' already present! [ 173.766663][ T7469] Started in network mode [ 173.771664][ T7469] Own node identity ff010000000000000000000000000001, cluster identity 4711 [ 173.823992][ T7469] Enabling of bearer rejected, failed to enable media [ 173.832239][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.858702][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.943097][ T3007] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.950204][ T3007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 174.023420][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 174.083363][ T3007] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 174.126606][ T3007] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.133725][ T3007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 174.334935][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 174.368426][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 174.428485][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.473948][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.537990][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.600328][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.658269][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.729212][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.783423][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.857657][ T7324] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 174.930081][ T7324] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.030239][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 175.052236][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.138151][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.288510][ T7324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.340128][ T7326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.433902][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.472557][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.517945][ T7326] 8021q: adding VLAN 0 to HW filter on device team0 [ 175.566390][ T7340] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.632932][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.653036][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.697569][ T7385] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.704751][ T7385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.803502][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.812432][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.873170][ T7385] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.880254][ T7385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.979308][ T7340] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.024666][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.043445][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.093000][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.122080][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.163429][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.171312][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 176.205853][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.226123][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 176.266906][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 176.295909][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 00:45:53 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000500), 0x4) clock_gettime(0x0, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000abe000)}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RUNLINKAT(r1, &(0x7f00000006c0)={0xffffffffffffffca}, 0xfffffffffffffe3c) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2ce21b6c9a962d45c506d47f5bd5c00c1eb20000000000ad5fc28cf71bb8defab95baf00002c000000"]) write$P9_RREADDIR(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x6c, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0@'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xfc000000]}, 0x8000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}]}]}, 0x6c}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0), 0xc, &(0x7f0000000980)={&(0x7f0000000800)={0x180, r3, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x138, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip6gre0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3ee0, @loopback, 0x9}}}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6erspan0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xfff, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e24, @rand_addr=0x8}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @rand_addr="50180bf65ddcea20e768d3561978a3a7"}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @rand_addr="2c7f1ca3e35dee145aefe9e5970c78f4", 0x40}}}}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcdb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4ee}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x20040108}, 0x10080) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000002c0)={0x14, 0x67, 0x1, {0x102, 0x0, 0x6}}, 0x14) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(0xffffffffffffffff, &(0x7f0000000300)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}, 0x3}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r5 = getpid() socket$vsock_dgram(0x28, 0x2, 0x0) request_key(&(0x7f0000000400)='logon\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='net/mcfilter\x00', 0xffffffffffffffff) rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000100)) ptrace(0x10, r5) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f0000000700)={0x7d7, 0xffffffcd, 0x9f04}) ptrace$pokeuser(0x6, r5, 0x388, 0xffffffffffffffff) [ 176.335820][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.388075][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 00:45:53 executing program 0: r0 = timerfd_create(0x0, 0x0) r1 = socket$pptp(0x18, 0x1, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) dup2(r0, r1) 00:45:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000440)='mem\x00\x01y.swaS.current\x00\xbe\x17\xf2\xfan\xd4\xb9#h\xa1\xf4^\xbb\xe1zX|A=\xfa\x97h7\x84\xf4x\xa3\x17\xc8\xe0Y(\xfep\xf8\x8a\xca\'\xb4\x19\xed|.\"w\xdd\x8b\xd1\xa3M\xc9/\xf6\xbekI7wC\xc2\xcd%\xd0\xa4\xd0{\xbf\r6^\xc0\x92$,\xc6\x8d-\x98\x87/?u\xa8\xda\xefV\xbd\xc23\xe8O|e\x16Z\xa9\x059\xc5\x8bc\xa8k\xcc\xed\x16\xe1O\xa8H\xd6\xa9g\x86\x7f\xdew*\x10\xb5q\x87\xcfS\xc2S\x13\x00\xb4z\xcc\xb7x\xf8q\xd2\xbd!sC\x85\xeeWw\x94\xc7\xaf\xbd\xc8\xb3\xd4\x01\xbd]\x84\xf0\x87|)\x80', 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x2000036f}], 0x1, 0x20001000) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) [ 176.434046][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.585236][ T7326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 176.624495][ T7516] Enabling of bearer rejected, failed to enable media [ 176.800217][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 176.827017][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.903228][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.911718][ T7385] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.918863][ T7385] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.083491][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 177.133086][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.183018][ T7385] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.190182][ T7385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.293344][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 177.355592][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 177.414022][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 177.463496][ T7385] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 177.522333][ T7340] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 177.602576][ T7340] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 177.667885][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.683980][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 177.692250][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 177.793516][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.842659][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 177.890401][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.939224][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 177.977585][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.004436][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 178.059208][ T7340] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 178.111782][ T7326] 8021q: adding VLAN 0 to HW filter on device batadv0 00:45:55 executing program 2: futex(&(0x7f000000cffc)=0x1, 0x0, 0x0, &(0x7f00003b6ff0)={0x77359400}, &(0x7f0000048000), 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000500), 0x4) clock_gettime(0x0, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000abe000)}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RUNLINKAT(r1, &(0x7f00000006c0)={0xffffffffffffffca}, 0xfffffffffffffe3c) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2ce21b6c9a962d45c506d47f5bd5c00c1eb20000000000ad5fc28cf71bb8defab95baf00002c000000"]) write$P9_RREADDIR(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xd8) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) socket(0x3, 0x4, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x6c, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0@'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xfc000000]}, 0x8000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}]}]}, 0x6c}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000007c0), 0xc, &(0x7f0000000980)={&(0x7f0000000800)={0x180, r3, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x138, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip6gre0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3ee0, @loopback, 0x9}}}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'ip6erspan0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xfff, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e24, @rand_addr=0x8}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @rand_addr="50180bf65ddcea20e768d3561978a3a7"}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x7, @rand_addr="2c7f1ca3e35dee145aefe9e5970c78f4", 0x40}}}}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcdb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4ee}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x20040108}, 0x10080) r4 = getpgrp(0xffffffffffffffff) prlimit64(r4, 0x0, &(0x7f0000000100)={0x1, 0x3}, &(0x7f0000000040)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000002c0)={0x14, 0x67, 0x1, {0x102, 0x0, 0x6}}, 0x14) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), &(0x7f0000000200)=0x3) bind$tipc(0xffffffffffffffff, &(0x7f0000000300)=@name={0x1e, 0x2, 0x3, {{0x0, 0x1}, 0x3}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000340)={0x3}, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) r5 = getpid() socket$vsock_dgram(0x28, 0x2, 0x0) request_key(&(0x7f0000000400)='logon\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='net/mcfilter\x00', 0xffffffffffffffff) rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000100)) ptrace(0x10, r5) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f0000000700)={0x7d7, 0xffffffcd, 0x9f04}) ptrace$pokeuser(0x6, r5, 0x388, 0xffffffffffffffff) [ 178.484405][ T7558] Enabling of bearer rejected, failed to enable media [ 179.189244][ T7571] ================================================================== [ 179.197374][ T7571] BUG: KCSAN: data-race in pipe_wait / put_pipe_info [ 179.204033][ T7571] [ 179.206354][ T7571] read to 0xffff8880b4049acc of 4 bytes by task 7473 on cpu 1: [ 179.213882][ T7571] pipe_wait+0xd7/0x140 [ 179.218038][ T7571] pipe_read+0x3b1/0x5e0 [ 179.222264][ T7571] new_sync_read+0x389/0x4f0 [ 179.226850][ T7571] __vfs_read+0xb1/0xc0 [ 179.230990][ T7571] vfs_read+0x143/0x2c0 [ 179.235132][ T7571] ksys_read+0xd5/0x1b0 [ 179.239292][ T7571] __x64_sys_read+0x4c/0x60 [ 179.243796][ T7571] do_syscall_64+0xcc/0x370 [ 179.248283][ T7571] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.254163][ T7571] [ 179.256481][ T7571] write to 0xffff8880b4049acc of 4 bytes by task 7571 on cpu 0: [ 179.264095][ T7571] put_pipe_info+0x4d/0xb0 [ 179.268494][ T7571] pipe_release+0x152/0x1b0 [ 179.272996][ T7571] __fput+0x1e1/0x520 [ 179.276969][ T7571] ____fput+0x1f/0x30 [ 179.280937][ T7571] task_work_run+0xf6/0x130 [ 179.285426][ T7571] exit_to_usermode_loop+0x2b4/0x2c0 [ 179.290693][ T7571] do_syscall_64+0x353/0x370 [ 179.295293][ T7571] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.301158][ T7571] [ 179.303464][ T7571] Reported by Kernel Concurrency Sanitizer on: [ 179.309604][ T7571] CPU: 0 PID: 7571 Comm: net.agent Not tainted 5.4.0-rc3+ #0 [ 179.316952][ T7571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.327005][ T7571] ================================================================== [ 179.335048][ T7571] Kernel panic - not syncing: panic_on_warn set ... [ 179.341624][ T7571] CPU: 0 PID: 7571 Comm: net.agent Not tainted 5.4.0-rc3+ #0 [ 179.348974][ T7571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.359012][ T7571] Call Trace: [ 179.362294][ T7571] dump_stack+0xf5/0x159 [ 179.366538][ T7571] panic+0x210/0x640 [ 179.370426][ T7571] ? vprintk_func+0x8d/0x140 [ 179.375006][ T7571] kcsan_report.cold+0xc/0x10 [ 179.379671][ T7571] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 179.385205][ T7571] __tsan_write4+0x32/0x40 [ 179.389621][ T7571] put_pipe_info+0x4d/0xb0 [ 179.394023][ T7571] pipe_release+0x152/0x1b0 [ 179.398513][ T7571] __fput+0x1e1/0x520 [ 179.402481][ T7571] ? put_pipe_info+0xb0/0xb0 [ 179.407059][ T7571] ____fput+0x1f/0x30 [ 179.411029][ T7571] task_work_run+0xf6/0x130 [ 179.415520][ T7571] exit_to_usermode_loop+0x2b4/0x2c0 [ 179.420794][ T7571] do_syscall_64+0x353/0x370 [ 179.425373][ T7571] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.431249][ T7571] RIP: 0033:0x7f77851ae9b7 [ 179.435668][ T7571] Code: 73 01 c3 48 8b 0d 81 44 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 90 90 90 b8 21 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 51 44 2b 00 31 d2 48 29 c2 64 [ 179.455257][ T7571] RSP: 002b:00007ffc2ed6bd38 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 179.463652][ T7571] RAX: 0000000000000001 RBX: 0000000000000001 RCX: 00007f77851ae9b7 [ 179.471611][ T7571] RDX: 00000000004022f2 RSI: 0000000000000001 RDI: 000000000000000a [ 179.479571][ T7571] RBP: 0000000001f62ae0 R08: 00007ffc2ed6bd80 R09: 0000000000000000 [ 179.487526][ T7571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 179.495495][ T7571] R13: 00007ffc2ed6bf60 R14: 0000000000000000 R15: 0000000000000000 [ 179.504618][ T7571] Kernel Offset: disabled [ 179.509004][ T7571] Rebooting in 86400 seconds..