[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 33.572618][ T26] audit: type=1800 audit(1572773201.504:25): pid=7014 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 33.623325][ T26] audit: type=1800 audit(1572773201.504:26): pid=7014 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [ 33.655640][ T26] audit: type=1800 audit(1572773201.504:27): pid=7014 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2469 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.199' (ECDSA) to the list of known hosts. 2019/11/03 09:26:49 fuzzer started 2019/11/03 09:26:51 dialing manager at 10.128.0.105:43165 2019/11/03 09:26:51 syscalls: 2554 2019/11/03 09:26:51 code coverage: enabled 2019/11/03 09:26:51 comparison tracing: enabled 2019/11/03 09:26:51 extra coverage: extra coverage is not supported by the kernel 2019/11/03 09:26:51 setuid sandbox: enabled 2019/11/03 09:26:51 namespace sandbox: enabled 2019/11/03 09:26:51 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/03 09:26:51 fault injection: enabled 2019/11/03 09:26:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/03 09:26:51 net packet injection: enabled 2019/11/03 09:26:51 net device setup: enabled 2019/11/03 09:26:51 concurrency sanitizer: enabled 2019/11/03 09:26:52 adding functions to KCSAN blacklist: 'tick_sched_do_timer' '__hrtimer_run_queues' 'task_dump_owner' '__tcp_select_window' 'tcp_add_backlog' 'tomoyo_supervisor' 09:26:54 executing program 0: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b3a25fe8000000000000005baa68754a300e53b502f5700000002000000000000000067df6b083386551005d335c7baf13a", 0x37}], 0x1}, 0x0) 09:26:54 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4) syzkaller login: [ 46.829049][ T7184] IPVS: ftp: loaded support on port[0] = 21 [ 46.940613][ T7184] chnl_net:caif_netlink_parms(): no params data found [ 46.998405][ T7184] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.005578][ T7184] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.014767][ T7184] device bridge_slave_0 entered promiscuous mode [ 47.028484][ T7184] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.035619][ T7184] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.057365][ T7184] device bridge_slave_1 entered promiscuous mode [ 47.081270][ T7184] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 47.092096][ T7184] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 47.117735][ T7184] team0: Port device team_slave_0 added [ 47.125938][ T7184] team0: Port device team_slave_1 added [ 47.140838][ T7187] IPVS: ftp: loaded support on port[0] = 21 09:26:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r1, r2, 0x0, 0x1) sendfile(r2, r0, 0x0, 0x800000001) [ 47.189713][ T7184] device hsr_slave_0 entered promiscuous mode [ 47.226848][ T7184] device hsr_slave_1 entered promiscuous mode [ 47.403172][ T7184] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.410335][ T7184] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.417722][ T7184] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.428262][ T7184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.735035][ T7208] IPVS: ftp: loaded support on port[0] = 21 [ 47.747593][ T7184] 8021q: adding VLAN 0 to HW filter on device bond0 [ 47.772737][ T7187] chnl_net:caif_netlink_parms(): no params data found [ 47.828216][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 47.847728][ T3005] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.878258][ T3005] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.908087][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 47.943571][ T7184] 8021q: adding VLAN 0 to HW filter on device team0 09:26:55 executing program 3: syz_open_procfs(0x0, &(0x7f0000000ac0)='cwd/..\x00\x00\xd8s\x11Z\xb9\x8f\'PO\xf8\x83\x1aYb\xa6\x00\x8bZY\x86W\xb43K\x88\x16\xac\xeb\xdf\xf1\x90\x06E\xe0)@\x05A\a\xcb\"\x89t\xd5L)\x82\xdd*8\x02\xb0D\x9do\x05\x1a\xc1\"\x05\x00G|\x83M\x8e<\xb8\xed;F\xaf\x12\xe4RKa]%\x8b]\xba\x87G\xda\xf1\xdf\xf5\x19j\x13\t\x00\x00\x00\x00\x00\x00\x00R\xeaD\xb8\x06\x00\xd0\x18\xc5}\xc5\x03\xdd\x98\xb8\b$\xdf\xf5\xd6j!.\xa1\xc9\xa3\x1c\xe9\xf16\'$\x89F\xb0\xc9\xa4\x1d\xae\x96\xb7\x12\xb8\x86\x93Nbv2\x9dH\xf1B=y\xfa\x17\xd0\x85\x14\xd2\x13\xb36\xb9\xa5=\x9a\xcd\xe0\xd5R\xe0\xfe\x8e(\xce\x8as\xba\xe9RE\x1a7D\x8f\xc2\x80\x84(\xcc\xa3\xd4\x00Ch\xf3\xe1\xa5\x97\xf5;,\x98#\xc7;mS4\x83Pb\x8f\xeb@`0qG\x9f\bF\x02\xce\x96-\xb5\x0f\x95\xf9y\xea\xef\f\xc7\xd3\xb8\x9db\xc2\xbc\x83r\x147\xf1\xe2\xed6~\xa4^\xb2\x0f\x01DY\x9a\x15j\xed[,\xb9\xdc\x15X}\xf6\xfacg\x1es\x83\xcbnu\xe0tJW\x8cF\xb9\x95?fW \r)K\xcd\x16\x83\xa6\xc2\x19\xff\xa2_\xaf\x05\x0f\x15\\]=?q\xf9\xcb\x89.\x94\xb5=o\xd4\xedj{\xe1\x03\xc6o>\xc6\xf4\xfe5>\xe0P\xe4\xebjM\xb0ZtV\xbeiyk\b*\\\xbb\xfb#\xb4l\t\xac\a\x8au\x90\xde-E\xad\f\x97\xf5\x15\xde\x85*\xd6\xfb/i\x89A]\x05mQ\xf2\x84@A\x13\xe5\xf7\xad\xf0\xe6\'\x93M\x8c\xae2\xa3\x03t\x99\x12\xcf\x04\xb0\xd1\x99M\x0fb\xbb\xe5\xa7\xc0O\xb7c\x00'/439) [ 48.017782][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 48.037402][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 48.076763][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.083845][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 48.117251][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 48.158496][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 48.197428][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.204539][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.320337][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 48.349599][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 48.398224][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 48.429584][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 48.459898][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 48.488957][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 48.538356][ T7187] bridge0: port 1(bridge_slave_0) entered blocking state [ 48.545449][ T7187] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.577345][ T7187] device bridge_slave_0 entered promiscuous mode [ 48.631671][ T7184] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 48.666536][ T7184] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 48.709360][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 48.720482][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 48.757356][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 48.777567][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 48.807279][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 48.838902][ T7187] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.846210][ T7187] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.878923][ T7187] device bridge_slave_1 entered promiscuous mode [ 48.919070][ T3005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 48.923253][ T7218] IPVS: ftp: loaded support on port[0] = 21 [ 48.973085][ T7187] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 09:26:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = userfaultfd(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x0, 0x6000000}) [ 49.026885][ T7187] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 49.115400][ T7187] team0: Port device team_slave_0 added [ 49.150277][ T7184] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 49.178718][ T7187] team0: Port device team_slave_1 added [ 49.399621][ T7187] device hsr_slave_0 entered promiscuous mode [ 49.446827][ T7187] device hsr_slave_1 entered promiscuous mode [ 49.486598][ T7187] debugfs: Directory 'hsr0' with parent '/' already present! [ 49.516543][ T7208] chnl_net:caif_netlink_parms(): no params data found [ 49.753599][ T7208] bridge0: port 1(bridge_slave_0) entered blocking state [ 49.769933][ T7208] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.794105][ T7208] device bridge_slave_0 entered promiscuous mode [ 49.861923][ T7218] chnl_net:caif_netlink_parms(): no params data found [ 49.900835][ T7233] IPVS: ftp: loaded support on port[0] = 21 [ 49.919161][ T7208] bridge0: port 2(bridge_slave_1) entered blocking state [ 49.926286][ T7208] bridge0: port 2(bridge_slave_1) entered disabled state 09:26:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000000105042, 0x0) write(r2, &(0x7f0000000200)="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", 0x1ffe00) [ 49.963591][ T7208] device bridge_slave_1 entered promiscuous mode 09:26:58 executing program 0: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b3a25fe8000000000000005baa68754a300e53b502f5700000002000000000000000067df6b083386551005d335c7baf13a", 0x37}], 0x1}, 0x0) [ 50.143334][ T7187] 8021q: adding VLAN 0 to HW filter on device bond0 [ 50.168843][ T7208] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 50.242488][ T7187] 8021q: adding VLAN 0 to HW filter on device team0 [ 50.278602][ T7208] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 50.312095][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 50.337367][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 50.348176][ T7218] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.355233][ T7218] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.388198][ T7218] device bridge_slave_0 entered promiscuous mode [ 50.426460][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 09:26:58 executing program 0: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b3a25fe8000000000000005baa68754a300e53b502f5700000002000000000000000067df6b083386551005d335c7baf13a", 0x37}], 0x1}, 0x0) [ 50.435249][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 50.488589][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 50.495665][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 50.537265][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 50.546239][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 50.626924][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.634122][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 50.667067][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 09:26:58 executing program 0: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b3a25fe8000000000000005baa68754a300e53b502f5700000002000000000000000067df6b083386551005d335c7baf13a", 0x37}], 0x1}, 0x0) [ 50.686976][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 50.706519][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 50.715519][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 50.776440][ T7218] bridge0: port 2(bridge_slave_1) entered blocking state [ 50.783516][ T7218] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.820919][ T7218] device bridge_slave_1 entered promiscuous mode [ 50.844003][ T7187] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 50.886404][ T7187] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 50.934596][ T7264] IPVS: ftp: loaded support on port[0] = 21 [ 50.951390][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 50.967088][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 09:26:58 executing program 0: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b3a25fe8000000000000005baa68754a300e53b502f5700000002000000000000000067df6b083386551005d335c7baf13a", 0x37}], 0x1}, 0x0) [ 51.003681][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 51.070671][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 51.093666][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 51.137113][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 51.172266][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 51.195711][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 09:26:59 executing program 0: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b3a25fe8000000000000005baa68754a300e53b502f5700000002000000000000000067df6b083386551005d335c7baf13a", 0x37}], 0x1}, 0x0) [ 51.237563][ T7208] team0: Port device team_slave_0 added [ 51.283799][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 51.296737][ T7208] team0: Port device team_slave_1 added [ 51.304413][ T7187] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 51.325086][ T7218] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 51.425690][ T7218] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 51.569447][ T7208] device hsr_slave_0 entered promiscuous mode [ 51.596772][ T7208] device hsr_slave_1 entered promiscuous mode 09:26:59 executing program 0: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000001c0)="f4001100002b3a25fe8000000000000005baa68754a300e53b502f5700000002000000000000000067df6b083386551005d335c7baf13a", 0x37}], 0x1}, 0x0) [ 51.636543][ T7208] debugfs: Directory 'hsr0' with parent '/' already present! [ 51.650121][ T7233] chnl_net:caif_netlink_parms(): no params data found [ 51.720229][ T7218] team0: Port device team_slave_0 added [ 51.765871][ T7218] team0: Port device team_slave_1 added 09:26:59 executing program 0: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='gid_map\x00\xba\x99FH\xf4\a\xaf\x04\x14\xe1\xb8d\xd4@O\xce\xbb\xe4\xdf\xc1\xe9l\x05\x9b\xd5\x1dD\xc7k\x8f\xee\xab\x920\xab\x06\xaf\xb6|&\xb7s>\xac\xebo\xb9\xcd\xfa\xb5N7\x1c!\x9c@ad\xfa\x9d\xffc\xfe\xf5[J\xe9\f\xa9\xc7\xd9e\xc9c\xddI\x94|~\x98\x8c\x14\xfb\x9c1\vu\x13\xd9\xb2\xce\x96\xe9\xdfj\xa5\xec\x19\xd8`.\x91\xdb<\xe9\x195\x81\xb1\xd1\xcbM\xc7VJ5\xb7U\xf6\xc2B\f\x13\x02\x7f\xc3\x99\xbf\xa6\xcc\xaf\xfe\xc88\xb5\xcb\xa2X\xd3\x94\x9d\xe5\xc0\\\x86?\x12 \x0e\xb0\xe8\x11z\xcd\x12Na\xf5\xbc D\x9a#\xe1\xa0h\xcb\x9dkDPp\xc4\xd2\xa7\xbejn\xfb\x03v--\xc5 \xb8\xeaq\x0f\x9a\n\xcb%\x1d\xc2\x82\x9f\x1f\xcd\xc8\x818\xa6\xea\x12\xd7\x1b?\xa0u\xb1z\xb3-\xb7\xc8\xc3\b\x1fI5\xcaxb\x0f\xfa/u\x18\xc6\x06\xa6V\xf0\xa7#5\xaeWPV\xf4 3d 00 f0 ff ff 77 17 f3 c3 90 48 8b 05 a1 51 2b 00 64 c7 00 16 [ 55.673056][ T7150] RSP: 002b:00007ffddb02d598 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 55.681457][ T7150] RAX: ffffffffffffffda RBX: 0000000000e39250 RCX: 00007f22ae0f1c65 [ 55.689423][ T7150] RDX: 00007ffddb02d5b0 RSI: 00007ffddb02d5b0 RDI: 00007ffddb02da40 [ 55.697384][ T7150] RBP: 0000000000e49dd0 R08: 000000000041f4f1 R09: 00007f22ae1487d0 [ 55.705350][ T7150] R10: 2f346d6973766564 R11: 0000000000000246 R12: 0000000000000004 [ 55.713310][ T7150] R13: 0000000000e49dd7 R14: 0000000000e39250 R15: 000000000000000b [ 55.722595][ T7150] Kernel Offset: disabled [ 55.726927][ T7150] Rebooting in 86400 seconds..