[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 35.444488][ T23] audit: type=1800 audit(1572017883.056:25): pid=7084 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 35.464241][ T23] audit: type=1800 audit(1572017883.066:26): pid=7084 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 35.486026][ T23] audit: type=1800 audit(1572017883.066:27): pid=7084 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.172' (ECDSA) to the list of known hosts. 2019/10/25 15:38:11 fuzzer started 2019/10/25 15:38:13 dialing manager at 10.128.0.105:33971 2019/10/25 15:38:13 syscalls: 2529 2019/10/25 15:38:13 code coverage: enabled 2019/10/25 15:38:13 comparison tracing: enabled 2019/10/25 15:38:13 extra coverage: extra coverage is not supported by the kernel 2019/10/25 15:38:13 setuid sandbox: enabled 2019/10/25 15:38:13 namespace sandbox: enabled 2019/10/25 15:38:13 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/25 15:38:13 fault injection: enabled 2019/10/25 15:38:13 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/25 15:38:13 net packet injection: enabled 2019/10/25 15:38:13 net device setup: enabled 2019/10/25 15:38:13 concurrency sanitizer: enabled syzkaller login: [ 63.079117][ T7256] KCSAN: could not find function: 'poll_schedule_timeout' 2019/10/25 15:38:33 adding functions to KCSAN blacklist: 'generic_permission' 'tick_do_update_jiffies64' 'find_get_pages_range_tag' 'ext4_nonda_switch' 'wbt_done' 'audit_log_start' 'pid_update_inode' 'taskstats_exit' 'xas_find_marked' 'virtqueue_get_buf_ctx' 'ext4_writepages' 'getboottime64' 'tick_nohz_idle_stop_tick' 'rcu_gp_fqs_loop' 'add_timer' 'do_exit' '__skb_try_recv_from_queue' 'ext4_ext_insert_extent' 'list_lru_count_one' 'echo_char' '__alloc_file' 'futex_wait_queue_me' 'ext4_free_inode' 'icmp_global_allow' 'ip_finish_output2' 'evict' 'vti_tunnel_xmit' 'ext4_setattr' 'osq_lock' 'mem_cgroup_select_victim_node' 'sk_wait_data' 'inode_permission' 'vm_area_dup' 'unix_notinflight' 'shmem_add_to_page_cache' '__hrtimer_run_queues' 'tcp_poll' 'task_dump_owner' 'ext4_has_free_clusters' '__filemap_fdatawrite_range' '__ext4_new_inode' 'page_counter_try_charge' 'sbitmap_queue_clear' 'pipe_poll' 'process_srcu' 'af_alg_sendmsg' 'do_syslog' 'shmem_getpage_gfp' 'run_timer_softirq' 'ext4_free_inodes_count' 'tcp_add_backlog' 'pipe_wait' '__add_to_page_cache_locked' '__tcp_select_window' 'generic_write_end' 'tick_sched_do_timer' 'sk_stream_wait_memory' 'find_next_bit' 'rcu_gp_fqs_check_wake' 'update_defense_level' 'copy_process' 'wbt_issue' 'p9_poll_workfn' 'mousedev_read' 'mod_timer' 'do_nanosleep' 'dd_has_work' '__dev_queue_xmit' 'pcpu_alloc' 'timer_clear_idle' '__nf_ct_refresh_acct' 'blk_mq_dispatch_rq_list' 'snapshot_refaults' 'blk_mq_sched_dispatch_requests' 'sit_tunnel_xmit' 'ipip_tunnel_xmit' 'kvm_arch_vcpu_load' 'ep_poll' 'generic_fillattr' 'poll_schedule_timeout' 'ktime_get_seconds' 'datagram_poll' '__mark_inode_dirty' 'tomoyo_supervisor' 'blk_mq_get_request' 'shmem_file_read_iter' '__snd_rawmidi_transmit_ack' 'padata_find_next' 'ext4_mb_good_group' 'ktime_get_real_seconds' 'atime_needs_update' 'blk_mq_run_hw_queue' 'hrtimer_wakeup' 'queue_access_lock' 15:43:05 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280), 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000000)=""/250, 0x128b9372) getxattr(0x0, 0x0, &(0x7f0000000240)=""/85, 0x55) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 15:43:05 executing program 1: clone(0x204, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0x5) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file1/file0\x00', 0x0, 0x0) ioctl$FITRIM(r0, 0xc0185879, 0x0) creat(&(0x7f0000000140)='./file1\x00', 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x841, 0x0) [ 337.835804][ T7259] IPVS: ftp: loaded support on port[0] = 21 [ 338.020071][ T7262] IPVS: ftp: loaded support on port[0] = 21 [ 338.032622][ T7259] chnl_net:caif_netlink_parms(): no params data found [ 338.106135][ T7259] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.113334][ T7259] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.125035][ T7259] device bridge_slave_0 entered promiscuous mode [ 338.140892][ T7259] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.148335][ T7259] bridge0: port 2(bridge_slave_1) entered disabled state 15:43:05 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) ftruncate(0xffffffffffffffff, 0x200006) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00\f\x7f\xd9\xfa;\x8b\x88gb\xefi\x16\x91\xbb\xc4\xd5Jk\tU~ \xa4\vR\\\x8a\xdb\xcel\xe0\xa3[\xae\x9d\xac\x84\x9f\v\x9e\x9f\r\x10\x1f\xd3\x80\xc1\xccq\xab\x01y\xed\xfc\x96)\xf6_>+\xa03\xf4\xcc0\xbbE\xb0\xc3\x94\xd53\x87\xd6\xc4\\\xc7\x82\xe9\xaf\xb5\xb6\x15\xf4K2\x17\f\x98\x1c\xebq/\xf5\x81#\x85\xc5\xa0\xfd\xfac\xd9\xf2c`\xe9[c\a\x12\x1bb\x82\x83\x86d\xf0k\xa8\x90\x06\xa8\x1cK\xea\x19\x91\a1z)\xde_r`\xee\xb6\x9e\xcb\x05\x00\x00\x82\xa1\t\xc9\x05\xcc^', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='memory.high\x00', 0x2, 0x0) write$cgroup_int(r2, 0x0, 0x0) [ 338.157924][ T7259] device bridge_slave_1 entered promiscuous mode [ 338.235019][ T7259] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 338.258341][ T7259] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 338.278727][ T7262] chnl_net:caif_netlink_parms(): no params data found [ 338.341376][ T7259] team0: Port device team_slave_0 added [ 338.355844][ T7259] team0: Port device team_slave_1 added 15:43:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x4}]}, 0x8) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='bridge_slave_0\x00', 0x10) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) [ 338.477612][ T7259] device hsr_slave_0 entered promiscuous mode [ 338.514842][ T7259] device hsr_slave_1 entered promiscuous mode [ 338.575446][ T7262] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.582555][ T7262] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.605682][ T7262] device bridge_slave_0 entered promiscuous mode [ 338.631924][ T7262] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.644669][ T7262] bridge0: port 2(bridge_slave_1) entered disabled state [ 338.665333][ T7267] IPVS: ftp: loaded support on port[0] = 21 [ 338.695428][ T7262] device bridge_slave_1 entered promiscuous mode [ 338.722995][ T7259] bridge0: port 2(bridge_slave_1) entered blocking state [ 338.730179][ T7259] bridge0: port 2(bridge_slave_1) entered forwarding state [ 338.737606][ T7259] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.744716][ T7259] bridge0: port 1(bridge_slave_0) entered forwarding state [ 338.923850][ T7262] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 338.976400][ T7262] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 339.082194][ T7276] IPVS: ftp: loaded support on port[0] = 21 [ 339.107351][ T7263] bridge0: port 1(bridge_slave_0) entered disabled state [ 339.115928][ T7263] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.179997][ T7262] team0: Port device team_slave_0 added [ 339.216678][ T7262] team0: Port device team_slave_1 added 15:43:07 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x42, &(0x7f0000000100)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff000d000000020000000b000000ec0079c9130001", 0x1f}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001c0005c5ffffff080d0000000200001f01000000190102", 0x1b}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x336, &(0x7f0000000180)}], 0x49249249249277b, 0x0) [ 339.389365][ T7262] device hsr_slave_0 entered promiscuous mode [ 339.454886][ T7262] device hsr_slave_1 entered promiscuous mode [ 339.474552][ T7262] debugfs: Directory 'hsr0' with parent '/' already present! [ 339.486993][ T7259] 8021q: adding VLAN 0 to HW filter on device bond0 [ 339.581194][ T7269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 339.606850][ T7269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 339.637312][ T7259] 8021q: adding VLAN 0 to HW filter on device team0 [ 339.951697][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 340.005336][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 340.065226][ T7263] bridge0: port 1(bridge_slave_0) entered blocking state [ 340.072321][ T7263] bridge0: port 1(bridge_slave_0) entered forwarding state [ 340.201811][ T7308] IPVS: ftp: loaded support on port[0] = 21 [ 340.212797][ T7276] chnl_net:caif_netlink_parms(): no params data found [ 340.292758][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 340.325132][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.333927][ T7263] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.341068][ T7263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.465326][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 340.515162][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 340.575589][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 340.614885][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 340.624220][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 340.705614][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 340.764205][ T7259] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 340.844490][ T7259] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 340.907525][ T7267] chnl_net:caif_netlink_parms(): no params data found [ 340.940526][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 15:43:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x6) socket$inet6(0xa, 0x3, 0x2) write(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x4, 0x0, 0x0, 0x0, 0x0, 0x42}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 340.955718][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 340.975216][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 341.020212][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 341.075373][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 341.125446][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 341.345424][ T7259] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 341.353477][ T7276] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.374675][ T7276] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.382816][ T7276] device bridge_slave_0 entered promiscuous mode [ 341.494094][ T7276] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.534575][ T7276] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.565544][ T7276] device bridge_slave_1 entered promiscuous mode [ 341.658977][ T7267] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.690736][ T7267] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.741267][ T7267] device bridge_slave_0 entered promiscuous mode [ 341.777947][ T7267] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.794620][ T7267] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.814556][ T7267] device bridge_slave_1 entered promiscuous mode [ 341.889320][ T7276] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 341.939385][ T7276] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 341.967714][ T7262] 8021q: adding VLAN 0 to HW filter on device bond0 [ 342.002933][ T7334] IPVS: ftp: loaded support on port[0] = 21 [ 342.071072][ T7262] 8021q: adding VLAN 0 to HW filter on device team0 [ 342.101034][ T7267] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 342.135454][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 342.151954][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 15:43:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r1 = syz_open_procfs(0x0, &(0x7f0000000100)='sessionid\x00') sendfile(r0, r1, 0x0, 0x1) timer_delete(0x0) [ 342.195779][ T7267] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 342.235733][ T7276] team0: Port device team_slave_0 added [ 342.270529][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 342.298440][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 342.331692][ T3500] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.338848][ T3500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.383069][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 342.403690][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 342.438652][ T3500] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.445840][ T3500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.480462][ T7276] team0: Port device team_slave_1 added [ 342.508356][ T7308] chnl_net:caif_netlink_parms(): no params data found 15:43:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r1 = syz_open_procfs(0x0, &(0x7f0000000100)='sessionid\x00') sendfile(r0, r1, 0x0, 0x1) timer_delete(0x0) [ 342.547710][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 342.559169][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 342.608360][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 342.648226][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 342.696256][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 342.726833][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 342.748933][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 342.771156][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 15:43:10 executing program 0: [ 342.800791][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 342.812053][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 342.825209][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 15:43:10 executing program 0: [ 342.875769][ T7267] team0: Port device team_slave_0 added [ 342.883072][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 342.901587][ T7262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 342.949168][ T7267] team0: Port device team_slave_1 added 15:43:10 executing program 0: [ 343.000237][ T7262] 8021q: adding VLAN 0 to HW filter on device batadv0 15:43:10 executing program 0: 15:43:10 executing program 0: [ 343.121701][ T7276] device hsr_slave_0 entered promiscuous mode [ 343.184857][ T7276] device hsr_slave_1 entered promiscuous mode [ 343.234494][ T7276] debugfs: Directory 'hsr0' with parent '/' already present! [ 343.261715][ T7308] bridge0: port 1(bridge_slave_0) entered blocking state [ 343.271030][ T7308] bridge0: port 1(bridge_slave_0) entered disabled state [ 343.279751][ T7308] device bridge_slave_0 entered promiscuous mode [ 343.347603][ T7267] device hsr_slave_0 entered promiscuous mode [ 343.385609][ T7267] device hsr_slave_1 entered promiscuous mode [ 343.424644][ T7267] debugfs: Directory 'hsr0' with parent '/' already present! [ 343.437882][ T7308] bridge0: port 2(bridge_slave_1) entered blocking state [ 343.448732][ T7308] bridge0: port 2(bridge_slave_1) entered disabled state [ 343.457289][ T7308] device bridge_slave_1 entered promiscuous mode [ 343.707278][ T7308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 343.735109][ T7334] chnl_net:caif_netlink_parms(): no params data found [ 343.793325][ T7308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 343.956141][ T7267] 8021q: adding VLAN 0 to HW filter on device bond0 [ 344.070761][ T7308] team0: Port device team_slave_0 added [ 344.122630][ T7267] 8021q: adding VLAN 0 to HW filter on device team0 [ 344.163008][ T7276] 8021q: adding VLAN 0 to HW filter on device bond0 [ 344.207107][ T7334] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.214234][ T7334] bridge0: port 1(bridge_slave_0) entered disabled state [ 344.270548][ T7334] device bridge_slave_0 entered promiscuous mode [ 344.291070][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 344.309004][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 344.359776][ T7308] team0: Port device team_slave_1 added [ 344.424665][ T7334] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.431762][ T7334] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.475655][ T7334] device bridge_slave_1 entered promiscuous mode [ 344.500800][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 15:43:12 executing program 1: [ 344.527413][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 344.595200][ T7263] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.602324][ T7263] bridge0: port 1(bridge_slave_0) entered forwarding state [ 344.675292][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 344.684135][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 344.775073][ T7263] bridge0: port 2(bridge_slave_1) entered blocking state [ 344.782213][ T7263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 344.845163][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 344.897006][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 344.937671][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 344.985225][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 345.048935][ T7276] 8021q: adding VLAN 0 to HW filter on device team0 [ 345.092263][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 345.105197][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 345.113992][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 345.195541][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 345.234682][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 345.243629][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 345.295123][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 345.347867][ T7308] device hsr_slave_0 entered promiscuous mode [ 345.375701][ T7308] device hsr_slave_1 entered promiscuous mode [ 345.424552][ T7308] debugfs: Directory 'hsr0' with parent '/' already present! [ 345.465307][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 345.473793][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 345.519980][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 345.555369][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 345.575195][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 345.583666][ T7263] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.590750][ T7263] bridge0: port 1(bridge_slave_0) entered forwarding state [ 345.675352][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 345.684237][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 345.734921][ T7263] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.742064][ T7263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.806704][ T7267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 345.861655][ T7334] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 345.917204][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 345.935539][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 345.995727][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 346.040906][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 346.073609][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 346.120712][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 346.165456][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 346.205610][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 346.279959][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 346.348189][ T7276] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 346.385369][ T7276] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 346.426880][ T7334] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 346.477174][ T7267] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 346.524843][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 346.533524][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 346.603849][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 346.689089][ T7276] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 346.935614][ T7334] team0: Port device team_slave_0 added [ 346.986532][ T7334] team0: Port device team_slave_1 added [ 347.229106][ T7308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 347.327824][ T7334] device hsr_slave_0 entered promiscuous mode [ 347.372716][ T7334] device hsr_slave_1 entered promiscuous mode [ 347.535017][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 347.540831][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 347.564697][ T7334] debugfs: Directory 'hsr0' with parent '/' already present! [ 347.590052][ T7308] 8021q: adding VLAN 0 to HW filter on device team0 [ 347.594906][ T7473] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! [ 347.635976][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 347.644071][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 347.754171][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 347.783352][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 347.858436][ T3500] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.865609][ T3500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.000230][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 348.089652][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 348.150125][ T3500] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.157351][ T3500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.276248][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 348.344080][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 348.413636][ T7308] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 348.511497][ T7308] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 348.595478][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 348.611747][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 348.683797][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 348.748277][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 348.814611][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 348.899474][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 348.936560][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 348.979699][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 349.025009][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 349.100745][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 349.123585][ T7264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 349.172109][ T7308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 349.373970][ T7334] 8021q: adding VLAN 0 to HW filter on device bond0 [ 349.437131][ T7269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 349.465339][ T7269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 349.487773][ T7334] 8021q: adding VLAN 0 to HW filter on device team0 [ 349.514113][ T7269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 349.531172][ T7269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 349.590218][ T7269] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.597391][ T7269] bridge0: port 1(bridge_slave_0) entered forwarding state [ 349.660882][ T7273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 349.676452][ T7273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 349.708712][ T7273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 349.736218][ T7273] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.743340][ T7273] bridge0: port 2(bridge_slave_1) entered forwarding state [ 349.774761][ T7273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 349.794260][ T7273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 349.813838][ T7273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 349.843502][ T7273] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 349.884186][ T2633] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 349.899672][ T2633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 349.926712][ T2633] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 349.957030][ T2633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 349.983647][ T2633] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 350.013933][ T2633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 350.040703][ T2633] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 350.072088][ T7334] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 350.132324][ T7334] 8021q: adding VLAN 0 to HW filter on device batadv0 15:43:17 executing program 2: 15:43:17 executing program 3: 15:43:18 executing program 4: 15:43:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000300)={'nat\x00'}, &(0x7f00000003c0)=0x54) 15:43:19 executing program 0: 15:43:19 executing program 1: 15:43:19 executing program 3: 15:43:19 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000440)='/dev/loop#\x00', 0x0) keyctl$link(0x8, 0x0, 0x0) 15:43:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ppoll(&(0x7f0000000240)=[{r0}], 0x1, &(0x7f0000000280)={0x0, 0x989680}, 0x0, 0x0) 15:43:19 executing program 0: symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 15:43:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x81) prctl$PR_SET_DUMPABLE(0x4, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='\x00\x00\x7f\xef\x00\x00') times(0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0xffffffff}, 0x1c) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x10) 15:43:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) [ 352.531267][ C0] hrtimer: interrupt took 34850 ns 15:43:26 executing program 2: sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$TIOCGETD(r2, 0x5424, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = syz_open_procfs$namespace(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x4c8]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) r5 = semget$private(0x0, 0x2, 0x304) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f00000003c0)=""/212) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000500)={0x0, 0x2, 0x5000, 0x2000, &(0x7f0000020000/0x2000)=nil}) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, 0x0) 15:43:26 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32, @ANYBLOB="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"], 0x40}}, 0x0) r1 = getpid() tkill(r1, 0x9) 15:43:26 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000140)='./file0\x00', 0x800000000001044, 0x0) execve(&(0x7f0000000700)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000006c0)='./file1\x00', 0x0, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{}], 0x1, 0x0) 15:43:26 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") unshare(0x24020400) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_int(r1, 0x1, 0xe, 0x0, &(0x7f0000000080)) 15:43:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x3}}) 15:43:26 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") r1 = gettid() pipe(&(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003080)={r1, r2, 0x0, 0x0, 0x0}, 0x30) [ 358.727744][ T7592] sock: process `syz-executor.5' is using obsolete getsockopt SO_BSDCOMPAT 15:43:26 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioprio_set$pid(0x1, 0x0, 0x800004000) syncfs(r3) 15:43:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0xffffff1f, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 15:43:26 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x2) write(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x4, 0x0, 0x0, 0x0, 0x0, 0x42}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 15:43:26 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001340)={0xfffffffffffffffd, 0x0, &(0x7f0000001300)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="000000000000000700002200000008000100", @ANYRES32=0x0, @ANYBLOB="780002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75700000000001000000000000000000000000000100000800030006000000040004"], 0x7}}, 0x0) r3 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000010001, 0x0) 15:43:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") r2 = socket(0x40000000002, 0x3, 0x80000000002) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @multicast1}}) [ 359.029242][ T7619] tc_dump_action: action bad kind [ 359.058562][ T7627] tc_dump_action: action bad kind 15:43:26 executing program 3: r0 = socket(0x2000000011, 0x4000000000080002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0xffffa888}, 0x80, 0x0}}, {{&(0x7f0000000040)=@hci={0x1f, r4}, 0x80, 0x0, 0x31c}}], 0x2, 0x0) 15:43:33 executing program 2: 15:43:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0xffffff1f, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 15:43:33 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1) close(r2) socket$netlink(0x10, 0x3, 0xa) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001340)={0xfffffffffffffffd, 0x0, &(0x7f0000001300)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="000000000000000700002200000008000100", @ANYRES32=0x0, @ANYBLOB="780002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75700000000001000000000000000000000000000100000800030006000000040004"], 0x7}}, 0x0) r3 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000010001, 0x0) 15:43:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:43:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") r2 = socket(0x40000000002, 0x3, 0x80000000002) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @multicast1}}) 15:43:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0800b5055e0bcfe87b2071") r2 = socket(0x40000000002, 0x3, 0x80000000002) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'lo:\x05\xe6\r\x00\x00\x85\x01\x00\x00\x00\x10\x03\x00', {0x2, 0x0, @multicast1}}) [ 365.889480][ T7648] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 15:43:33 executing program 5: [ 366.072762][ T7653] tc_dump_action: action bad kind 15:43:33 executing program 5: 15:43:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0xffffff1f, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 15:43:33 executing program 0: [ 366.299550][ T7665] tc_dump_action: action bad kind 15:43:33 executing program 5: r0 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000280)=ANY=[@ANYBLOB="030000000000000002004e23e0000001000000000000000000000000000000000000000000000000000000007760a32000000000000000000000000000000002000000000000000000000000000000000000000000000000bc01ab776463ac8b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000200000002004e23ac1414aa00000000000000000000005a026681b1146b8da519116459000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac0200aa000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000579b20739f0f0211a40900"/404], 0x190) 15:43:34 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x125f, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) 15:43:39 executing program 2: 15:43:39 executing program 0: 15:43:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0xffffff1f, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 15:43:39 executing program 3: 15:43:39 executing program 5: 15:43:39 executing program 1: [ 372.193927][ T7686] tc_dump_action: action bad kind 15:43:39 executing program 1: 15:43:39 executing program 5: 15:43:39 executing program 3: 15:43:39 executing program 0: 15:43:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0xffffff1f, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 15:43:40 executing program 1: 15:43:46 executing program 2: 15:43:46 executing program 5: 15:43:46 executing program 0: 15:43:46 executing program 3: 15:43:46 executing program 1: 15:43:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0xffffff1f, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 15:43:46 executing program 1: 15:43:46 executing program 5: 15:43:46 executing program 3: 15:43:46 executing program 0: 15:43:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0xffffff1f, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 15:43:46 executing program 1: 15:43:50 executing program 2: 15:43:50 executing program 5: 15:43:50 executing program 3: 15:43:50 executing program 1: 15:43:50 executing program 0: 15:43:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0xffffff1f, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 382.781161][ T7745] tc_dump_action: action bad kind 15:43:50 executing program 1: 15:43:50 executing program 0: 15:43:50 executing program 5: 15:43:50 executing program 3: 15:43:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0xffffff1f, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 15:43:50 executing program 5: [ 383.125588][ T7758] tc_dump_action: action bad kind 15:43:54 executing program 2: 15:43:54 executing program 1: 15:43:54 executing program 3: 15:43:54 executing program 0: 15:43:54 executing program 5: 15:43:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0xffffff1f, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) [ 387.011419][ T7772] tc_dump_action: action bad kind 15:43:54 executing program 0: 15:43:54 executing program 3: 15:43:54 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0xffffff1f, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 15:43:54 executing program 1: 15:43:54 executing program 5: 15:43:54 executing program 0: [ 387.283602][ T7782] tc_dump_action: action bad kind 15:44:00 executing program 2: 15:44:00 executing program 1: 15:44:00 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0xffffff1f, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 15:44:00 executing program 5: 15:44:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x4f2) syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @empty=[0x0, 0x0, 0x0, 0x0, 0xe000000], [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @remote, {[@rr={0x7, 0xf, 0x4, [@multicast2, @multicast1, @dev]}]}}, @tcp={{0x0, 0x4e20, 0x41424344, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, 0x0) 15:44:00 executing program 0: [ 393.306246][ T7798] tc_dump_action: action bad kind 15:44:00 executing program 1: 15:44:00 executing program 5: 15:44:01 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x1c, 0x20000032, 0xffffff1f, 0x0, 0x0, {}, [@nested={0x8, 0x1, [@typed={0x4, 0x1, @binary}]}]}, 0x1c}}, 0x0) 15:44:01 executing program 0: [ 393.600168][ T7811] tc_dump_action: action bad kind 15:44:01 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0xffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000300)={[], 0x0, 0xf8a6, 0xffff}) 15:44:01 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r0) socket$alg(0x26, 0x5, 0x0) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], 0x2}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) clock_nanosleep(0x3, 0x1, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xffa9) r2 = dup2(r1, r1) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000080), 0xa) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) madvise(&(0x7f00000f3000/0x1000)=nil, 0x1000, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000080)={0x2c0a93fc, 0x0, 'client1\x00', 0x0, "e435eeb70cee04e1", "d9d0832a12d1c496d77c2b46290a02ba021fb9d8e59f06f17955c1bdeb59ddb8"}) prctl$PR_GET_ENDIAN(0x13, &(0x7f00000002c0)) r3 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r3) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) [ 403.149752][ T1765] ================================================================== [ 403.157901][ T1765] BUG: KCSAN: data-race in mem_cgroup_protected / mem_cgroup_protected [ 403.166232][ T1765] [ 403.168572][ T1765] write to 0xffff8880a5777120 of 8 bytes by task 1766 on cpu 1: [ 403.176381][ T1765] mem_cgroup_protected+0x223/0x2a0 [ 403.181720][ T1765] shrink_node+0x21e/0xb30 [ 403.186145][ T1765] balance_pgdat+0x60e/0xbf0 [ 403.190739][ T1765] kswapd+0x35b/0x800 [ 403.194748][ T1765] kthread+0x1d4/0x200 [ 403.198904][ T1765] ret_from_fork+0x1f/0x30 [ 403.203310][ T1765] [ 403.205639][ T1765] write to 0xffff8880a5777120 of 8 bytes by task 1765 on cpu 0: [ 403.213332][ T1765] mem_cgroup_protected+0x223/0x2a0 [ 403.218537][ T1765] shrink_node+0x21e/0xb30 [ 403.222960][ T1765] balance_pgdat+0x60e/0xbf0 [ 403.227712][ T1765] kswapd+0x35b/0x800 [ 403.231701][ T1765] kthread+0x1d4/0x200 [ 403.235773][ T1765] ret_from_fork+0x1f/0x30 [ 403.240179][ T1765] [ 403.242510][ T1765] Reported by Kernel Concurrency Sanitizer on: [ 403.248675][ T1765] CPU: 0 PID: 1765 Comm: kswapd0 Not tainted 5.4.0-rc3+ #0 [ 403.255866][ T1765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.265918][ T1765] ================================================================== [ 403.274091][ T1765] Kernel panic - not syncing: panic_on_warn set ... [ 403.280821][ T1765] CPU: 0 PID: 1765 Comm: kswapd0 Not tainted 5.4.0-rc3+ #0 [ 403.288013][ T1765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.298188][ T1765] Call Trace: [ 403.301521][ T1765] dump_stack+0xf5/0x159 [ 403.305788][ T1765] panic+0x210/0x640 [ 403.309697][ T1765] ? vprintk_func+0x8d/0x140 [ 403.314308][ T1765] kcsan_report.cold+0xc/0x10 [ 403.318989][ T1765] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 403.324655][ T1765] ? __rcu_read_unlock+0x66/0x3c0 [ 403.329825][ T1765] __tsan_write8+0x32/0x40 [ 403.334268][ T1765] mem_cgroup_protected+0x223/0x2a0 [ 403.339487][ T1765] shrink_node+0x21e/0xb30 [ 403.343935][ T1765] balance_pgdat+0x60e/0xbf0 [ 403.348719][ T1765] kswapd+0x35b/0x800 [ 403.352731][ T1765] ? _raw_spin_unlock_irq+0x68/0x80 [ 403.358108][ T1765] ? finish_wait+0x80/0x80 [ 403.362531][ T1765] kthread+0x1d4/0x200 [ 403.366603][ T1765] ? balance_pgdat+0xbf0/0xbf0 [ 403.371487][ T1765] ? kthread_stop+0x2d0/0x2d0 [ 403.376167][ T1765] ret_from_fork+0x1f/0x30 [ 403.382157][ T1765] Kernel Offset: disabled [ 403.386717][ T1765] Rebooting in 86400 seconds..