Warning: Permanently added '10.128.0.115' (ECDSA) to the list of known hosts. 2019/10/15 22:42:04 fuzzer started 2019/10/15 22:42:05 dialing manager at 10.128.0.105:38903 2019/10/15 22:42:05 syscalls: 2523 2019/10/15 22:42:05 code coverage: enabled 2019/10/15 22:42:05 comparison tracing: enabled 2019/10/15 22:42:05 extra coverage: extra coverage is not supported by the kernel 2019/10/15 22:42:05 setuid sandbox: enabled 2019/10/15 22:42:05 namespace sandbox: enabled 2019/10/15 22:42:05 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/15 22:42:05 fault injection: enabled 2019/10/15 22:42:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/15 22:42:05 net packet injection: enabled 2019/10/15 22:42:05 net device setup: enabled 2019/10/15 22:42:05 concurrency sanitizer: enabled 22:42:09 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f00000002c0)=0x6, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000240)={0x0, 0x8, 0x1}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) r4 = syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x0, 0x301000) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000001a80)) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) close(r5) getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000036c0), 0x12) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000017c0)) getresgid(&(0x7f0000001800), &(0x7f0000001840), 0x0) getgid() r6 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r6, 0xaf01, 0x0) r7 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r7, 0xaf01, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x2, 0x28812, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu\x00', 0x0, 0x0) getegid() openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r8, 0xaf01, 0x0) syz_open_dev$vcsa(0x0, 0x400, 0x40000) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r9, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) r10 = getpid() sched_setscheduler(r10, 0x0, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) r11 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r11, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r11, 0x4028af11, 0x0) gin: [ 51.801918][ T7229] IPVS: ftp: loaded support on port[0] = 21 22:42:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000540)={0xd}) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000580), 0x0) r2 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000140)) getresuid(0x0, &(0x7f0000000580), &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) mount$fuseblk(&(0x7f0000000480)='/dev/loop0\x00', 0x0, 0x0, 0x2, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@max_read={'max_read'}}, {@blksize={'blksize'}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@uid_eq={'uid'}}, {@uid_gt={'uid>'}}]}}) geteuid() syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) gettid() fstat(0xffffffffffffffff, 0x0) gettid() socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) syz_open_procfs(0x0, 0x0) getresuid(0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000500)='fuseblk\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) socket(0x1, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000500)='fuseblk\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(0x0) gettid() gettid() gettid() fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r4) gettid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 51.900465][ T7229] chnl_net:caif_netlink_parms(): no params data found [ 51.948224][ T7229] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.966455][ T7229] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.986572][ T7229] device bridge_slave_0 entered promiscuous mode [ 52.007054][ T7229] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.034988][ T7229] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.055480][ T7229] device bridge_slave_1 entered promiscuous mode [ 52.101062][ T7229] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 52.126584][ T7229] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 52.153401][ T7229] team0: Port device team_slave_0 added [ 52.161908][ T7229] team0: Port device team_slave_1 added 22:42:10 executing program 2: socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) socket$kcm(0x10, 0x3, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x369e5d84) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) sendfile(r3, r3, &(0x7f0000000140)=0x8800, 0x8800000) sendmsg$nl_route(r1, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000380)=ANY=[]}}, 0x0) [ 52.259921][ T7229] device hsr_slave_0 entered promiscuous mode [ 52.307766][ T7229] device hsr_slave_1 entered promiscuous mode [ 52.382478][ T7229] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.390265][ T7229] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.398331][ T7229] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.407109][ T7229] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.480754][ T7232] IPVS: ftp: loaded support on port[0] = 21 [ 52.523861][ T7229] 8021q: adding VLAN 0 to HW filter on device bond0 [ 52.571237][ T7229] 8021q: adding VLAN 0 to HW filter on device team0 [ 52.587692][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 52.597750][ T3021] bridge0: port 1(bridge_slave_0) entered disabled state [ 52.621953][ T3021] bridge0: port 2(bridge_slave_1) entered disabled state [ 52.636026][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 52.667541][ T7235] IPVS: ftp: loaded support on port[0] = 21 [ 52.678017][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 52.692149][ T3021] bridge0: port 1(bridge_slave_0) entered blocking state [ 52.699900][ T3021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 52.709539][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 22:42:10 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0xfeca}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) lstat(&(0x7f0000000f00)='./file0\x00', 0x0) fstat(0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x222a6d8102856fd9) socket$inet6(0xa, 0x1000000000002, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f0000000280), &(0x7f0000000340)=0x4) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r2) mmap(&(0x7f000000d000/0x1000)=nil, 0x1000, 0x800002, 0x11, r2, 0x0) fcntl$setstatus(r2, 0x4, 0x0) [ 52.719070][ T3021] bridge0: port 2(bridge_slave_1) entered blocking state [ 52.727290][ T3021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 52.869554][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 52.919041][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 52.947740][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 52.958391][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 52.974334][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 52.988486][ T7232] chnl_net:caif_netlink_parms(): no params data found [ 53.025075][ T7229] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 53.105012][ T7232] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.117503][ T7232] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.129393][ T7232] device bridge_slave_0 entered promiscuous mode [ 53.163404][ T7232] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.178923][ T7232] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.194651][ T7232] device bridge_slave_1 entered promiscuous mode 22:42:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="285474f00d3a960eca58356ed2eb000000", 0x11) [ 53.214620][ T7229] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 53.280856][ T7232] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 53.318487][ T7232] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 53.337323][ T7240] IPVS: ftp: loaded support on port[0] = 21 [ 53.374055][ T7235] chnl_net:caif_netlink_parms(): no params data found [ 53.438552][ T7232] team0: Port device team_slave_0 added [ 53.522509][ T7232] team0: Port device team_slave_1 added [ 53.686130][ T7232] device hsr_slave_0 entered promiscuous mode 22:42:11 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 53.737598][ T7232] device hsr_slave_1 entered promiscuous mode [ 53.774967][ T7232] debugfs: Directory 'hsr0' with parent '/' already present! [ 53.796906][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 53.796941][ T26] audit: type=1804 audit(1571179332.027:31): pid=7250 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir829766104/syzkaller.KW635l/0/bus" dev="sda1" ino=16519 res=1 [ 53.805508][ T7235] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.835157][ C0] hrtimer: interrupt took 45357 ns [ 53.839558][ T7235] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.858406][ T7235] device bridge_slave_0 entered promiscuous mode [ 53.868755][ T7235] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.874717][ T7248] IPVS: ftp: loaded support on port[0] = 21 [ 53.881701][ T7235] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.892209][ T7235] device bridge_slave_1 entered promiscuous mode [ 53.895004][ T26] audit: type=1804 audit(1571179332.027:32): pid=7250 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir829766104/syzkaller.KW635l/0/bus" dev="sda1" ino=16519 res=1 [ 53.927769][ T26] audit: type=1804 audit(1571179332.077:33): pid=7250 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir829766104/syzkaller.KW635l/0/bus" dev="sda1" ino=16519 res=1 [ 53.932989][ T7232] bridge0: port 2(bridge_slave_1) entered blocking state [ 53.952486][ T26] audit: type=1804 audit(1571179332.077:34): pid=7250 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir829766104/syzkaller.KW635l/0/bus" dev="sda1" ino=16519 res=1 [ 53.959793][ T7232] bridge0: port 2(bridge_slave_1) entered forwarding state [ 53.959894][ T7232] bridge0: port 1(bridge_slave_0) entered blocking state [ 53.959919][ T7232] bridge0: port 1(bridge_slave_0) entered forwarding state [ 54.015672][ T7236] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.035355][ T7236] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.100390][ T7235] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.125514][ T7259] IPVS: ftp: loaded support on port[0] = 21 [ 54.131005][ T7235] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.174771][ T7235] team0: Port device team_slave_0 added [ 54.180823][ T7240] chnl_net:caif_netlink_parms(): no params data found [ 54.207968][ T7235] team0: Port device team_slave_1 added [ 54.274428][ T7240] bridge0: port 1(bridge_slave_0) entered blocking state [ 54.281912][ T7240] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.290753][ T7240] device bridge_slave_0 entered promiscuous mode [ 54.299103][ T7240] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.306528][ T7240] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.314739][ T7240] device bridge_slave_1 entered promiscuous mode [ 54.371961][ T26] audit: type=1804 audit(1571179332.597:35): pid=7262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir829766104/syzkaller.KW635l/0/bus" dev="sda1" ino=16519 res=1 [ 54.378337][ T7235] device hsr_slave_0 entered promiscuous mode [ 54.410993][ T26] audit: type=1804 audit(1571179332.597:36): pid=7264 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir829766104/syzkaller.KW635l/0/bus" dev="sda1" ino=16519 res=1 [ 54.437954][ T26] audit: type=1804 audit(1571179332.637:37): pid=7264 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir829766104/syzkaller.KW635l/0/bus" dev="sda1" ino=16519 res=1 [ 54.462382][ T26] audit: type=1804 audit(1571179332.637:38): pid=7261 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir829766104/syzkaller.KW635l/0/bus" dev="sda1" ino=16519 res=1 [ 54.505520][ T7235] device hsr_slave_1 entered promiscuous mode [ 54.565186][ T7235] debugfs: Directory 'hsr0' with parent '/' already present! [ 54.609001][ T7232] 8021q: adding VLAN 0 to HW filter on device bond0 [ 54.618517][ T7240] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 54.631313][ T7240] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 54.671590][ T7248] chnl_net:caif_netlink_parms(): no params data found [ 54.707068][ T7240] team0: Port device team_slave_0 added [ 54.715762][ T7240] team0: Port device team_slave_1 added [ 54.738638][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 54.749634][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 54.778506][ T7248] bridge0: port 1(bridge_slave_0) entered blocking state 22:42:13 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f00000002c0)=0x6, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000240)={0x0, 0x8, 0x1}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) r4 = syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x0, 0x301000) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000001a80)) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) close(r5) getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000036c0), 0x12) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000017c0)) getresgid(&(0x7f0000001800), &(0x7f0000001840), 0x0) getgid() r6 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r6, 0xaf01, 0x0) r7 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r7, 0xaf01, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x2, 0x28812, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu\x00', 0x0, 0x0) getegid() openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r8, 0xaf01, 0x0) syz_open_dev$vcsa(0x0, 0x400, 0x40000) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r9, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) r10 = getpid() sched_setscheduler(r10, 0x0, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) r11 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r11, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r11, 0x4028af11, 0x0) [ 54.789677][ T7248] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.797866][ T7248] device bridge_slave_0 entered promiscuous mode [ 54.810729][ T7232] 8021q: adding VLAN 0 to HW filter on device team0 [ 54.849063][ T7248] bridge0: port 2(bridge_slave_1) entered blocking state [ 54.857705][ T7248] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.870699][ T7248] device bridge_slave_1 entered promiscuous mode [ 54.928022][ T7240] device hsr_slave_0 entered promiscuous mode [ 54.988170][ T26] audit: type=1804 audit(1571179333.217:39): pid=7274 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir829766104/syzkaller.KW635l/1/bus" dev="sda1" ino=16519 res=1 [ 54.995454][ T7240] device hsr_slave_1 entered promiscuous mode [ 55.012704][ T26] audit: type=1804 audit(1571179333.217:40): pid=7274 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir829766104/syzkaller.KW635l/1/bus" dev="sda1" ino=16519 res=1 [ 55.075172][ T7240] debugfs: Directory 'hsr0' with parent '/' already present! [ 55.097907][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.106908][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.116152][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.123262][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.131140][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.140136][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.148599][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.155654][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.163682][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.173085][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.182489][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.191031][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.200749][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.228760][ T7248] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 55.253407][ T7248] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 55.268142][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.277048][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.292591][ T7235] 8021q: adding VLAN 0 to HW filter on device bond0 [ 55.309752][ T7259] chnl_net:caif_netlink_parms(): no params data found [ 55.329461][ T7232] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 55.340622][ T7232] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.360467][ T7248] team0: Port device team_slave_0 added [ 55.371110][ T7248] team0: Port device team_slave_1 added 22:42:13 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f00000002c0)=0x6, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000240)={0x0, 0x8, 0x1}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) r4 = syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x0, 0x301000) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000001a80)) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) close(r5) getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000036c0), 0x12) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000017c0)) getresgid(&(0x7f0000001800), &(0x7f0000001840), 0x0) getgid() r6 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r6, 0xaf01, 0x0) r7 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r7, 0xaf01, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x2, 0x28812, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu\x00', 0x0, 0x0) getegid() openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r8, 0xaf01, 0x0) syz_open_dev$vcsa(0x0, 0x400, 0x40000) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r9, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) r10 = getpid() sched_setscheduler(r10, 0x0, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) r11 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r11, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r11, 0x4028af11, 0x0) [ 55.379169][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.388993][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.402317][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 55.411678][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 55.426905][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 55.450840][ T7232] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 55.491328][ T7235] 8021q: adding VLAN 0 to HW filter on device team0 [ 55.552848][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 55.565810][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 55.592101][ T7259] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.601015][ T7259] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.609653][ T7259] device bridge_slave_0 entered promiscuous mode [ 55.617255][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 55.626673][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 55.635679][ T3512] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.642745][ T3512] bridge0: port 1(bridge_slave_0) entered forwarding state [ 55.655422][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 55.664316][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 55.678270][ T3512] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.685415][ T3512] bridge0: port 2(bridge_slave_1) entered forwarding state [ 55.698832][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 55.710411][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 55.723626][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 55.734826][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 55.747949][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 55.759990][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 55.807368][ T7248] device hsr_slave_0 entered promiscuous mode [ 55.845277][ T7248] device hsr_slave_1 entered promiscuous mode [ 55.885121][ T7248] debugfs: Directory 'hsr0' with parent '/' already present! [ 55.897031][ T7235] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 55.907802][ T7235] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 55.920614][ T7259] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.927830][ T7259] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.936407][ T7259] device bridge_slave_1 entered promiscuous mode [ 55.961520][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 55.970318][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 55.980068][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 55.988973][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 55.997977][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.006683][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.017729][ T7240] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.034708][ T7259] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 56.056815][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.074693][ T7240] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.103447][ T7259] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 22:42:14 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f00000002c0)=0x6, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000240)={0x0, 0x8, 0x1}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast2, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(r2, &(0x7f0000000300)=ANY=[], 0x6) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) r4 = syz_open_dev$audion(&(0x7f00000003c0)='/dev/audio#\x00', 0x0, 0x301000) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000001a80)) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$inet6(0xa, 0x0, 0x0) close(r5) getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f00000036c0), 0x12) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000017c0)) getresgid(&(0x7f0000001800), &(0x7f0000001840), 0x0) getgid() r6 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r6, 0xaf01, 0x0) r7 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r7, 0xaf01, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x2, 0x28812, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu\x00', 0x0, 0x0) getegid() openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r8 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r8, 0xaf01, 0x0) syz_open_dev$vcsa(0x0, 0x400, 0x40000) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r9, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x4028af11, &(0x7f0000000040)) r10 = getpid() sched_setscheduler(r10, 0x0, 0x0) socket(0x10, 0x2, 0x0) setuid(0x0) r11 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r11, 0xaf01, 0x0) ioctl$TUNSETIFINDEX(r11, 0x4028af11, 0x0) [ 56.157206][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.175658][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 56.192977][ T7235] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.237521][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.250556][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.316421][ T7234] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.323569][ T7234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 56.332268][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 56.341127][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 56.350782][ T7234] bridge0: port 2(bridge_slave_1) entered blocking state [ 56.357902][ T7234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 56.371413][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.381792][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 56.412483][ T7240] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 56.427867][ T7240] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 56.448262][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.462901][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 56.472885][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 56.484137][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 56.494866][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 56.508342][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 56.520730][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 56.532276][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 56.543528][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 56.561075][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 56.573627][ T3512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 56.582756][ T7259] team0: Port device team_slave_0 added [ 56.590051][ T7259] team0: Port device team_slave_1 added [ 56.604815][ T7240] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 56.658397][ T7248] 8021q: adding VLAN 0 to HW filter on device bond0 [ 56.704803][ T7248] 8021q: adding VLAN 0 to HW filter on device team0 [ 56.720451][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 56.729391][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 22:42:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000540)={0xd}) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000580), 0x0) r2 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000140)) getresuid(0x0, &(0x7f0000000580), &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) mount$fuseblk(&(0x7f0000000480)='/dev/loop0\x00', 0x0, 0x0, 0x2, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@max_read={'max_read'}}, {@blksize={'blksize'}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@uid_eq={'uid'}}, {@uid_gt={'uid>'}}]}}) geteuid() syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) gettid() fstat(0xffffffffffffffff, 0x0) gettid() socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) syz_open_procfs(0x0, 0x0) getresuid(0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000500)='fuseblk\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) socket(0x1, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000500)='fuseblk\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(0x0) gettid() gettid() gettid() fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r4) gettid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 56.788058][ T7259] device hsr_slave_0 entered promiscuous mode [ 56.869808][ T7259] device hsr_slave_1 entered promiscuous mode 22:42:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000540)={0xd}) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000580), 0x0) r2 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000140)) getresuid(0x0, &(0x7f0000000580), &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) mount$fuseblk(&(0x7f0000000480)='/dev/loop0\x00', 0x0, 0x0, 0x2, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@max_read={'max_read'}}, {@blksize={'blksize'}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@uid_eq={'uid'}}, {@uid_gt={'uid>'}}]}}) geteuid() syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) gettid() fstat(0xffffffffffffffff, 0x0) gettid() socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) syz_open_procfs(0x0, 0x0) getresuid(0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000500)='fuseblk\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) socket(0x1, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000500)='fuseblk\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(0x0) gettid() gettid() gettid() fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r4) gettid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 56.925625][ T7259] debugfs: Directory 'hsr0' with parent '/' already present! [ 56.935335][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 56.949636][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 56.985999][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 56.993133][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.050926][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.070474][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.116989][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.149621][ T7234] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.156929][ T7234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.216903][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 22:42:15 executing program 2: socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) socket$kcm(0x10, 0x3, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x369e5d84) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) sendfile(r3, r3, &(0x7f0000000140)=0x8800, 0x8800000) sendmsg$nl_route(r1, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000380)=ANY=[]}}, 0x0) [ 57.281130][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.323269][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.339654][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.367445][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.387040][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.416331][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 57.440891][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 57.479090][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 57.497496][ T7234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 57.519866][ T7248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 57.546429][ T7332] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 57.597684][ T7259] 8021q: adding VLAN 0 to HW filter on device bond0 [ 57.619756][ T7248] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 57.645098][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 57.653056][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 57.690006][ T7259] 8021q: adding VLAN 0 to HW filter on device team0 [ 57.725047][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.735481][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.744213][ T7236] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.751322][ T7236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 57.759895][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.773248][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.782507][ T7236] bridge0: port 2(bridge_slave_1) entered blocking state [ 57.789647][ T7236] bridge0: port 2(bridge_slave_1) entered forwarding state [ 57.803319][ T7236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 57.827393][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 57.856178][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 57.873732][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 22:42:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000540)={0xd}) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000580), 0x0) r2 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000140)) getresuid(0x0, &(0x7f0000000580), &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) mount$fuseblk(&(0x7f0000000480)='/dev/loop0\x00', 0x0, 0x0, 0x2, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@max_read={'max_read'}}, {@blksize={'blksize'}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@uid_eq={'uid'}}, {@uid_gt={'uid>'}}]}}) geteuid() syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) gettid() fstat(0xffffffffffffffff, 0x0) gettid() socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) syz_open_procfs(0x0, 0x0) getresuid(0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000500)='fuseblk\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) socket(0x1, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000500)='fuseblk\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(0x0) gettid() gettid() gettid() fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r4) gettid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:42:16 executing program 2: socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) socket$kcm(0x10, 0x3, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x369e5d84) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) sendfile(r3, r3, &(0x7f0000000140)=0x8800, 0x8800000) sendmsg$nl_route(r1, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000380)=ANY=[]}}, 0x0) 22:42:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000540)={0xd}) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000580), 0x0) r2 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000140)) getresuid(0x0, &(0x7f0000000580), &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) mount$fuseblk(&(0x7f0000000480)='/dev/loop0\x00', 0x0, 0x0, 0x2, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@max_read={'max_read'}}, {@blksize={'blksize'}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@uid_eq={'uid'}}, {@uid_gt={'uid>'}}]}}) geteuid() syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) gettid() fstat(0xffffffffffffffff, 0x0) gettid() socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) syz_open_procfs(0x0, 0x0) getresuid(0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000500)='fuseblk\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) socket(0x1, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000500)='fuseblk\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(0x0) gettid() gettid() gettid() fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r4) gettid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:42:16 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0xfeca}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) lstat(&(0x7f0000000f00)='./file0\x00', 0x0) fstat(0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x222a6d8102856fd9) socket$inet6(0xa, 0x1000000000002, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f0000000280), &(0x7f0000000340)=0x4) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r2) mmap(&(0x7f000000d000/0x1000)=nil, 0x1000, 0x800002, 0x11, r2, 0x0) fcntl$setstatus(r2, 0x4, 0x0) [ 57.910604][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.967064][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.987153][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.019849][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 58.046868][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 58.081867][ T7259] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 58.122171][ T7259] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 58.149130][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 58.168343][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 58.186655][ T3021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 58.240486][ T7259] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 58.668445][ T7384] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 22:42:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="285474f00d3a960eca58356ed2eb000000", 0x11) 22:42:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="285474f00d3a960eca58356ed2eb000000", 0x11) 22:42:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000540)={0xd}) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000580), 0x0) r2 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000140)) getresuid(0x0, &(0x7f0000000580), &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) mount$fuseblk(&(0x7f0000000480)='/dev/loop0\x00', 0x0, 0x0, 0x2, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@max_read={'max_read'}}, {@blksize={'blksize'}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@uid_eq={'uid'}}, {@uid_gt={'uid>'}}]}}) geteuid() syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) gettid() fstat(0xffffffffffffffff, 0x0) gettid() socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) syz_open_procfs(0x0, 0x0) getresuid(0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000500)='fuseblk\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) socket(0x1, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000500)='fuseblk\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(0x0) gettid() gettid() gettid() fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r4) gettid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:42:17 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x0, 0xfeca}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) lstat(&(0x7f0000000f00)='./file0\x00', 0x0) fstat(0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x222a6d8102856fd9) socket$inet6(0xa, 0x1000000000002, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) getsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f0000000280), &(0x7f0000000340)=0x4) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) close(r2) mmap(&(0x7f000000d000/0x1000)=nil, 0x1000, 0x800002, 0x11, r2, 0x0) fcntl$setstatus(r2, 0x4, 0x0) 22:42:17 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ca]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:42:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000540)={0xd}) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000580), 0x0) r2 = socket(0x1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000140)) getresuid(0x0, &(0x7f0000000580), &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) mount$fuseblk(&(0x7f0000000480)='/dev/loop0\x00', 0x0, 0x0, 0x2, &(0x7f0000000740)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@max_read={'max_read'}}, {@blksize={'blksize'}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x80000000}}], [{@uid_eq={'uid'}}, {@uid_gt={'uid>'}}]}}) geteuid() syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) gettid() fstat(0xffffffffffffffff, 0x0) gettid() socket(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), 0x0) syz_open_procfs(0x0, 0x0) getresuid(0x0, 0x0, 0x0) mount$fuseblk(0x0, 0x0, &(0x7f0000000500)='fuseblk\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) socket(0x1, 0x0, 0x0) mount$fuseblk(0x0, &(0x7f00000004c0)='./bus\x00', &(0x7f0000000500)='fuseblk\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xc230, 0x802) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setgid(0x0) gettid() gettid() gettid() fstat(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r4) gettid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x0, @in=@loopback}}, 0xe8) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 22:42:17 executing program 2: socket$kcm(0x11, 0x0, 0x300) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) socket$kcm(0x10, 0x3, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x369e5d84) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x6) r1 = socket$netlink(0x10, 0x3, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r2, r3, 0x0, 0x7fffffff) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r4, 0x4, 0x42000) sendfile(r3, r3, &(0x7f0000000140)=0x8800, 0x8800000) sendmsg$nl_route(r1, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000380)=ANY=[]}}, 0x0) [ 59.084004][ T7406] ================================================================== [ 59.092129][ T7406] BUG: KCSAN: data-race in tomoyo_supervisor / tomoyo_supervisor [ 59.099840][ T7406] [ 59.102305][ T7406] read to 0xffffffff860bff44 of 4 bytes by task 7408 on cpu 0: [ 59.109846][ T7406] tomoyo_supervisor+0x1b0/0xd20 [ 59.114777][ T7406] tomoyo_path_permission+0x121/0x160 [ 59.120147][ T7406] tomoyo_path_perm+0x2c6/0x390 [ 59.124995][ T7406] tomoyo_path_symlink+0x69/0xa0 [ 59.129925][ T7406] security_path_symlink+0xab/0xe0 [ 59.135037][ T7406] do_symlinkat+0xcd/0x1e0 [ 59.139468][ T7406] __x64_sys_symlink+0x3f/0x50 [ 59.144229][ T7406] do_syscall_64+0xcf/0x2f0 [ 59.148727][ T7406] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.154608][ T7406] [ 59.156936][ T7406] write to 0xffffffff860bff44 of 4 bytes by task 7406 on cpu 1: [ 59.164563][ T7406] tomoyo_supervisor+0x1c9/0xd20 [ 59.169502][ T7406] tomoyo_path_permission+0x121/0x160 [ 59.174858][ T7406] tomoyo_path_perm+0x2c6/0x390 [ 59.179697][ T7406] tomoyo_path_symlink+0x69/0xa0 [ 59.184637][ T7406] security_path_symlink+0xab/0xe0 [ 59.189737][ T7406] do_symlinkat+0xcd/0x1e0 [ 59.194152][ T7406] __x64_sys_symlink+0x3f/0x50 [ 59.198909][ T7406] do_syscall_64+0xcf/0x2f0 [ 59.203406][ T7406] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.209286][ T7406] [ 59.211600][ T7406] Reported by Kernel Concurrency Sanitizer on: [ 59.217750][ T7406] CPU: 1 PID: 7406 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 59.225199][ T7406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.235247][ T7406] ================================================================== [ 59.243305][ T7406] Kernel panic - not syncing: panic_on_warn set ... [ 59.249884][ T7406] CPU: 1 PID: 7406 Comm: syz-executor.3 Not tainted 5.3.0+ #0 [ 59.257328][ T7406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 59.267369][ T7406] Call Trace: [ 59.270660][ T7406] dump_stack+0xf5/0x159 [ 59.274898][ T7406] panic+0x209/0x639 [ 59.278790][ T7406] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.284847][ T7406] ? vprintk_func+0x8d/0x140 [ 59.289432][ T7406] kcsan_report.cold+0xc/0x1b [ 59.294117][ T7406] __kcsan_setup_watchpoint+0x3ee/0x510 [ 59.299660][ T7406] __tsan_write4+0x32/0x40 [ 59.304068][ T7406] tomoyo_supervisor+0x1c9/0xd20 [ 59.308999][ T7406] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 59.314717][ T7406] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.321403][ T7406] ? __kcsan_setup_watchpoint+0x96/0x510 [ 59.327052][ T7406] tomoyo_path_permission+0x121/0x160 [ 59.332419][ T7406] tomoyo_path_perm+0x2c6/0x390 [ 59.337278][ T7406] tomoyo_path_symlink+0x69/0xa0 [ 59.342210][ T7406] security_path_symlink+0xab/0xe0 [ 59.347318][ T7406] do_symlinkat+0xcd/0x1e0 [ 59.351783][ T7406] __x64_sys_symlink+0x3f/0x50 [ 59.356556][ T7406] do_syscall_64+0xcf/0x2f0 [ 59.361173][ T7406] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 59.367055][ T7406] RIP: 0033:0x459787 [ 59.370948][ T7406] Code: 0f 1f 00 b8 5c 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 bd ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 58 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 59.390936][ T7406] RSP: 002b:00007ffcc2a46d68 EFLAGS: 00000202 ORIG_RAX: 0000000000000058 [ 59.400608][ T7406] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459787 [ 59.408591][ T7406] RDX: 00007ffcc2a46e03 RSI: 00000000004bf302 RDI: 00007ffcc2a46df0 [ 59.416569][ T7406] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000013 [ 59.424754][ T7406] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000000 [ 59.432816][ T7406] R13: 00007ffcc2a46da0 R14: 0000000000000000 R15: 00007ffcc2a46db0 [ 59.442256][ T7406] Kernel Offset: disabled [ 59.446699][ T7406] Rebooting in 86400 seconds..