[ 65.574626][ T26] audit: type=1800 audit(1567777134.182:27): pid=9735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 65.595320][ T26] audit: type=1800 audit(1567777134.182:28): pid=9735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 66.227684][ T26] audit: type=1800 audit(1567777134.912:29): pid=9735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 66.247997][ T26] audit: type=1800 audit(1567777134.912:30): pid=9735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.169' (ECDSA) to the list of known hosts. 2019/09/06 13:39:04 fuzzer started 2019/09/06 13:39:05 dialing manager at 10.128.0.26:37395 2019/09/06 13:39:05 syscalls: 2325 2019/09/06 13:39:05 code coverage: enabled 2019/09/06 13:39:05 comparison tracing: enabled 2019/09/06 13:39:05 extra coverage: extra coverage is not supported by the kernel 2019/09/06 13:39:05 setuid sandbox: enabled 2019/09/06 13:39:05 namespace sandbox: enabled 2019/09/06 13:39:05 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/06 13:39:05 fault injection: enabled 2019/09/06 13:39:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/06 13:39:05 net packet injection: enabled 2019/09/06 13:39:05 net device setup: enabled 13:40:21 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) fcntl$getown(r0, 0x9) syzkaller login: [ 152.456428][ T9901] IPVS: ftp: loaded support on port[0] = 21 13:40:21 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) name_to_handle_at(r0, 0x0, 0x0, 0x0, 0x0) [ 152.547650][ T9901] chnl_net:caif_netlink_parms(): no params data found [ 152.623101][ T9901] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.630628][ T9901] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.639953][ T9904] IPVS: ftp: loaded support on port[0] = 21 [ 152.650573][ T9901] device bridge_slave_0 entered promiscuous mode [ 152.675494][ T9901] bridge0: port 2(bridge_slave_1) entered blocking state [ 152.683828][ T9901] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.693549][ T9901] device bridge_slave_1 entered promiscuous mode 13:40:21 executing program 2: [ 152.737933][ T9901] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 152.774599][ T9901] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 152.811043][ T9904] chnl_net:caif_netlink_parms(): no params data found [ 152.838194][ T9901] team0: Port device team_slave_0 added [ 152.863881][ T9901] team0: Port device team_slave_1 added [ 152.878712][ T9904] bridge0: port 1(bridge_slave_0) entered blocking state [ 152.896933][ T9907] IPVS: ftp: loaded support on port[0] = 21 [ 152.903942][ T9904] bridge0: port 1(bridge_slave_0) entered disabled state [ 152.915893][ T9904] device bridge_slave_0 entered promiscuous mode [ 152.945104][ T9904] bridge0: port 2(bridge_slave_1) entered blocking state 13:40:21 executing program 3: [ 152.961866][ T9904] bridge0: port 2(bridge_slave_1) entered disabled state [ 152.969964][ T9904] device bridge_slave_1 entered promiscuous mode [ 153.014711][ T9901] device hsr_slave_0 entered promiscuous mode [ 153.048694][ T9909] IPVS: ftp: loaded support on port[0] = 21 [ 153.052477][ T9901] device hsr_slave_1 entered promiscuous mode 13:40:21 executing program 4: r0 = memfd_create(&(0x7f0000000040)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c46000000000000000000c4b40003003e000039a594249c1fd83d000000000000000000000000000000000000e5000000000020380003"], 0x39) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcff47bf070") r2 = gettid() tkill(r2, 0x3b) [ 153.200346][ T9904] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 153.233484][ T9904] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 153.265790][ T9901] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.273544][ T9901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 153.281063][ T9901] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.288396][ T9901] bridge0: port 1(bridge_slave_0) entered forwarding state [ 153.298002][ T9911] IPVS: ftp: loaded support on port[0] = 21 [ 153.345463][ T9904] team0: Port device team_slave_0 added 13:40:22 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_QUANTUM={0x8}]}}]}, 0x38}}, 0x0) [ 153.406577][ T9904] team0: Port device team_slave_1 added [ 153.497316][ T9915] IPVS: ftp: loaded support on port[0] = 21 [ 153.553763][ T9904] device hsr_slave_0 entered promiscuous mode [ 153.622137][ T9904] device hsr_slave_1 entered promiscuous mode [ 153.701938][ T9904] debugfs: Directory 'hsr0' with parent '/' already present! [ 153.726671][ T9909] chnl_net:caif_netlink_parms(): no params data found [ 153.741128][ T3589] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.749209][ T3589] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.777811][ T9907] chnl_net:caif_netlink_parms(): no params data found [ 153.824616][ T9909] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.832167][ T9909] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.840322][ T9909] device bridge_slave_0 entered promiscuous mode [ 153.873556][ T9909] bridge0: port 2(bridge_slave_1) entered blocking state [ 153.880796][ T9909] bridge0: port 2(bridge_slave_1) entered disabled state [ 153.889605][ T9909] device bridge_slave_1 entered promiscuous mode [ 153.910555][ T9911] chnl_net:caif_netlink_parms(): no params data found [ 153.931124][ T9907] bridge0: port 1(bridge_slave_0) entered blocking state [ 153.939547][ T9907] bridge0: port 1(bridge_slave_0) entered disabled state [ 153.947358][ T9907] device bridge_slave_0 entered promiscuous mode [ 153.956073][ T9909] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 153.972501][ T9909] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 153.992816][ T9907] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.000273][ T9907] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.008039][ T9907] device bridge_slave_1 entered promiscuous mode [ 154.024213][ T9901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 154.057170][ T9911] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.065067][ T9911] bridge0: port 1(bridge_slave_0) entered disabled state [ 154.074231][ T9911] device bridge_slave_0 entered promiscuous mode [ 154.084041][ T9909] team0: Port device team_slave_0 added [ 154.089994][ T9911] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.097760][ T9911] bridge0: port 2(bridge_slave_1) entered disabled state [ 154.107274][ T9911] device bridge_slave_1 entered promiscuous mode [ 154.119120][ T9904] 8021q: adding VLAN 0 to HW filter on device bond0 [ 154.128316][ T9907] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 154.138916][ T9907] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 154.149756][ T9909] team0: Port device team_slave_1 added [ 154.166835][ T9911] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 154.180698][ T9904] 8021q: adding VLAN 0 to HW filter on device team0 [ 154.195949][ T9901] 8021q: adding VLAN 0 to HW filter on device team0 [ 154.208368][ T9911] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 154.223968][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.232895][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.240753][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 154.248554][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 154.260179][ T9907] team0: Port device team_slave_0 added [ 154.268488][ T9907] team0: Port device team_slave_1 added [ 154.293002][ T9911] team0: Port device team_slave_0 added [ 154.300404][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.310559][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.319874][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.327032][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.335334][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 154.344171][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 154.353541][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 154.361222][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 154.368821][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.378397][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.388074][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.395136][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.403312][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 154.484188][ T9909] device hsr_slave_0 entered promiscuous mode [ 154.522358][ T9909] device hsr_slave_1 entered promiscuous mode [ 154.562225][ T9909] debugfs: Directory 'hsr0' with parent '/' already present! [ 154.571648][ T9911] team0: Port device team_slave_1 added [ 154.580381][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 154.589390][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 154.598554][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 154.608392][ T9917] bridge0: port 2(bridge_slave_1) entered blocking state [ 154.615940][ T9917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 154.631977][ T9915] chnl_net:caif_netlink_parms(): no params data found [ 154.673386][ T9907] device hsr_slave_0 entered promiscuous mode [ 154.722327][ T9907] device hsr_slave_1 entered promiscuous mode [ 154.761948][ T9907] debugfs: Directory 'hsr0' with parent '/' already present! [ 154.788881][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 154.806592][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 154.816285][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 154.873444][ T9911] device hsr_slave_0 entered promiscuous mode [ 154.952204][ T9911] device hsr_slave_1 entered promiscuous mode [ 154.991948][ T9911] debugfs: Directory 'hsr0' with parent '/' already present! [ 155.019462][ T9901] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 155.030331][ T9901] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 155.044073][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 155.054168][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 155.062870][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 155.072295][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 155.080841][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 155.089564][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 155.098389][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 155.107124][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 155.115886][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.124391][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.133125][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 155.141524][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 155.152672][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.161452][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.169868][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 155.177892][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 155.186059][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 155.204988][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 155.213767][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 155.250973][ T9915] bridge0: port 1(bridge_slave_0) entered blocking state [ 155.260532][ T9915] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.270314][ T9915] device bridge_slave_0 entered promiscuous mode [ 155.278329][ T9904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 155.294171][ T9901] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 155.306021][ T9915] bridge0: port 2(bridge_slave_1) entered blocking state [ 155.313717][ T9915] bridge0: port 2(bridge_slave_1) entered disabled state [ 155.321710][ T9915] device bridge_slave_1 entered promiscuous mode [ 155.339419][ T9915] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 155.362757][ T9904] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 155.386198][ T9915] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 155.434398][ T9911] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.453672][ T9915] team0: Port device team_slave_0 added [ 155.463799][ T9909] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.482689][ T9911] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.491088][ T9907] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.526698][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.543447][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.568147][ T9907] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.583752][ T9915] team0: Port device team_slave_1 added [ 155.605888][ T9909] 8021q: adding VLAN 0 to HW filter on device team0 [ 155.617828][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.635109][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.655003][ T12] bridge0: port 1(bridge_slave_0) entered blocking state 13:40:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x1000007ffff000) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000080)={0xa, @tick=0x80, 0x0, {0x65, 0x1000}, 0x1f, 0x1, 0x1f}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x800000000040, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(md5)\x00'}, 0x58) accept4$alg(r3, 0x0, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r5, r6, 0x0, 0x1000007ffff000) r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r7, 0x4, 0x4001) r8 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x8000fffffffe) fallocate(r7, 0x11, 0x9df, 0x7ffe) r9 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r10 = ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_ADD(r6, 0x4c80, r10) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0x58) r11 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r11, r12, 0x0, 0x1000007ffff000) [ 155.662570][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 155.670867][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.698963][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 155.717211][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 155.745131][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 155.756050][ T12] bridge0: port 2(bridge_slave_1) entered blocking state 13:40:24 executing program 1: 13:40:24 executing program 1: [ 155.763165][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 155.788819][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 155.804377][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 13:40:24 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) epoll_create1(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4}, 0x1b) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000180), &(0x7f0000000240)=0xc) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 13:40:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000000)) 13:40:24 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) setxattr$security_ima(0x0, &(0x7f00000002c0)='security.ima\x00', &(0x7f00000003c0)=ANY=[], 0x0, 0xfcc12165c5bec497) epoll_create1(0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e22, 0x0, @ipv4}, 0x1b) recvfrom$inet6(r2, 0x0, 0x0, 0x12000, &(0x7f0000000240)={0xa, 0x0, 0x0, @rand_addr="91b05922016e2aacf58ee38fe8adc736"}, 0x719000) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000180), &(0x7f0000000240)=0xc) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 155.875258][ T9915] device hsr_slave_0 entered promiscuous mode [ 155.902345][ T9915] device hsr_slave_1 entered promiscuous mode [ 155.942173][ T9915] debugfs: Directory 'hsr0' with parent '/' already present! [ 155.955548][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 155.963970][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 155.973069][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 155.981628][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 155.990500][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 155.999571][ T3013] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.000215][ T9953] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 156.006750][ T3013] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.033268][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.042056][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.050442][ T3013] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.057641][ T3013] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.065443][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.074152][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 156.082769][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.091196][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.099731][ T3013] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.106784][ T3013] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.114797][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.122821][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.139365][ T9911] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 156.150076][ T9911] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 156.170453][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 156.179654][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 156.191091][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 156.207561][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 156.217086][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.227886][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.237066][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.248314][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.257043][ T9917] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.264151][ T9917] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.275276][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.283944][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.294920][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.312750][ T9911] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 156.329484][ T9909] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 156.341024][ T9909] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 156.364052][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 156.373560][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 156.381225][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 156.394968][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 156.405855][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 156.417046][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 156.426554][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 156.435180][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.443568][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.451720][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.460298][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.469531][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 156.478571][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 156.487367][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 156.495333][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 156.503180][ T3013] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 156.529696][ T9909] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 156.542768][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 156.551249][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 156.562197][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 156.572847][ T9917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 156.590851][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 156.610918][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 156.616792][ T9958] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.4 proc:/self/fd/3' not defined. [ 156.641331][ T9907] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 156.667871][ T9915] 8021q: adding VLAN 0 to HW filter on device bond0 13:40:25 executing program 4: getpid() sched_setattr(0x0, 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 13:40:25 executing program 3: [ 156.714908][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 156.745751][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 156.780329][ T9915] 8021q: adding VLAN 0 to HW filter on device team0 [ 156.805754][ T9907] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 156.820662][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 156.830731][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 156.842864][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.849970][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 156.904922][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 156.926420][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 156.935959][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 156.948527][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.955638][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 156.969527][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 156.980262][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 157.025879][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 157.034969][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 157.067709][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 157.084499][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 157.093442][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 157.101611][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 157.110207][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 157.118642][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 157.127148][ T3589] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 157.137300][ T9915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 13:40:25 executing program 2: 13:40:25 executing program 1: 13:40:25 executing program 3: [ 157.170346][ T9915] 8021q: adding VLAN 0 to HW filter on device batadv0 13:40:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000005000)={&(0x7f0000001a80)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000004fc0)=[@ip_retopts={{0x18, 0x0, 0x7, {[@generic={0x7, 0x3, "a3"}, @rr={0x7, 0x3}]}}}], 0x18}, 0x0) 13:40:26 executing program 0: 13:40:26 executing program 1: 13:40:26 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x204, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x7}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000f80)='/dev/mixer\x00', 0x0, 0x0) connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x26d) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, 0x0) fstat(0xffffffffffffffff, 0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) syz_open_dev$vcsa(0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) lstat(0x0, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) keyctl$clear(0x7, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x298, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 13:40:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) 13:40:26 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) syz_open_procfs(0x0, 0x0) 13:40:26 executing program 1: 13:40:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x0, 0x0) 13:40:26 executing program 1: 13:40:26 executing program 0: 13:40:26 executing program 5: 13:40:26 executing program 5: r0 = open(&(0x7f0000000100)='./file0\x00', 0x82040, 0x0) fcntl$setlease(r0, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000da1000)={0xfffffffffffffffe}, 0x0, 0x8) rt_sigtimedwait(&(0x7f0000061000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) truncate(&(0x7f0000000080)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)}, 0x0) 13:40:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000178, 0x0) 13:40:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='bridge0\x00', 0x2f5) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000000)=0xffffffffffffffff, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000022, 0x0) [ 262.691768][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 262.698463][ C1] rcu: 1-....: (1 GPs behind) idle=456/1/0x4000000000000002 softirq=9851/9852 fqs=5238 [ 262.708380][ C1] (t=10500 jiffies g=10677 q=2432) [ 262.713561][ C1] NMI backtrace for cpu 1 [ 262.717871][ C1] CPU: 1 PID: 3589 Comm: kworker/1:3 Not tainted 5.3.0-rc7+ #0 [ 262.725506][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.735600][ C1] Workqueue: ipv6_addrconf addrconf_dad_work [ 262.741554][ C1] Call Trace: [ 262.744816][ C1] [ 262.747682][ C1] dump_stack+0x172/0x1f0 [ 262.752032][ C1] nmi_cpu_backtrace.cold+0x70/0xb2 [ 262.757219][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 262.763437][ C1] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 262.769055][ C1] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 262.775028][ C1] arch_trigger_cpumask_backtrace+0x14/0x20 [ 262.780911][ C1] rcu_dump_cpu_stacks+0x183/0x1cf [ 262.785999][ C1] ? find_next_bit+0x107/0x130 [ 262.790768][ C1] rcu_sched_clock_irq.cold+0x4dd/0xc13 [ 262.796303][ C1] ? raise_softirq+0x138/0x340 [ 262.801068][ C1] update_process_times+0x32/0x80 [ 262.806077][ C1] tick_sched_handle+0xa2/0x190 [ 262.810915][ C1] tick_sched_timer+0x53/0x140 [ 262.815655][ C1] __hrtimer_run_queues+0x364/0xe40 [ 262.820827][ C1] ? tick_sched_do_timer+0x1b0/0x1b0 [ 262.826092][ C1] ? hrtimer_start_range_ns+0xcb0/0xcb0 [ 262.831612][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 262.837395][ C1] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 262.843449][ C1] hrtimer_interrupt+0x314/0x770 [ 262.848388][ C1] smp_apic_timer_interrupt+0x160/0x610 [ 262.853910][ C1] apic_timer_interrupt+0xf/0x20 [ 262.858818][ C1] [ 262.861735][ C1] RIP: 0010:write_comp_data+0x1e/0x70 [ 262.867087][ C1] Code: 48 89 34 d1 48 89 11 5d c3 0f 1f 00 65 4c 8b 04 25 40 fe 01 00 65 8b 05 58 88 8f 7e a9 00 01 1f 00 75 51 41 8b 80 f0 12 00 00 <83> f8 03 75 45 49 8b 80 f8 12 00 00 45 8b 80 f4 12 00 00 4c 8b 08 [ 262.886665][ C1] RSP: 0018:ffff88809c7f6d40 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 262.895052][ C1] RAX: 0000000000000000 RBX: ffff888089cc4bf8 RCX: ffffffff85c650f9 [ 262.903034][ C1] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000001 [ 262.910991][ C1] RBP: ffff88809c7f6d48 R08: ffff88809c7e65c0 R09: 0000000000000000 [ 262.918954][ C1] R10: fffffbfff134af8f R11: ffff88809c7e65c0 R12: dffffc0000000000 [ 262.926992][ C1] R13: ffff888089cc4900 R14: ffff888089cc4c98 R15: ffff888089cc4c90 [ 262.935014][ C1] ? hhf_dequeue+0x679/0xa20 [ 262.939591][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 262.945820][ C1] hhf_dequeue+0x679/0xa20 [ 262.950276][ C1] __qdisc_run+0x1e7/0x19d0 [ 262.955041][ C1] ? dev_queue_xmit+0x18/0x20 [ 262.960324][ C1] __dev_queue_xmit+0x16f1/0x3650 [ 262.965328][ C1] ? __local_bh_enable_ip+0x15a/0x270 [ 262.970684][ C1] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 262.976134][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 262.982386][ C1] ? br_nf_post_routing+0xd73/0x1d30 [ 262.987852][ C1] ? br_forward_finish+0x235/0x400 [ 262.992965][ C1] ? __kasan_check_read+0x11/0x20 [ 262.998075][ C1] ? __dev_queue_xmit+0x2b15/0x3650 [ 263.003443][ C1] dev_queue_xmit+0x18/0x20 [ 263.007919][ C1] ? dev_queue_xmit+0x18/0x20 [ 263.012588][ C1] br_dev_queue_push_xmit+0x3f3/0x5c0 [ 263.017994][ C1] ? nf_hook_slow+0xf0/0x1e0 [ 263.022604][ C1] br_forward_finish+0xfa/0x400 [ 263.027431][ C1] ? br_dev_queue_push_xmit+0x5c0/0x5c0 [ 263.032973][ C1] ? br_fdb_add.cold+0x8c/0x8c [ 263.037734][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 263.043440][ C1] ? nf_hook_slow+0xf0/0x1e0 [ 263.048098][ C1] __br_forward+0x641/0xb00 [ 263.052592][ C1] ? br_forward_finish+0x400/0x400 [ 263.057691][ C1] ? br_dev_queue_push_xmit+0x5c0/0x5c0 [ 263.063303][ C1] deliver_clone+0x61/0xc0 [ 263.067718][ C1] maybe_deliver+0x2c7/0x390 [ 263.072282][ C1] br_flood+0x13a/0x3d0 [ 263.076493][ C1] br_dev_xmit+0x98c/0x15a0 [ 263.080985][ C1] ? br_poll_controller+0x10/0x10 [ 263.085996][ C1] ? netif_skb_features+0x6c2/0xb90 [ 263.091285][ C1] ? netdev_set_sb_channel+0xe0/0xe0 [ 263.096547][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 263.102787][ C1] ? validate_xmit_xfrm+0x43c/0xf10 [ 263.107961][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 263.112876][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.119092][ C1] dev_hard_start_xmit+0x1a3/0x9c0 [ 263.124197][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.130432][ C1] __dev_queue_xmit+0x2b15/0x3650 [ 263.135495][ C1] ? ndisc_constructor+0x1a5/0xb40 [ 263.140587][ C1] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 263.145860][ C1] ? ip6_finish_output2+0x1034/0x2520 [ 263.151206][ C1] ? __kasan_check_read+0x11/0x20 [ 263.156208][ C1] ? lock_downgrade+0x920/0x920 [ 263.161038][ C1] dev_queue_xmit+0x18/0x20 [ 263.165523][ C1] ? dev_queue_xmit+0x18/0x20 [ 263.170246][ C1] neigh_resolve_output+0x5a5/0x970 [ 263.175458][ C1] ip6_finish_output2+0x1034/0x2520 [ 263.180662][ C1] ? ip6_mtu+0x2e6/0x460 [ 263.184897][ C1] ? ip6_forward_finish+0x530/0x530 [ 263.190077][ C1] ? lock_downgrade+0x920/0x920 [ 263.194902][ C1] ? ip6_mtu+0x16f/0x460 [ 263.199121][ C1] __ip6_finish_output+0x444/0xa50 [ 263.204295][ C1] ? __ip6_finish_output+0x444/0xa50 [ 263.209554][ C1] ip6_finish_output+0x38/0x1f0 [ 263.214381][ C1] ip6_output+0x235/0x7c0 [ 263.218709][ C1] ? ip6_finish_output+0x1f0/0x1f0 [ 263.223796][ C1] ? __ip6_finish_output+0xa50/0xa50 [ 263.229059][ C1] ? ndisc_send_skb+0x803/0x1450 [ 263.233975][ C1] ndisc_send_skb+0xf29/0x1450 [ 263.238723][ C1] ? nf_hook.constprop.0+0x560/0x560 [ 263.244032][ C1] ? skb_set_owner_w+0x21b/0x320 [ 263.248972][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 263.254669][ C1] ndisc_send_ns+0x3a9/0x850 [ 263.259235][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.265453][ C1] ? ndisc_netdev_event+0x4e0/0x4e0 [ 263.270658][ C1] ? addrconf_dad_work+0xac4/0x1150 [ 263.275830][ C1] ? trace_hardirqs_on+0x67/0x240 [ 263.280844][ C1] ? addrconf_dad_work+0xac4/0x1150 [ 263.286032][ C1] addrconf_dad_work+0xb88/0x1150 [ 263.291033][ C1] ? addrconf_dad_completed+0xbb0/0xbb0 [ 263.296562][ C1] ? lock_acquire+0x190/0x410 [ 263.301220][ C1] ? trace_hardirqs_on+0x67/0x240 [ 263.306233][ C1] process_one_work+0x9af/0x1740 [ 263.311149][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 263.316508][ C1] ? lock_acquire+0x190/0x410 [ 263.321162][ C1] worker_thread+0x98/0xe40 [ 263.325639][ C1] ? trace_hardirqs_on+0x67/0x240 [ 263.330641][ C1] kthread+0x361/0x430 [ 263.334697][ C1] ? process_one_work+0x1740/0x1740 [ 263.339868][ C1] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 263.346083][ C1] ret_from_fork+0x24/0x30