[info] Using makefile-style concurrent boot in runlevel 2. [ 41.550946][ T26] audit: type=1800 audit(1575400063.400:21): pid=7330 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 41.600904][ T26] audit: type=1800 audit(1575400063.400:22): pid=7330 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.25' (ECDSA) to the list of known hosts. 2019/12/03 19:07:54 fuzzer started 2019/12/03 19:07:56 dialing manager at 10.128.0.105:44523 2019/12/03 19:07:56 syscalls: 2684 2019/12/03 19:07:56 code coverage: enabled 2019/12/03 19:07:56 comparison tracing: enabled 2019/12/03 19:07:56 extra coverage: extra coverage is not supported by the kernel 2019/12/03 19:07:56 setuid sandbox: enabled 2019/12/03 19:07:56 namespace sandbox: enabled 2019/12/03 19:07:56 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/03 19:07:56 fault injection: enabled 2019/12/03 19:07:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/03 19:07:56 net packet injection: enabled 2019/12/03 19:07:56 net device setup: enabled 2019/12/03 19:07:56 concurrency sanitizer: enabled 2019/12/03 19:07:56 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/12/03 19:07:57 adding functions to KCSAN blacklist: 'do_nanosleep' 'dccp_fin' 'generic_fillattr' 'tomoyo_supervisor' '__hrtimer_run_queues' 19:07:59 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)) getegid() lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f00000005c0)) socketpair$unix(0x1, 0x5, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) readlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000500)=""/191, 0xbf) keyctl$chown(0x4, 0x0, 0x0, r0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) clock_gettime(0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) syz_open_dev$mice(0x0, 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, 0x0, 0x4000080) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(0x0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "e5bb395f55c063cd645af21b63c76d9d"}, 0x11, 0x1c48963f684a34b5) unshare(0x60020000) 19:07:59 executing program 1: sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRESHEX, @ANYBLOB="fec27f221c4d3b8a720bf1a1f6d0ead1956fc9b04f7a4bf811a963cf7ba6605c90c1725e57382ca82d507412f0ddb9aede196ba23b2011b7ec30f61748a922a44b775071fc2b6138a0ae5d"]]], 0x1}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) syzkaller login: [ 57.941292][ T7499] IPVS: ftp: loaded support on port[0] = 21 [ 58.039497][ T7499] chnl_net:caif_netlink_parms(): no params data found [ 58.065224][ T7502] IPVS: ftp: loaded support on port[0] = 21 [ 58.105621][ T7499] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.112965][ T7499] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.121500][ T7499] device bridge_slave_0 entered promiscuous mode [ 58.135366][ T7499] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.142410][ T7499] bridge0: port 2(bridge_slave_1) entered disabled state 19:08:00 executing program 2: r0 = socket$nl_generic(0x2, 0x3, 0x10) getsockopt(r0, 0xff, 0x0, 0x0, 0x0) [ 58.150686][ T7499] device bridge_slave_1 entered promiscuous mode [ 58.191668][ T7499] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.210435][ T7502] chnl_net:caif_netlink_parms(): no params data found [ 58.220163][ T7499] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.256360][ T7499] team0: Port device team_slave_0 added [ 58.262978][ T7499] team0: Port device team_slave_1 added [ 58.273752][ T7502] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.281326][ T7502] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.289571][ T7502] device bridge_slave_0 entered promiscuous mode [ 58.306973][ T7502] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.314127][ T7502] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.322496][ T7502] device bridge_slave_1 entered promiscuous mode [ 58.376515][ T7499] device hsr_slave_0 entered promiscuous mode [ 58.404556][ T7499] device hsr_slave_1 entered promiscuous mode 19:08:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb410600bbed81c1891db25757e506509c0e84024f4b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec12b3a6d4024f87af235716ed0be9fb9042387"], 0x5) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) openat$tun(0xffffffffffffff9c, 0x0, 0x1e9cb2d8372b3286, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r3, 0x1800000000000060, 0xe80, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa29a16f291d36a48e93100ffff08", 0x0, 0x100, 0xf2ffffff}, 0x28) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x18201) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000140)=0x44) [ 58.537312][ T7506] IPVS: ftp: loaded support on port[0] = 21 [ 58.545133][ T7502] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 58.598853][ T7502] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 58.670163][ T7499] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.677287][ T7499] bridge0: port 2(bridge_slave_1) entered forwarding state [ 58.684574][ T7499] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.691607][ T7499] bridge0: port 1(bridge_slave_0) entered forwarding state [ 58.836473][ T7502] team0: Port device team_slave_0 added [ 58.851249][ T7502] team0: Port device team_slave_1 added [ 58.946957][ T7502] device hsr_slave_0 entered promiscuous mode [ 58.964589][ T7502] device hsr_slave_1 entered promiscuous mode [ 58.994223][ T7502] debugfs: Directory 'hsr0' with parent '/' already present! [ 59.011599][ T7499] 8021q: adding VLAN 0 to HW filter on device bond0 [ 59.021642][ T7531] IPVS: ftp: loaded support on port[0] = 21 [ 59.071805][ T7503] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.125398][ T7503] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.146637][ T7503] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 59.249682][ T7499] 8021q: adding VLAN 0 to HW filter on device team0 [ 59.275428][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 59.283207][ T3017] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 19:08:01 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) r3 = socket$unix(0x1, 0x5, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x18, 0x1, 0x1, [r3]}}], 0x18}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000003040), 0x3fffffffffffff1, 0x0) [ 59.358629][ T7506] chnl_net:caif_netlink_parms(): no params data found [ 59.439336][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 59.457609][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 59.532441][ T7534] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.539641][ T7534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.646142][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.705814][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 59.765727][ T7534] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.772803][ T7534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.834879][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.895331][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 59.943176][ T7499] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 60.024770][ T7499] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 60.103290][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 60.113306][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 60.165460][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 60.215701][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 60.265330][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 60.315867][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 60.365482][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 60.407939][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 60.470056][ T7556] IPVS: ftp: loaded support on port[0] = 21 [ 60.513351][ T7499] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 60.538777][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 19:08:02 executing program 5: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) userfaultfd(0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 60.556799][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 60.575897][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 60.583315][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 60.682139][ T7506] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.695815][ T7506] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.724557][ T7506] device bridge_slave_0 entered promiscuous mode [ 60.760143][ T7502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 60.782296][ T7506] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.796701][ T7506] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.816356][ T7506] device bridge_slave_1 entered promiscuous mode [ 60.843266][ T7502] 8021q: adding VLAN 0 to HW filter on device team0 [ 60.881692][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 60.890799][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 60.926769][ T7531] chnl_net:caif_netlink_parms(): no params data found [ 60.999910][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.015982][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.055972][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.063056][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 61.117457][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 61.137730][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 61.146223][ T7579] IPVS: ftp: loaded support on port[0] = 21 [ 61.185178][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.192315][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 61.202320][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.211584][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.232939][ T7506] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.269292][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 61.277254][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.286763][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.295583][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.304589][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.313167][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 61.321521][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 61.329810][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 61.340435][ T7506] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 61.376809][ T7531] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.383920][ T7531] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.391624][ T7531] device bridge_slave_0 entered promiscuous mode [ 61.403037][ T7574] IPVS: ftp: loaded support on port[0] = 21 [ 61.405288][ T7502] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 61.420492][ T7502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 61.428481][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 61.437013][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 61.458662][ T7531] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.465832][ T7531] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.473335][ T7531] device bridge_slave_1 entered promiscuous mode [ 61.480936][ T7506] team0: Port device team_slave_0 added [ 61.487483][ T7506] team0: Port device team_slave_1 added [ 61.498417][ T7556] chnl_net:caif_netlink_parms(): no params data found [ 61.538561][ T7531] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.553566][ T7531] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 19:08:03 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)) getegid() lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f00000005c0)) socketpair$unix(0x1, 0x5, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) readlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000500)=""/191, 0xbf) keyctl$chown(0x4, 0x0, 0x0, r0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) clock_gettime(0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) syz_open_dev$mice(0x0, 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, 0x0, 0x4000080) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(0x0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "e5bb395f55c063cd645af21b63c76d9d"}, 0x11, 0x1c48963f684a34b5) unshare(0x60020000) [ 61.644368][ T7506] device hsr_slave_0 entered promiscuous mode [ 61.646336][ T7590] IPVS: ftp: loaded support on port[0] = 21 [ 61.666486][ T7506] device hsr_slave_1 entered promiscuous mode [ 61.694239][ T7506] debugfs: Directory 'hsr0' with parent '/' already present! [ 61.710646][ T7531] team0: Port device team_slave_0 added [ 61.739223][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 61.746676][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 61.755599][ T7531] team0: Port device team_slave_1 added [ 61.782932][ T7502] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 61.805275][ T7556] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.815790][ T7556] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.831715][ T7556] device bridge_slave_0 entered promiscuous mode [ 61.851069][ T7556] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.881991][ T7556] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.908169][ T7556] device bridge_slave_1 entered promiscuous mode [ 62.066458][ T7531] device hsr_slave_0 entered promiscuous mode [ 62.094568][ T7531] device hsr_slave_1 entered promiscuous mode [ 62.124408][ T7531] debugfs: Directory 'hsr0' with parent '/' already present! [ 62.190786][ T7556] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.215569][ T7574] chnl_net:caif_netlink_parms(): no params data found [ 62.262483][ T7556] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.314197][ C0] hrtimer: interrupt took 28787 ns [ 62.332571][ T7506] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.393963][ T7556] team0: Port device team_slave_0 added [ 62.454008][ T7556] team0: Port device team_slave_1 added [ 62.491281][ T7506] 8021q: adding VLAN 0 to HW filter on device team0 19:08:04 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)) getegid() lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f00000005c0)) socketpair$unix(0x1, 0x5, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) readlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000500)=""/191, 0xbf) keyctl$chown(0x4, 0x0, 0x0, r0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) clock_gettime(0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) syz_open_dev$mice(0x0, 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, 0x0, 0x4000080) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(0x0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "e5bb395f55c063cd645af21b63c76d9d"}, 0x11, 0x1c48963f684a34b5) unshare(0x60020000) [ 62.558148][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 62.577716][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.702898][ T7622] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 62.774591][ T7574] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.781657][ T7574] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.807116][ T7622] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps block group descriptors [ 62.849515][ T7574] device bridge_slave_0 entered promiscuous mode [ 62.899800][ T7622] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 62.899872][ T7646] IPVS: ftp: loaded support on port[0] = 21 [ 62.934276][ T7622] EXT4-fs (loop1): mount failed [ 62.967469][ T7556] device hsr_slave_0 entered promiscuous mode [ 62.985703][ T7556] device hsr_slave_1 entered promiscuous mode [ 63.084249][ T7556] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.121195][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.141994][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 19:08:05 executing program 1: sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRESHEX, @ANYBLOB="fec27f221c4d3b8a720bf1a1f6d0ead1956fc9b04f7a4bf811a963cf7ba6605c90c1725e57382ca82d507412f0ddb9aede196ba23b2011b7ec30f61748a922a44b775071fc2b6138a0ae5d"]]], 0x1}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) [ 63.197111][ T7534] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.204279][ T7534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 63.290016][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.333740][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.378453][ T7534] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.385626][ T7534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 63.437964][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.469861][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.520609][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.529395][ T7653] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 63.579531][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.597735][ T7653] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps block group descriptors [ 63.642598][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.681997][ T7653] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 63.700348][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.720465][ T7653] EXT4-fs (loop1): mount failed [ 63.792934][ T7531] 8021q: adding VLAN 0 to HW filter on device bond0 [ 63.812999][ T7574] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.823503][ T7574] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.860365][ T7574] device bridge_slave_1 entered promiscuous mode 19:08:05 executing program 1: sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRESHEX, @ANYBLOB="fec27f221c4d3b8a720bf1a1f6d0ead1956fc9b04f7a4bf811a963cf7ba6605c90c1725e57382ca82d507412f0ddb9aede196ba23b2011b7ec30f61748a922a44b775071fc2b6138a0ae5d"]]], 0x1}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) [ 64.065277][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.073266][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.185058][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 64.244698][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 64.257008][ T7506] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 64.314927][ T7506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 64.417647][ T7574] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.429355][ T7671] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 64.498779][ T7671] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps block group descriptors [ 64.553880][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 64.584810][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 64.593135][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.637152][ T7671] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 64.682871][ T7671] EXT4-fs (loop1): mount failed [ 64.714779][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.806865][ T7531] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.841742][ T7506] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 64.906009][ T7574] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 65.032839][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 65.042424][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 19:08:06 executing program 1: sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRESHEX, @ANYBLOB="fec27f221c4d3b8a720bf1a1f6d0ead1956fc9b04f7a4bf811a963cf7ba6605c90c1725e57382ca82d507412f0ddb9aede196ba23b2011b7ec30f61748a922a44b775071fc2b6138a0ae5d"]]], 0x1}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) [ 65.097336][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.164694][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.173034][ T7557] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.180090][ T7557] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.344844][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.353587][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.433974][ T7699] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 65.437318][ T7557] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.450846][ T7557] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.521332][ T7699] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps block group descriptors [ 65.591091][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.618742][ T7699] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 65.650280][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.651139][ T7699] EXT4-fs (loop1): mount failed [ 65.719984][ T7574] team0: Port device team_slave_0 added [ 65.769142][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.796144][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.825228][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.851633][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 19:08:07 executing program 1: stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)) getegid() lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f00000005c0)) socketpair$unix(0x1, 0x5, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) readlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000500)=""/191, 0xbf) keyctl$chown(0x4, 0x0, 0x0, r0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) clock_gettime(0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) syz_open_dev$mice(0x0, 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, 0x0, 0x4000080) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(0x0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "e5bb395f55c063cd645af21b63c76d9d"}, 0x11, 0x1c48963f684a34b5) unshare(0x60020000) [ 65.898795][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.928419][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 65.998670][ T7531] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 66.044674][ T7531] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 66.081248][ T7574] team0: Port device team_slave_1 added [ 66.090959][ T7556] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.103103][ T7719] IPVS: ftp: loaded support on port[0] = 21 [ 66.148339][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.160298][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.187349][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.218054][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.293614][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.310662][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.341041][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.371543][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.408741][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.447215][ T7531] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.465860][ T7556] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.516372][ T7574] device hsr_slave_0 entered promiscuous mode [ 66.555916][ T7574] device hsr_slave_1 entered promiscuous mode 19:08:08 executing program 2: r0 = socket$nl_generic(0x2, 0x3, 0x10) getsockopt(r0, 0xff, 0x0, 0x0, 0x0) [ 66.616089][ T7574] debugfs: Directory 'hsr0' with parent '/' already present! [ 66.680992][ T7503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.700609][ T7503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.735752][ T7503] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.742829][ T7503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.769399][ T7503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.778176][ T7503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 19:08:08 executing program 2: r0 = socket$nl_generic(0x2, 0x3, 0x10) getsockopt(r0, 0xff, 0x0, 0x0, 0x0) [ 66.788224][ T7503] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.795297][ T7503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.825096][ T7503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.852416][ T7503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 19:08:08 executing program 2: r0 = socket$nl_generic(0x2, 0x3, 0x10) getsockopt(r0, 0xff, 0x0, 0x0, 0x0) [ 66.922101][ T7556] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 66.949024][ T7556] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 66.985906][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.997171][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.032284][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.057776][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.087315][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.112036][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.133859][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.154999][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.172103][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.237290][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.256780][ T7530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.289783][ T7556] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.356769][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 67.369773][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 67.526901][ T7574] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.577375][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.595061][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.645352][ T7574] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.672765][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.683039][ T7534] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.759001][ T7534] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.766226][ T7534] bridge0: port 1(bridge_slave_0) entered forwarding state 19:08:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb410600bbed81c1891db25757e506509c0e84024f4b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec12b3a6d4024f87af235716ed0be9fb9042387"], 0x5) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) openat$tun(0xffffffffffffff9c, 0x0, 0x1e9cb2d8372b3286, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r3, 0x1800000000000060, 0xe80, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa29a16f291d36a48e93100ffff08", 0x0, 0x100, 0xf2ffffff}, 0x28) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x18201) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000140)=0x44) [ 67.883646][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.907687][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 19:08:09 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) r3 = socket$unix(0x1, 0x5, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x18, 0x1, 0x1, [r3]}}], 0x18}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000003040), 0x3fffffffffffff1, 0x0) [ 67.972099][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 68.014557][ T7557] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.021622][ T7557] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.094958][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 68.122557][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 68.175204][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 68.207151][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.255165][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.288009][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.315742][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.354944][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.390485][ T7574] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 68.412175][ T7574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 68.447051][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 68.472483][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.519252][ T7650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.654575][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 68.662126][ T7557] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 68.708351][ T7574] 8021q: adding VLAN 0 to HW filter on device batadv0 19:08:11 executing program 5: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) userfaultfd(0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:08:11 executing program 2: stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)) getegid() lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f00000005c0)) socketpair$unix(0x1, 0x5, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) readlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000500)=""/191, 0xbf) keyctl$chown(0x4, 0x0, 0x0, r0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) clock_gettime(0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) syz_open_dev$mice(0x0, 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, 0x0, 0x4000080) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(0x0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "e5bb395f55c063cd645af21b63c76d9d"}, 0x11, 0x1c48963f684a34b5) unshare(0x60020000) 19:08:11 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)) getegid() lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f00000005c0)) socketpair$unix(0x1, 0x5, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) readlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000500)=""/191, 0xbf) keyctl$chown(0x4, 0x0, 0x0, r0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) clock_gettime(0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) syz_open_dev$mice(0x0, 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, 0x0, 0x4000080) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(0x0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "e5bb395f55c063cd645af21b63c76d9d"}, 0x11, 0x1c48963f684a34b5) unshare(0x60020000) 19:08:11 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) r3 = socket$unix(0x1, 0x5, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x18, 0x1, 0x1, [r3]}}], 0x18}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000003040), 0x3fffffffffffff1, 0x0) 19:08:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb410600bbed81c1891db25757e506509c0e84024f4b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec12b3a6d4024f87af235716ed0be9fb9042387"], 0x5) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) openat$tun(0xffffffffffffff9c, 0x0, 0x1e9cb2d8372b3286, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r3, 0x1800000000000060, 0xe80, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa29a16f291d36a48e93100ffff08", 0x0, 0x100, 0xf2ffffff}, 0x28) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x18201) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000140)=0x44) 19:08:11 executing program 1: stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)) getegid() lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f00000005c0)) socketpair$unix(0x1, 0x5, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) readlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000500)=""/191, 0xbf) keyctl$chown(0x4, 0x0, 0x0, r0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) clock_gettime(0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) syz_open_dev$mice(0x0, 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, 0x0, 0x4000080) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(0x0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "e5bb395f55c063cd645af21b63c76d9d"}, 0x11, 0x1c48963f684a34b5) unshare(0x60020000) [ 69.990567][ T7825] IPVS: ftp: loaded support on port[0] = 21 [ 70.004076][ T7827] IPVS: ftp: loaded support on port[0] = 21 [ 70.019594][ T7823] IPVS: ftp: loaded support on port[0] = 21 19:08:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb410600bbed81c1891db25757e506509c0e84024f4b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec12b3a6d4024f87af235716ed0be9fb9042387"], 0x5) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) openat$tun(0xffffffffffffff9c, 0x0, 0x1e9cb2d8372b3286, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r3, 0x1800000000000060, 0xe80, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa29a16f291d36a48e93100ffff08", 0x0, 0x100, 0xf2ffffff}, 0x28) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x18201) getsockopt$ARPT_SO_GET_INFO(r4, 0x0, 0x60, &(0x7f0000000080)={'filter\x00'}, &(0x7f0000000140)=0x44) 19:08:12 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) r3 = socket$unix(0x1, 0x5, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003f40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x18, 0x1, 0x1, [r3]}}], 0x18}], 0x1, 0x0) sendmmsg(r1, &(0x7f0000003040), 0x3fffffffffffff1, 0x0) 19:08:12 executing program 1: stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)) getegid() lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f00000005c0)) socketpair$unix(0x1, 0x5, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) readlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000500)=""/191, 0xbf) keyctl$chown(0x4, 0x0, 0x0, r0) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) clock_gettime(0x0, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) syz_open_dev$mice(0x0, 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, 0x0, 0x4000080) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) openat$vimc0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_evm(0x0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "e5bb395f55c063cd645af21b63c76d9d"}, 0x11, 0x1c48963f684a34b5) unshare(0x60020000) 19:08:12 executing program 0: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) userfaultfd(0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:08:12 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) userfaultfd(0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 19:08:12 executing program 4: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) userfaultfd(0x0) socket$inet_udplite(0x2, 0x2, 0x88) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 70.590557][ T7844] IPVS: ftp: loaded support on port[0] = 21 [ 70.655243][ T7841] ================================================================== [ 70.663389][ T7841] BUG: KCSAN: data-race in pipe_poll / pipe_write [ 70.669795][ T7841] [ 70.672135][ T7841] read to 0xffff8881028a54b8 of 4 bytes by task 7846 on cpu 1: [ 70.679686][ T7841] pipe_poll+0x84/0x1d0 [ 70.683848][ T7841] do_select+0x7d0/0x1020 [ 70.688178][ T7841] core_sys_select+0x381/0x550 [ 70.692951][ T7841] do_pselect.constprop.0+0x11d/0x160 [ 70.698333][ T7841] __x64_sys_pselect6+0x12e/0x170 [ 70.703362][ T7841] do_syscall_64+0xcc/0x370 [ 70.707873][ T7841] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 70.713756][ T7841] [ 70.716090][ T7841] write to 0xffff8881028a54b8 of 4 bytes by task 7841 on cpu 0: [ 70.723718][ T7841] pipe_write+0x268/0x970 [ 70.728051][ T7841] new_sync_write+0x388/0x4a0 [ 70.732735][ T7841] __vfs_write+0xb1/0xc0 [ 70.736975][ T7841] vfs_write+0x18a/0x390 [ 70.741214][ T7841] ksys_write+0xd5/0x1b0 [ 70.745455][ T7841] __x64_sys_write+0x4c/0x60 [ 70.750045][ T7841] do_syscall_64+0xcc/0x370 [ 70.754563][ T7841] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 70.760446][ T7841] [ 70.762773][ T7841] Reported by Kernel Concurrency Sanitizer on: [ 70.768928][ T7841] CPU: 0 PID: 7841 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 70.777168][ T7841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.787230][ T7841] ================================================================== [ 70.795296][ T7841] Kernel panic - not syncing: panic_on_warn set ... [ 70.801897][ T7841] CPU: 0 PID: 7841 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 70.810136][ T7841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 70.820193][ T7841] Call Trace: [ 70.823497][ T7841] dump_stack+0x11d/0x181 [ 70.827842][ T7841] panic+0x210/0x640 [ 70.831759][ T7841] ? vprintk_func+0x8d/0x140 [ 70.836364][ T7841] kcsan_report.cold+0xc/0xd [ 70.840966][ T7841] kcsan_setup_watchpoint+0x3fe/0x460 [ 70.846350][ T7841] __tsan_unaligned_write4+0xc4/0x100 [ 70.851729][ T7841] pipe_write+0x268/0x970 [ 70.856082][ T7841] new_sync_write+0x388/0x4a0 [ 70.860780][ T7841] __vfs_write+0xb1/0xc0 [ 70.865031][ T7841] vfs_write+0x18a/0x390 [ 70.869287][ T7841] ksys_write+0xd5/0x1b0 [ 70.873541][ T7841] __x64_sys_write+0x4c/0x60 [ 70.878136][ T7841] do_syscall_64+0xcc/0x370 [ 70.882623][ T7841] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 70.888492][ T7841] RIP: 0033:0x45a679 [ 70.892372][ T7841] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 70.911956][ T7841] RSP: 002b:00007ff9271a6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 70.920381][ T7841] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 70.928341][ T7841] RDX: 0000000041395527 RSI: 0000000020000340 RDI: 0000000000000004 [ 70.936311][ T7841] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 70.944270][ T7841] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff9271a76d4 [ 70.952230][ T7841] R13: 00000000004c7969 R14: 00000000004e4950 R15: 00000000ffffffff [ 70.961415][ T7841] Kernel Offset: disabled [ 70.965783][ T7841] Rebooting in 86400 seconds..