[info] Using makefile-style concurrent boot in runlevel 2. [ 44.239423][ T25] audit: type=1800 audit(1575709729.882:21): pid=7373 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 44.293082][ T25] audit: type=1800 audit(1575709729.892:22): pid=7373 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.51' (ECDSA) to the list of known hosts. 2019/12/07 09:09:01 fuzzer started 2019/12/07 09:09:02 dialing manager at 10.128.0.105:42203 2019/12/07 09:09:03 syscalls: 2684 2019/12/07 09:09:03 code coverage: enabled 2019/12/07 09:09:03 comparison tracing: enabled 2019/12/07 09:09:03 extra coverage: extra coverage is not supported by the kernel 2019/12/07 09:09:03 setuid sandbox: enabled 2019/12/07 09:09:03 namespace sandbox: enabled 2019/12/07 09:09:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/07 09:09:03 fault injection: enabled 2019/12/07 09:09:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/07 09:09:03 net packet injection: enabled 2019/12/07 09:09:03 net device setup: enabled 2019/12/07 09:09:03 concurrency sanitizer: enabled 2019/12/07 09:09:03 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 67.023511][ T7540] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/07 09:09:16 adding functions to KCSAN blacklist: 'find_next_bit' 'list_lru_count_one' '__perf_event_overflow' 'ext4_da_write_end' 'shmem_add_to_page_cache' '__handle_mm_fault' 'ipip_tunnel_xmit' 'ktime_get_real_seconds' 'sit_tunnel_xmit' 'dccp_v4_rcv' 'ext4_has_free_clusters' 'pipe_poll' 'blk_mq_free_request' '__mark_inode_dirty' 'pcpu_alloc' 'snd_seq_check_queue' 'snd_seq_prioq_cell_out' 'page_counter_try_charge' 'pty_flush_buffer' 'ext4_mark_iloc_dirty' 'process_srcu' 'padata_find_next' 'get_signal' 'unix_release_sock' '__hrtimer_run_queues' 'tcp_add_backlog' 'vm_area_dup' 'tick_sched_do_timer' 'generic_write_end' 'find_alive_thread' '__add_to_page_cache_locked' 'wbt_done' 'generic_fillattr' 'add_timer' '__filemap_fdatawrite_range' 'blk_mq_dispatch_rq_list' 'tick_nohz_idle_stop_tick' 'atime_needs_update' 'attach_to_pi_owner' 'generic_file_read_iter' '__dev_queue_xmit' 'do_nanosleep' 'xas_find_marked' 'wbt_issue' 'mm_update_next_owner' 'run_timer_softirq' 'tick_do_update_jiffies64' 'rcu_gp_fqs_check_wake' 'ext4_nonda_switch' 'bio_endio' 'lruvec_lru_size' 'blk_mq_get_request' 'pipe_wait' 'blk_mq_run_hw_queue' '__skb_try_recv_from_queue' 'do_exit' 'poll_schedule_timeout' 'rcu_gp_fqs_loop' 'ext4_mb_good_group' 'enqueue_timer' 'find_get_pages_range_tag' 'has_bh_in_lru' 'do_signal_stop' 'taskstats_exit' 'mod_timer' '__find_get_block' 'blk_mq_sched_dispatch_requests' 'n_tty_receive_buf_common' 'copy_process' '__writeback_single_inode' 'handle_userfault' 'common_perm_cond' 'dd_has_work' 'kauditd_thread' 'alloc_empty_file' 'futex_wait_queue_me' 'mem_cgroup_select_victim_node' 'tomoyo_supervisor' '__ext4_new_inode' 'do_syslog' 'ext4_free_inodes_count' 'ep_poll' 'pid_update_inode' 'timer_clear_idle' '__delete_from_page_cache' 'audit_log_start' 'ktime_get_seconds' 'ext4_free_inode' 'd_lru_del' 'echo_char' '__snd_rawmidi_transmit_ack' 09:12:51 executing program 0: [ 286.075608][ T7544] IPVS: ftp: loaded support on port[0] = 21 09:12:51 executing program 1: [ 286.149279][ T7544] chnl_net:caif_netlink_parms(): no params data found [ 286.200081][ T7544] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.220922][ T7544] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.231777][ T7544] device bridge_slave_0 entered promiscuous mode [ 286.253136][ T7544] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.260303][ T7544] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.271518][ T7544] device bridge_slave_1 entered promiscuous mode [ 286.299730][ T7544] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 286.333109][ T7544] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 286.344170][ T7547] IPVS: ftp: loaded support on port[0] = 21 09:12:52 executing program 2: [ 286.391656][ T7544] team0: Port device team_slave_0 added [ 286.398278][ T7544] team0: Port device team_slave_1 added [ 286.473013][ T7544] device hsr_slave_0 entered promiscuous mode [ 286.511216][ T7544] device hsr_slave_1 entered promiscuous mode [ 286.593517][ T7550] IPVS: ftp: loaded support on port[0] = 21 [ 286.640549][ T7547] chnl_net:caif_netlink_parms(): no params data found 09:12:52 executing program 3: [ 286.730112][ T7544] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.737259][ T7544] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.744561][ T7544] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.751660][ T7544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.872039][ T7547] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.879122][ T7547] bridge0: port 1(bridge_slave_0) entered disabled state [ 286.921814][ T7547] device bridge_slave_0 entered promiscuous mode [ 286.972498][ T7547] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.979818][ T7547] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.997340][ T7547] device bridge_slave_1 entered promiscuous mode [ 287.060220][ T7544] 8021q: adding VLAN 0 to HW filter on device bond0 [ 287.107183][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 287.122728][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.151306][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.181917][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 287.215111][ T7547] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 287.232721][ T7544] 8021q: adding VLAN 0 to HW filter on device team0 [ 287.263305][ T7550] chnl_net:caif_netlink_parms(): no params data found [ 287.277807][ T7578] IPVS: ftp: loaded support on port[0] = 21 [ 287.286447][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 287.311767][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.318827][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.362350][ T7547] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 287.406648][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 287.432984][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 09:12:53 executing program 4: [ 287.452734][ T2970] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.459889][ T2970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.521419][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 287.554233][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 287.587029][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 287.623054][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 287.652094][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 287.691585][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 287.721668][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 287.761593][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 287.799708][ T7544] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 287.823488][ T7544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 287.878713][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 287.891665][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 287.900353][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 287.949563][ T7580] IPVS: ftp: loaded support on port[0] = 21 [ 287.963333][ T7547] team0: Port device team_slave_0 added [ 288.011642][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 288.019107][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 288.053199][ T7547] team0: Port device team_slave_1 added [ 288.061911][ T7550] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.068957][ T7550] bridge0: port 1(bridge_slave_0) entered disabled state 09:12:53 executing program 5: [ 288.105147][ T7550] device bridge_slave_0 entered promiscuous mode [ 288.113954][ T7544] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 288.159436][ T7550] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.167025][ T7550] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.175127][ T7550] device bridge_slave_1 entered promiscuous mode [ 288.239564][ T7550] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 288.283036][ T7547] device hsr_slave_0 entered promiscuous mode [ 288.321467][ T7547] device hsr_slave_1 entered promiscuous mode [ 288.411032][ T7547] debugfs: Directory 'hsr0' with parent '/' already present! [ 288.433941][ T7550] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 288.455242][ T7592] IPVS: ftp: loaded support on port[0] = 21 [ 288.593177][ T7578] chnl_net:caif_netlink_parms(): no params data found [ 288.620527][ T7550] team0: Port device team_slave_0 added [ 288.652882][ T7550] team0: Port device team_slave_1 added [ 288.664028][ T7580] chnl_net:caif_netlink_parms(): no params data found 09:12:54 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x488902, 0x0) r0 = getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000005c0)={0x9, {{0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, 0x88) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000001e40)=[{{&(0x7f0000000680)=@hci, 0x80, &(0x7f0000001b40)=[{0x0}, {0x0}, {&(0x7f0000001a40)=""/118, 0x76}, {&(0x7f0000001ac0)=""/83, 0x53}, {0x0}], 0x5, &(0x7f0000001c00)=""/94, 0x5e}}], 0x1, 0x2101, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000240)={r4, 0x1d, 0x42}, &(0x7f0000000540)=ANY=[@ANYBLOB="656e633d6f616570206895bdb8e493e81e61362d67656e65726963000000000000004970074ff4743276a4e4607e73ecb500"/83], &(0x7f0000000380)="ac58dd4a34ef9ef67c3bc3b051ba1300f5731f7b203ba09e7027cc63fb", &(0x7f00000003c0)=""/66) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 288.814566][ T7578] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.838894][ T7578] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.871442][ T7578] device bridge_slave_0 entered promiscuous mode [ 288.892723][ T7578] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.909751][ T7578] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.933499][ T7578] device bridge_slave_1 entered promiscuous mode [ 288.947533][ C1] hrtimer: interrupt took 92059 ns 09:12:54 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x488902, 0x0) r0 = getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000005c0)={0x9, {{0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}}, 0x88) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000001e40)=[{{&(0x7f0000000680)=@hci, 0x80, &(0x7f0000001b40)=[{0x0}, {0x0}, {&(0x7f0000001a40)=""/118, 0x76}, {&(0x7f0000001ac0)=""/83, 0x53}, {0x0}], 0x5, &(0x7f0000001c00)=""/94, 0x5e}}], 0x1, 0x2101, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000240)={r4, 0x1d, 0x42}, &(0x7f0000000540)=ANY=[@ANYBLOB="656e633d6f616570206895bdb8e493e81e61362d67656e65726963000000000000004970074ff4743276a4e4607e73ecb500"/83], &(0x7f0000000380)="ac58dd4a34ef9ef67c3bc3b051ba1300f5731f7b203ba09e7027cc63fb", &(0x7f00000003c0)=""/66) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 289.023692][ T7550] device hsr_slave_0 entered promiscuous mode [ 289.053132][ T7550] device hsr_slave_1 entered promiscuous mode [ 289.092854][ T7550] debugfs: Directory 'hsr0' with parent '/' already present! [ 289.171194][ T7592] chnl_net:caif_netlink_parms(): no params data found [ 289.244522][ T7578] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 289.283893][ T7547] 8021q: adding VLAN 0 to HW filter on device bond0 [ 289.309941][ T7580] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.324750][ T7580] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.351624][ T7580] device bridge_slave_0 entered promiscuous mode [ 289.395283][ T7578] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 289.454007][ T7580] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.476695][ T7580] bridge0: port 2(bridge_slave_1) entered disabled state 09:12:55 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x43, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 289.519734][ T7580] device bridge_slave_1 entered promiscuous mode [ 289.597611][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 289.641503][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 289.702139][ T7547] 8021q: adding VLAN 0 to HW filter on device team0 [ 289.709402][ T7592] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.720983][ T7592] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.728903][ T7592] device bridge_slave_0 entered promiscuous mode [ 289.841189][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 289.849815][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.914696][ T7625] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.921886][ T7625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.998710][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 290.047592][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 290.122517][ T7625] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.129596][ T7625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 290.196039][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 290.253710][ T7592] bridge0: port 2(bridge_slave_1) entered blocking state [ 290.260784][ T7592] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.303141][ T7592] device bridge_slave_1 entered promiscuous mode [ 290.376592][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 290.414737][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 290.462983][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 290.515178][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 290.575332][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 290.617212][ T7580] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 290.648038][ T7547] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 290.705739][ T7547] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 09:12:56 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38010000100013070000000000000000fe8000000000000000000000000000000000000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480001006d64350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001b00"/240], 0x138}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 290.777437][ T7578] team0: Port device team_slave_0 added [ 290.805769][ T7550] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.827945][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 290.837653][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 290.898162][ T7665] devpts: called with bogus options [ 290.901914][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 290.961299][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 291.001295][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 291.026632][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 291.055665][ T7580] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 291.073741][ T7669] devpts: called with bogus options [ 291.088346][ T7578] team0: Port device team_slave_1 added [ 291.101741][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 291.123343][ T7592] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 09:12:56 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38010000100013070000000000000000fe8000000000000000000000000000000000000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480001006d64350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001b00"/240], 0x138}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) [ 291.162314][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 291.170290][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.194098][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 291.215792][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 291.294912][ T7683] devpts: called with bogus options [ 291.295278][ T7550] 8021q: adding VLAN 0 to HW filter on device team0 [ 291.327056][ T7580] team0: Port device team_slave_0 added [ 291.342831][ T7592] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 291.403804][ T7578] device hsr_slave_0 entered promiscuous mode 09:12:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0xff}) [ 291.454110][ T7578] device hsr_slave_1 entered promiscuous mode [ 291.503579][ T7578] debugfs: Directory 'hsr0' with parent '/' already present! [ 291.517146][ T7693] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 291.543538][ T7547] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 291.567780][ T7580] team0: Port device team_slave_1 added [ 291.589935][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 291.605083][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 291.622032][ T7575] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.629126][ T7575] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.642445][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 291.653262][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 291.663194][ T7575] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.670405][ T7575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.684800][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 291.694280][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 291.706939][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 291.716485][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 291.735509][ T7550] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 291.753184][ T7550] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 291.825637][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 291.840044][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 291.865393][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 291.891133][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 291.921637][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 291.941272][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 291.963402][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 291.993604][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 292.027372][ T7550] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 292.133053][ T7580] device hsr_slave_0 entered promiscuous mode 09:12:57 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x3) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x3, 0x0, @mcast2={0xff, 0x4}, 0x9}, 0x1c) [ 292.173870][ T7580] device hsr_slave_1 entered promiscuous mode [ 292.230922][ T7580] debugfs: Directory 'hsr0' with parent '/' already present! [ 292.239104][ T7592] team0: Port device team_slave_0 added [ 292.251296][ T7592] team0: Port device team_slave_1 added [ 292.291925][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 292.300613][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 292.338557][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 292.483349][ T7592] device hsr_slave_0 entered promiscuous mode [ 292.531233][ T7592] device hsr_slave_1 entered promiscuous mode [ 292.550916][ T7592] debugfs: Directory 'hsr0' with parent '/' already present! [ 292.769967][ T7578] 8021q: adding VLAN 0 to HW filter on device bond0 09:12:58 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x2000000000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000380)=0x1, 0x4) r2 = open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x88000fc000000) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x1}}, 0x0) [ 292.959994][ T7578] 8021q: adding VLAN 0 to HW filter on device team0 [ 293.017508][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 293.029018][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 293.093554][ T7580] 8021q: adding VLAN 0 to HW filter on device bond0 [ 293.151583][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 293.200713][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 293.241166][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.248283][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 293.302519][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 293.351353][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 09:12:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) [ 293.400590][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.407685][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 293.505185][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 293.556121][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 293.598674][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 293.660825][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 293.703054][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 293.751609][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 293.784883][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 293.833778][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 293.874187][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 293.914545][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 293.959731][ T7580] 8021q: adding VLAN 0 to HW filter on device team0 [ 293.995208][ T7578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 294.041217][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.051628][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 294.104435][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.154014][ T7793] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 294.214230][ T7795] FAT-fs (loop2): bogus number of reserved sectors [ 294.222331][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.287613][ T7592] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.318384][ T7795] FAT-fs (loop2): Can't find a valid FAT filesystem [ 294.331079][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 294.339864][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 294.424058][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.431270][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.566777][ T7592] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.651452][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 294.659779][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 294.698347][ T7794] FAT-fs (loop2): bogus number of reserved sectors [ 294.736816][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 294.744701][ T7794] FAT-fs (loop2): Can't find a valid FAT filesystem [ 294.794530][ T7575] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.801734][ T7575] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.877661][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 294.955219][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 295.001978][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 295.028964][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 295.051976][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 295.090765][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 295.114683][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.126110][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.134451][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 295.153142][ T7575] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 295.166118][ T7580] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 295.177264][ T7580] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 295.203226][ T7578] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 295.231139][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 295.239249][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 295.281484][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.324257][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 295.364595][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.421416][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.464258][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.494147][ T2970] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.501228][ T2970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.594230][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.624744][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.684223][ T2970] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.691368][ T2970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.764328][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 295.821961][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 295.841837][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 295.904058][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 295.952043][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 295.991624][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 296.044717][ T7592] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 296.080887][ T7592] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 296.162214][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 296.170047][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 296.224369][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 296.271611][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 296.279132][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 296.315685][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 296.330878][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.339792][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 296.351487][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.361866][ T7580] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 296.373848][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 296.399398][ T7592] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 296.407545][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 296.415491][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 09:13:02 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000200"/24, @ANYPTR, @ANYBLOB="0503080000000000", @ANYPTR, @ANYBLOB='\a\x00'/24], 0x48}, 0x0) 09:13:02 executing program 0: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0xfffffffffffffffd, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x10094) write$binfmt_script(r0, &(0x7f0000000580)={'#! ', './file0'}, 0xb) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0805b5055e0bcfe8474071") setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0), 0xc) write$binfmt_script(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="83755a8b7c9abd0b6d7982dfc9d8ffd41cdbc4a7956b05e0361b19f161b3a4c19859516522d5f3be67b3a35bc789cf00ee54a61c2b8c8eeb524ad1454c075bb62a12a085f41f221bea219d365ac692f98fcd65544faf2702bd843678c3caa842a7dd"], 0x1a000) 09:13:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) 09:13:02 executing program 1: capset(0xfffffffffffffffd, 0x0) 09:13:02 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) 09:13:02 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x44080) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@mss, @timestamp, @window, @sack_perm], 0x4) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e, 0x0) sendmmsg(r4, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYRESDEC], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x0, 0x0) bind$pptp(r5, &(0x7f00000001c0)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 09:13:02 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) write$UHID_INPUT(r0, &(0x7f0000000080)={0x8, "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", 0x1000}, 0x1006) 09:13:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_int(r2, 0x29, 0x43, &(0x7f0000000000), &(0x7f0000000040)=0x4) 09:13:02 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="4800000000000000140100000200"/24, @ANYPTR, @ANYBLOB="0503080000000000", @ANYPTR, @ANYBLOB='\a\x00'/24], 0x48}, 0x0) 09:13:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x602, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000002580)={r2, &(0x7f0000002440), &(0x7f00000024c0)=""/155}, 0x20) [ 296.928718][ T7866] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:13:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000000)=0x401, 0x4) 09:13:02 executing program 1: r0 = socket$inet6(0x10, 0x800000000003, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a280930206070000a843096c2623690400080004000c08160006000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) [ 297.029372][ T7866] syz-executor.4 (7866) used greatest stack depth: 9960 bytes left 09:13:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket(0x10, 0x803, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="fc0000001c00070cab0925000900f00007ab08000800000003000000210001c000000000000000000c00000000039815fa2c1ec28656aaa79bb94b46fe0000000a0002", 0x43) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a61c) splice(r3, 0x0, r5, 0x0, 0x10005, 0x0) [ 297.123734][ T7894] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 09:13:02 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'veth1\x00', &(0x7f0000000040)=@ethtool_cmd={0x17}}) 09:13:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:13:02 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x44080) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@mss, @timestamp, @window, @sack_perm], 0x4) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e, 0x0) sendmmsg(r4, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYRESDEC], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x0, 0x0) bind$pptp(r5, &(0x7f00000001c0)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 297.181050][ T7894] netlink: 25 bytes leftover after parsing attributes in process `syz-executor.1'. 09:13:02 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x44080) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@mss, @timestamp, @window, @sack_perm], 0x4) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e, 0x0) sendmmsg(r4, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYRESDEC], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x0, 0x0) bind$pptp(r5, &(0x7f00000001c0)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 297.306158][ T7900] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.2'. 09:13:03 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x44080) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@mss, @timestamp, @window, @sack_perm], 0x4) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e, 0x0) sendmmsg(r4, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYRESDEC], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x0, 0x0) bind$pptp(r5, &(0x7f00000001c0)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 09:13:03 executing program 3: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x44080) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@mss, @timestamp, @window, @sack_perm], 0x4) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e, 0x0) sendmmsg(r4, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYRESDEC], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x0, 0x0) bind$pptp(r5, &(0x7f00000001c0)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 09:13:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 297.634365][ T7908] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 297.692331][ T7913] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:13:03 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 297.762747][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 09:13:03 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x44080) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@mss, @timestamp, @window, @sack_perm], 0x4) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e, 0x0) sendmmsg(r4, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYRESDEC], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x0, 0x0) bind$pptp(r5, &(0x7f00000001c0)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 09:13:03 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x1410000, 0x800}, 0x1a5) 09:13:03 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7940000000000, 0x400000000000000}, 0x1010, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) fremovexattr(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000040), 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @timestamp, @window, @sack_perm], 0x20000000000003af) sendmmsg(r2, &(0x7f0000000180)=[{{0x0, 0xab, &(0x7f00000011c0), 0x327}}], 0x1, 0x44080) sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000200)=0x2, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000300)=[@mss, @timestamp, @window, @sack_perm], 0x4) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e, 0x0) sendmmsg(r4, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000002240)='Y', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) sendmsg$IPVS_CMD_GET_DEST(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYRESDEC], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000100), 0x618) close(r3) ioctl$FICLONE(r2, 0x40049409, r3) r5 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r5, &(0x7f0000000140), 0x0, 0x0) bind$pptp(r5, &(0x7f00000001c0)={0x18, 0x2, {0x0, @multicast2}}, 0x1e) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 297.894390][ T7916] syz-executor.1 (7916) used greatest stack depth: 9832 bytes left 09:13:03 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2a939, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000080)=0x8) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001600)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = syz_open_dev$mice(0x0, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x3) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r3, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) r4 = socket(0x100000000011, 0x2, 0x0) getpeername$packet(r2, &(0x7f0000001880)={0x11, 0x0, 0x0}, &(0x7f00000018c0)=0x14) bind(r4, &(0x7f0000000140)=@hci={0x1f, r5, 0x1}, 0x80) setsockopt$XDP_UMEM_COMPLETION_RING(r3, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r3, &(0x7f0000000900), 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00'}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vga_arbiter\x00', 0x420000, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r7 = openat$cgroup_procs(r6, 0x0, 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000300), 0x12) r8 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000001400), 0x0) preadv(r8, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) io_setup(0x0, &(0x7f0000000280)) socket$packet(0x11, 0x2, 0x300) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000002380)={{0x0, 0x0, 0x0, 0xffffffffffffffff}}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xc, 0x84, 0x4000000000000800, 0x1}, 0x3c) 09:13:03 executing program 2: r0 = perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) 09:13:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:13:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)='\x00') 09:13:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:13:04 executing program 5: socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@empty, @in6=@loopback}}}, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000180)={0x1a, 0x10f, 0x1f, 0x0, 0x0, 0x0, @random="48d9e6aa3026"}, 0x10) ioctl$int_in(r0, 0x100000000005452, &(0x7f0000000080)=0x9) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r0, &(0x7f00000005c0), 0x2d4, 0x20, 0x0) 09:13:04 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$inet6(0xa, 0x2, 0x0) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(0x0, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000004ff0)={0x1, &(0x7f0000002fe8)=[{0x6}]}, 0x10) dup2(r1, r3) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000140)=0x54) 09:13:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:13:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000140)="89", 0x1) 09:13:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="5500000018007f2500fe05b2a4a280930a060001fe8000021400000039000900350050000500000019000540029b84136ef75afb83de441100ae20ca3ab8220000060cec4fab91d471cd34938c42f030dd941e7931", 0x55}], 0x1}, 0x0) 09:13:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 299.632367][ T7671] device bridge_slave_1 left promiscuous mode [ 299.638676][ T7671] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.721600][ T7671] device bridge_slave_0 left promiscuous mode [ 299.727844][ T7671] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.474289][ T7671] device hsr_slave_0 left promiscuous mode [ 300.511157][ T7671] device hsr_slave_1 left promiscuous mode [ 300.597856][ T7671] team0 (unregistering): Port device team_slave_1 removed [ 300.608580][ T7671] team0 (unregistering): Port device team_slave_0 removed [ 300.618919][ T7671] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 300.655041][ T7671] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 300.722732][ T7671] bond0 (unregistering): Released all slaves [ 300.868989][ T7963] IPVS: ftp: loaded support on port[0] = 21 [ 300.947159][ T7963] chnl_net:caif_netlink_parms(): no params data found [ 300.960336][ T7966] IPVS: ftp: loaded support on port[0] = 21 [ 300.981505][ T7963] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.988693][ T7963] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.996562][ T7963] device bridge_slave_0 entered promiscuous mode [ 301.007361][ T7963] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.014521][ T7963] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.022498][ T7963] device bridge_slave_1 entered promiscuous mode [ 301.110119][ T7963] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 301.125138][ T7963] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 301.151790][ T7963] team0: Port device team_slave_0 added [ 301.158354][ T7963] team0: Port device team_slave_1 added [ 301.263548][ T7963] device hsr_slave_0 entered promiscuous mode [ 301.303985][ T7963] device hsr_slave_1 entered promiscuous mode [ 301.344680][ T7963] debugfs: Directory 'hsr0' with parent '/' already present! [ 301.354196][ T7966] chnl_net:caif_netlink_parms(): no params data found [ 301.369292][ T7963] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.376361][ T7963] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.383945][ T7963] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.391039][ T7963] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.431341][ T7966] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.438440][ T7966] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.446859][ T7966] device bridge_slave_0 entered promiscuous mode [ 301.462793][ T7966] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.470237][ T7966] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.478240][ T7966] device bridge_slave_1 entered promiscuous mode [ 301.488166][ T7963] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.509652][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.517964][ T7625] bridge0: port 1(bridge_slave_0) entered disabled state [ 301.525986][ T7625] bridge0: port 2(bridge_slave_1) entered disabled state [ 301.538469][ T7963] 8021q: adding VLAN 0 to HW filter on device team0 [ 301.547936][ T7966] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 301.566311][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 301.575140][ T7625] bridge0: port 1(bridge_slave_0) entered blocking state [ 301.582190][ T7625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 301.590060][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 301.598510][ T7625] bridge0: port 2(bridge_slave_1) entered blocking state [ 301.605616][ T7625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 301.615885][ T7966] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 301.643299][ T7966] team0: Port device team_slave_0 added [ 301.654416][ T7966] team0: Port device team_slave_1 added [ 301.662509][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 301.674860][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 301.690129][ T7963] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 301.700820][ T7963] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 301.728588][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 301.737022][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.746777][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.755364][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 301.813223][ T7966] device hsr_slave_0 entered promiscuous mode [ 301.851208][ T7966] device hsr_slave_1 entered promiscuous mode [ 301.891085][ T7966] debugfs: Directory 'hsr0' with parent '/' already present! [ 301.910748][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 301.918290][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 301.930454][ T7963] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 301.967058][ T7966] 8021q: adding VLAN 0 to HW filter on device bond0 [ 301.978641][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 301.986799][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 301.996778][ T7966] 8021q: adding VLAN 0 to HW filter on device team0 [ 302.006670][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 302.020659][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 302.029269][ T7577] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.036479][ T7577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 302.044897][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 302.056186][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 302.064954][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 302.073876][ T2970] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.081122][ T2970] bridge0: port 2(bridge_slave_1) entered forwarding state [ 302.091460][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 302.123547][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 302.136656][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 302.145556][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 302.159812][ T7966] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 302.170701][ T7966] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 302.187523][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 302.195821][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 302.204330][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 302.214035][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 302.222486][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 302.231771][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 302.240184][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 302.248906][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 302.273062][ T7975] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 302.310164][ T7966] 8021q: adding VLAN 0 to HW filter on device batadv0 09:13:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2}) 09:13:08 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$inet6(0xa, 0x2, 0x0) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(0x0, 0x0, 0x0, r2) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000004ff0)={0x1, &(0x7f0000002fe8)=[{0x6}]}, 0x10) dup2(r1, r3) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000000c0)={'security\x00'}, &(0x7f0000000140)=0x54) 09:13:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="24000000200007041dfffd946f610500020000001f000002000008f8050018000400ff7e", 0x24}], 0x1}, 0x0) 09:13:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="5500000018007f6800fe05b2a4a280930a060001fe8000020200000039000900350050000500000019000540029b84136ef75afb83de441100ae20ca3ab8220000060cec4fab91d471cd34938c42f030dd941e7931", 0x55}], 0x1}, 0x0) 09:13:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000480)=ANY=[@ANYBLOB="66696c65302f66696c65300000000000000000000000006d1ee1998f9498ce66024a05aa652803a43955af82b22132063d08a4e74a3a68a132c1e8fc236b1cf3a25fc29b4c71db85d3c86b2816e4b06c1de1252f52490b43faa0670099257650c2cdfc67328b31269a1823935702d75c47cba09864f7fe7a206155017a0b215a3339db97ccc556836ec5d1679bced323d66d721cdf663e62b904d5fb8401fb060000006809"], &(0x7f0000000080)='.', 0x0, 0xb0aa54cc6e6c7096, 0x0) [ 302.357562][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 302.366867][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 09:13:08 executing program 5: clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="0000000000480000000e000000000100"}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 09:13:08 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f000000b180)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000006180)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 09:13:08 executing program 5: clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="0000000000480000000e000000000100"}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 09:13:08 executing program 5: clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="0000000000480000000e000000000100"}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 09:13:08 executing program 5: clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="0000000000480000000e000000000100"}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 09:13:08 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000005180)=""/4096, 0x1000}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip_vs\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 09:13:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) 09:13:09 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x59b, &(0x7f0000000ac0)={@link_local, @random="04401be50814", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000ac0)={@link_local, @random="27c2de128914", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) 09:13:09 executing program 5: clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 304.573875][ T8033] IPVS: ftp: loaded support on port[0] = 21 [ 304.581798][ T7671] device bridge_slave_1 left promiscuous mode [ 304.588019][ T7671] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.651443][ T7671] device bridge_slave_0 left promiscuous mode [ 304.657719][ T7671] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.721849][ T7671] device bridge_slave_1 left promiscuous mode [ 304.728076][ T7671] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.771762][ T7671] device bridge_slave_0 left promiscuous mode [ 304.778005][ T7671] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.841895][ T7671] device bridge_slave_1 left promiscuous mode [ 304.848055][ T7671] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.891577][ T7671] device bridge_slave_0 left promiscuous mode [ 304.897835][ T7671] bridge0: port 1(bridge_slave_0) entered disabled state [ 306.811165][ T7671] device hsr_slave_0 left promiscuous mode [ 306.891055][ T7671] device hsr_slave_1 left promiscuous mode [ 306.937438][ T7671] team0 (unregistering): Port device team_slave_1 removed [ 306.947716][ T7671] team0 (unregistering): Port device team_slave_0 removed [ 306.958409][ T7671] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 307.004358][ T7671] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 307.062293][ T7671] bond0 (unregistering): Released all slaves [ 307.251664][ T7671] device hsr_slave_0 left promiscuous mode [ 307.331486][ T7671] device hsr_slave_1 left promiscuous mode [ 307.377600][ T7671] team0 (unregistering): Port device team_slave_1 removed [ 307.388050][ T7671] team0 (unregistering): Port device team_slave_0 removed [ 307.398012][ T7671] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 307.454318][ T7671] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 307.561212][ T7671] bond0 (unregistering): Released all slaves [ 307.721181][ T7671] device hsr_slave_0 left promiscuous mode [ 307.780980][ T7671] device hsr_slave_1 left promiscuous mode [ 307.836934][ T7671] team0 (unregistering): Port device team_slave_1 removed [ 307.847270][ T7671] team0 (unregistering): Port device team_slave_0 removed [ 307.857193][ T7671] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 307.913827][ T7671] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 308.001162][ T7671] bond0 (unregistering): Released all slaves [ 308.138200][ T8035] IPVS: ftp: loaded support on port[0] = 21 [ 308.174694][ T8033] chnl_net:caif_netlink_parms(): no params data found [ 308.212946][ T8033] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.220073][ T8033] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.228168][ T8033] device bridge_slave_0 entered promiscuous mode [ 308.235544][ T8033] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.242660][ T8033] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.250158][ T8033] device bridge_slave_1 entered promiscuous mode [ 308.269884][ T8033] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 308.280337][ T8033] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 308.302723][ T8033] team0: Port device team_slave_0 added [ 308.311870][ T8033] team0: Port device team_slave_1 added [ 308.373431][ T8033] device hsr_slave_0 entered promiscuous mode [ 308.411332][ T8033] device hsr_slave_1 entered promiscuous mode [ 308.463674][ T8035] chnl_net:caif_netlink_parms(): no params data found [ 308.498117][ T8035] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.505286][ T8035] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.513370][ T8035] device bridge_slave_0 entered promiscuous mode [ 308.521172][ T8035] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.528291][ T8035] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.536114][ T8035] device bridge_slave_1 entered promiscuous mode [ 308.701880][ T8033] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.708960][ T8033] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.716268][ T8033] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.723328][ T8033] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.737672][ T8035] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 308.748644][ T8035] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 308.768029][ T8035] team0: Port device team_slave_0 added [ 308.774743][ T8035] team0: Port device team_slave_1 added [ 308.833435][ T8035] device hsr_slave_0 entered promiscuous mode [ 308.873958][ T8035] device hsr_slave_1 entered promiscuous mode [ 308.921219][ T8035] debugfs: Directory 'hsr0' with parent '/' already present! [ 308.949286][ T8035] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.956368][ T8035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.963686][ T8035] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.970723][ T8035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.984694][ T8033] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.007878][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.016598][ T7625] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.024967][ T7625] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.036560][ T7625] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.045272][ T7625] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.064153][ T8033] 8021q: adding VLAN 0 to HW filter on device team0 [ 309.080809][ T8035] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.094462][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.106251][ T8035] 8021q: adding VLAN 0 to HW filter on device team0 [ 309.114996][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.141475][ T2970] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.148512][ T2970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.163557][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 309.172606][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.181506][ T7625] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.188537][ T7625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.196692][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 309.205282][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 309.213872][ T7625] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.220913][ T7625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.228608][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 309.250400][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 309.259450][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 309.268431][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 309.277672][ T7625] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.284801][ T7625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.292961][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 309.301560][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 309.310303][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 309.318864][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 309.327603][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 309.336568][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 309.346044][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 309.357825][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 309.368597][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 309.377569][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 309.385940][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.394612][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 309.405398][ T8033] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 309.416817][ T8033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 309.432380][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 309.440754][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 309.449769][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 309.459189][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 309.468164][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 309.476857][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.485219][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 309.493759][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 309.505438][ T8035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 309.523853][ T7631] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 309.532778][ T7631] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 309.542710][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 309.550326][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 309.562604][ T8035] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 309.573353][ T8033] 8021q: adding VLAN 0 to HW filter on device batadv0 09:13:15 executing program 1: 09:13:15 executing program 0: 09:13:15 executing program 4: 09:13:15 executing program 2: 09:13:15 executing program 5: clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 09:13:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) 09:13:15 executing program 5: clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 09:13:15 executing program 1: 09:13:15 executing program 2: 09:13:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) 09:13:15 executing program 0: 09:13:15 executing program 5: clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="0000000000480000000e000000000100"}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 09:13:15 executing program 1: 09:13:15 executing program 2: [ 311.431405][ T7671] device bridge_slave_1 left promiscuous mode [ 311.437636][ T7671] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.481501][ T7671] device bridge_slave_0 left promiscuous mode [ 311.487775][ T7671] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.231058][ T7671] device hsr_slave_0 left promiscuous mode [ 312.290998][ T7671] device hsr_slave_1 left promiscuous mode [ 312.347295][ T7671] team0 (unregistering): Port device team_slave_1 removed [ 312.358145][ T7671] team0 (unregistering): Port device team_slave_0 removed [ 312.368223][ T7671] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 312.404440][ T7671] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 312.483327][ T7671] bond0 (unregistering): Released all slaves [ 312.598126][ T8098] IPVS: ftp: loaded support on port[0] = 21 [ 312.657269][ T8098] chnl_net:caif_netlink_parms(): no params data found [ 312.682498][ T8098] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.689632][ T8098] bridge0: port 1(bridge_slave_0) entered disabled state [ 312.697373][ T8098] device bridge_slave_0 entered promiscuous mode [ 312.705048][ T8098] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.712330][ T8098] bridge0: port 2(bridge_slave_1) entered disabled state [ 312.720002][ T8098] device bridge_slave_1 entered promiscuous mode [ 312.773777][ T8098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 312.784686][ T8098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 312.803870][ T8098] team0: Port device team_slave_0 added [ 312.810686][ T8098] team0: Port device team_slave_1 added [ 312.863272][ T8098] device hsr_slave_0 entered promiscuous mode [ 312.911156][ T8098] device hsr_slave_1 entered promiscuous mode [ 312.960909][ T8098] debugfs: Directory 'hsr0' with parent '/' already present! [ 312.978054][ T8098] bridge0: port 2(bridge_slave_1) entered blocking state [ 312.985131][ T8098] bridge0: port 2(bridge_slave_1) entered forwarding state [ 312.992507][ T8098] bridge0: port 1(bridge_slave_0) entered blocking state [ 312.999545][ T8098] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.039659][ T8098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.055022][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 313.066677][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.075282][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.091865][ T8098] 8021q: adding VLAN 0 to HW filter on device team0 [ 313.105642][ T7631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 313.114384][ T7631] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.121483][ T7631] bridge0: port 1(bridge_slave_0) entered forwarding state [ 313.143863][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 313.153912][ T7625] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.161007][ T7625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 313.171440][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 313.180338][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 313.191611][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 313.203106][ T7625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 313.214318][ T8098] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 313.225728][ T8098] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 313.235417][ T2970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 313.259702][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 313.267509][ T7577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 313.280644][ T8098] 8021q: adding VLAN 0 to HW filter on device batadv0 09:13:19 executing program 4: 09:13:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) 09:13:19 executing program 5: clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="0000000000480000000e000000000100"}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 09:13:19 executing program 1: 09:13:19 executing program 2: 09:13:19 executing program 0: 09:13:19 executing program 1: 09:13:19 executing program 2: 09:13:19 executing program 0: 09:13:19 executing program 5: clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="0000000000480000000e000000000100"}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 09:13:19 executing program 4: 09:13:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) 09:13:19 executing program 5: clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1}, 0x2c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="0000000000480000000e000000000100"}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 09:13:19 executing program 1: 09:13:19 executing program 0: 09:13:19 executing program 2: 09:13:19 executing program 4: 09:13:19 executing program 5: clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1}, 0x2c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="0000000000480000000e000000000100"}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 09:13:19 executing program 0: creat(0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@updpolicy={0xfc, 0x19, 0xe31, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x44, 0x5, [{{}, 0x2, @in6=@rand_addr="c55f397f6ea6d2e72d8a8a2c91f94abf"}]}]}, 0xfc}, 0x8}, 0x0) 09:13:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) 09:13:19 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x968a5100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:13:19 executing program 2: sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="000800004ff34b823f6349e0e56ef9cb9d478f9cb39f02cc8b6cb9308f319501fef5fcfea4cc5378a692fd360fac24ec47f684bd218e459cab18b44476fe11d0871fb1db6a6d9abba969aee5a9dc2d0bb2bdaffde273c20c3c572ec068188fe6e3001e2856f11e537d800cac5c", @ANYRES16, @ANYBLOB="000127bd7000fddbdf251100000058000100080001000a000000080073cb7d95f9aadf3108e9c404004e2100000800060072720000fbff00000a00000014000300fe7a73c80242e097109a12f70225443dd08800000000000000efffffffff000108000bdbadb6cf036deb11b498fc25193b108449e62e6d0f99bcbf0a"], 0x3}}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x202000, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') ioctl$BLKRRPART(r1, 0x125f, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040)=@gcm_256={{0x30a}, "67078ee6d0e9ede4", "1506f57a909958040000000000000002ae050200", "27f2f660", "1ab5879cad08a656"}, 0xfffffffffffffee4) sendfile(0xffffffffffffffff, r1, 0x0, 0x320f) shutdown(0xffffffffffffffff, 0x0) getsockopt$packet_int(r0, 0x107, 0x0, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r3, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x660c, 0x0) perf_event_open(0x0, 0x0, 0x200000000000000a, r3, 0x6) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80, 0x1, @perf_bp={&(0x7f00000006c0), 0x2}, 0x28240}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) r6 = accept$inet6(r5, &(0x7f0000003b40)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000003b80)=0x1c) fcntl$notify(r6, 0x402, 0x9) setsockopt$inet_msfilter(r4, 0x0, 0x29, &(0x7f0000000a40)=ANY=[@ANYBLOB="7f000002010000000440000000000000"], 0x20) fstat(0xffffffffffffffff, &(0x7f0000001280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r7, 0x8941, &(0x7f0000000140)=@get={0x1, &(0x7f0000000580)=""/191, 0x8001}) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0xd) mkdir(&(0x7f0000000280)='./file0\x00', 0x80) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000880)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000840)={&(0x7f0000000640)=ANY=[@ANYBLOB="12023bdc", @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf250e00000008000500030000000800060056f300002c000100080004004e2000000c000700200000002000000014000300000000000000000000000000000000001800020014000100000000000000000000000000000000000800060006000000080006000000000008000600f7ffffff"], 0x80}, 0x1, 0x0, 0x0, 0x4014}, 0x14040404) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd7a, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x7, @perf_bp={&(0x7f0000000300), 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) openat$ptmx(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/ptmx\x00', 0x31a0cc2257b0a68b, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000500)={'\x99\x858\xd5te\x00\x00\x00\x00\x00\x00\xd5\xfd\xe6\x17\xd3\x92\x7f\xb7\xebs\x1f\x9az\x00', 0x0, 0x3, 0xde, [], 0x5, &(0x7f0000000a80)=[{}, {}, {}, {}, {}], &(0x7f0000000400)=""/222}, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') 09:13:19 executing program 4: 09:13:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) 09:13:20 executing program 4: 09:13:20 executing program 5: clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1}, 0x2c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="0000000000480000000e000000000100"}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 09:13:20 executing program 0: 09:13:20 executing program 1: 09:13:20 executing program 4: 09:13:20 executing program 0: 09:13:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="0000000000480000000e000000000100"}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 09:13:20 executing program 4: 09:13:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) 09:13:20 executing program 2: 09:13:20 executing program 0: 09:13:20 executing program 1: 09:13:20 executing program 4: 09:13:20 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="0000000000480000000e000000000100"}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 09:13:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) 09:13:20 executing program 1: 09:13:20 executing program 4: 09:13:21 executing program 0: 09:13:21 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) 09:13:21 executing program 1: 09:13:21 executing program 2: 09:13:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @rand_addr="0000000000480000000e000000000100"}, 0x1c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 315.592952][ T7592] ================================================================== [ 315.601117][ T7592] BUG: KCSAN: data-race in evict / insert_inode_locked [ 315.607955][ T7592] [ 315.610287][ T7592] write to 0xffff88812547aac8 of 8 bytes by task 8227 on cpu 0: [ 315.617943][ T7592] insert_inode_locked+0x2db/0x3b0 [ 315.623057][ T7592] __ext4_new_inode+0x17b2/0x2ec0 [ 315.628087][ T7592] ext4_symlink+0x30e/0x970 [ 315.632586][ T7592] vfs_symlink+0x218/0x310 [ 315.636995][ T7592] do_symlinkat+0x1a5/0x1e0 [ 315.641492][ T7592] __x64_sys_symlink+0x3f/0x50 [ 315.646254][ T7592] do_syscall_64+0xcc/0x370 [ 315.650762][ T7592] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.656642][ T7592] [ 315.658971][ T7592] read to 0xffff88812547aac8 of 8 bytes by task 7592 on cpu 1: [ 315.666736][ T7592] evict+0x2a0/0x410 [ 315.670637][ T7592] iput+0x371/0x4e0 [ 315.674448][ T7592] do_unlinkat+0x378/0x530 [ 315.678874][ T7592] __x64_sys_unlink+0x3b/0x50 [ 315.683562][ T7592] do_syscall_64+0xcc/0x370 [ 315.688065][ T7592] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.694293][ T7592] [ 315.696621][ T7592] Reported by Kernel Concurrency Sanitizer on: [ 315.702772][ T7592] CPU: 1 PID: 7592 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 315.710999][ T7592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.721047][ T7592] ================================================================== [ 315.729105][ T7592] Kernel panic - not syncing: panic_on_warn set ... [ 315.735700][ T7592] CPU: 1 PID: 7592 Comm: syz-executor.5 Not tainted 5.4.0-syzkaller #0 [ 315.743932][ T7592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.753983][ T7592] Call Trace: [ 315.757280][ T7592] dump_stack+0x11d/0x181 [ 315.761620][ T7592] panic+0x210/0x640 [ 315.765517][ T7592] ? vprintk_func+0x8d/0x140 [ 315.770118][ T7592] kcsan_report.cold+0xc/0xd [ 315.774721][ T7592] kcsan_setup_watchpoint+0x3fe/0x460 [ 315.780099][ T7592] __tsan_read8+0xc6/0x100 [ 315.784513][ T7592] evict+0x2a0/0x410 [ 315.788414][ T7592] iput+0x371/0x4e0 09:13:21 executing program 2: 09:13:21 executing program 1: 09:13:21 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) tkill(0x0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38010000100013070000000000000000fe8000000000000000000000000000000000000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480001006d64350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001b00"/240], 0x138}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 09:13:21 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0xe2, 0x0, 0x0, 0xff}) 09:13:21 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x4ffe0, 0x0) [ 315.792233][ T7592] ? ext4_sync_fs+0x470/0x470 [ 315.796922][ T7592] do_unlinkat+0x378/0x530 [ 315.801346][ T7592] __x64_sys_unlink+0x3b/0x50 [ 315.806028][ T7592] do_syscall_64+0xcc/0x370 [ 315.810541][ T7592] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 315.816429][ T7592] RIP: 0033:0x45a447 [ 315.820327][ T7592] Code: 00 66 90 b8 58 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 57 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.839943][ T7592] RSP: 002b:00007ffff9d9e408 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 315.849231][ T7592] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000045a447 [ 315.857378][ T7592] RDX: 00007ffff9d9e420 RSI: 00007ffff9d9e420 RDI: 00007ffff9d9e4b0 [ 315.865349][ T7592] RBP: 000000000000004a R08: 0000000000000000 R09: 000000000000000b [ 315.873319][ T7592] R10: 0000000000000006 R11: 0000000000000246 R12: 00007ffff9d9f540 [ 315.881288][ T7592] R13: 00000000028c8940 R14: 0000000000000000 R15: 00007ffff9d9f540 [ 315.890878][ T7592] Kernel Offset: disabled [ 315.895207][ T7592] Rebooting in 86400 seconds..