Warning: Permanently added '10.128.1.32' (ECDSA) to the list of known hosts. 2019/11/04 06:41:03 fuzzer started 2019/11/04 06:41:05 dialing manager at 10.128.0.105:42255 2019/11/04 06:41:05 syscalls: 2553 2019/11/04 06:41:05 code coverage: enabled 2019/11/04 06:41:05 comparison tracing: enabled 2019/11/04 06:41:05 extra coverage: extra coverage is not supported by the kernel 2019/11/04 06:41:05 setuid sandbox: enabled 2019/11/04 06:41:05 namespace sandbox: enabled 2019/11/04 06:41:05 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/04 06:41:05 fault injection: enabled 2019/11/04 06:41:05 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/04 06:41:05 net packet injection: enabled 2019/11/04 06:41:05 net device setup: enabled 2019/11/04 06:41:05 concurrency sanitizer: enabled 2019/11/04 06:41:05 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 69.083718][ T7266] KCSAN: could not find function: 'poll_schedule_timeout' 2019/11/04 06:41:29 adding functions to KCSAN blacklist: 'wbt_issue' '__mark_inode_dirty' 'task_dump_owner' 'p9_poll_workfn' 'ext4_da_write_end' 'tcp_chrono_stop' '__remove_hrtimer' 'audit_log_start' 'vm_area_dup' 'file_update_time' 'ext4_mb_good_group' 'ext4_mark_iloc_dirty' 'mem_cgroup_protected' 'rcu_gp_fqs_loop' '__dev_queue_xmit' 'shmem_add_to_page_cache' 'install_new_memslots' 'ext4_writepages' 'inode_permission' 'tomoyo_supervisor' 'blk_mq_sched_dispatch_requests' 'xas_clear_mark' 'copy_process' 'kvm_arch_vcpu_load' 'timer_clear_idle' 'blk_mq_get_request' 'list_lru_count_one' 'packet_do_bind' 'do_syslog' 'pipe_wait' 'find_get_pages_range_tag' 'add_timer' '__delete_from_page_cache' 'n_tty_receive_buf_common' 'ktime_get_seconds' 'ep_poll' 'do_signal_stop' 'pcpu_alloc' 'vti_tunnel_xmit' 'get_wchan' 'inet_putpeer' 'generic_permission' 'ext4_nonda_switch' 'mod_timer' 'fasync_remove_entry' 'pid_update_inode' 'tick_nohz_idle_stop_tick' 'blk_mq_run_hw_queue' 'icmp_global_allow' 'ext4_has_free_clusters' '__hrtimer_run_queues' '__splice_from_pipe' '__nf_ct_refresh_acct' 'osq_lock' 'update_defense_level' 'page_counter_try_charge' 'sit_tunnel_xmit' '__skb_recv_udp' 'skb_dequeue' 'pvclock_gtod_notify' '__nf_conntrack_find_get' 'taskstats_exit' 'snapshot_refaults' 'kauditd_thread' 'pipe_poll' '__snd_rawmidi_transmit_ack' 'generic_write_end' 'tick_sched_do_timer' 'generic_fillattr' 'find_next_bit' 'dd_has_work' 'echo_char' 'lookup_fast' 'tcp_poll' 'udp_set_dev_scratch' 'ip_finish_output2' 'xprt_clear_locked' '__writeback_single_inode' 'do_dentry_open' 'blk_mq_dispatch_rq_list' 'ext4_xattr_get' 'mm_update_next_owner' 'tick_do_update_jiffies64' 'ext4_free_inodes_count' 'fsnotify' '__skb_wait_for_more_packets' 'do_exit' 'mem_cgroup_select_victim_node' 'handle_mm_fault' 'ktime_get_real_seconds' '__tcp_select_window' 'ext4_es_lookup_extent' 'process_srcu' '__alloc_file' 'blk_stat_add' 'do_nanosleep' '__ext4_new_inode' 'yama_ptracer_del' 'ext4_free_inode' 'tcp_add_backlog' 'run_timer_softirq' 'poll_schedule_timeout' 'inet6_csk_route_socket' 'rcu_gp_fqs_check_wake' 'snd_seq_prioq_cell_out' 'xas_find_marked' 'datagram_poll' 06:46:02 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x7, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x8, 0x3}, 0x0, 0x0, &(0x7f0000000080)={0x1, 0xb, 0x3f, 0xff}, &(0x7f00000000c0)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x7}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r0, 0x4) r2 = io_uring_setup(0x1ca, &(0x7f0000000280)={0x0, 0x0, 0x410c078e38f48a3b, 0x2, 0x282}) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4afd25d93b50a2bc, 0x150, r2, 0x10000000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) getsockopt$inet_dccp_buf(r3, 0x21, 0x2, &(0x7f0000000340)=""/4096, &(0x7f0000001340)=0x1000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001380)=0x0) ptrace$poke(0x4, r4, &(0x7f00000013c0), 0x8) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001400)='/proc/self/net/pfkey\x00', 0x24080, 0x0) ioctl$CAPI_REGISTER(r5, 0x400c4301, &(0x7f0000001440)={0x3, 0x2, 0x8000}) socketpair(0xa, 0x0, 0x9, &(0x7f0000001480)) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000014c0)={0xc0, 0x9, 0x6, "a7288ba04ef411aba2d5973463074620f063c55cceb2e523a91c2a5222c7567d179c7f14bf81a01a67073e16c4a20ed565bf2ed2180298eee0ec3db6e6e580b961b67f635006f10f7d8fdb80b12a58c775d764536b157391aab042e4938c20871b2aaa147ee212e4ddbcdedd2ec766cab771255ac98963f2b36654353c9ca285b4f4eb0c8a9268720f519c6ee5c814fd974bd189bdc8adea0456bf4f8b0dfbd570802ddc17cbe660a5fd490d632f64c8ddfea7ec2dd7a30a7da914fb5b266c49"}) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r6, 0xc0f85403, &(0x7f0000001600)={{0xffffffffffffffff, 0x1, 0x400, 0x5b6c15474f6e33b7, 0x4}, 0xfffff800, 0x20, 'id0\x00', 'timer1\x00', 0x0, 0x5, 0x8, 0x0, 0xd7a2}) removexattr(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)=@random={'trusted.', '\x00'}) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001780)='/dev/dlm-control\x00', 0x8c000, 0x0) ioctl$BLKTRACESTART(r7, 0x1274, 0x0) r8 = open_tree(r7, &(0x7f00000017c0)='./file1\x00', 0x800) ioctl$FS_IOC_SETFSLABEL(r8, 0x41009432, &(0x7f0000001800)="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") pipe2(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$IMGETVERSION(r9, 0x80044942, &(0x7f0000001940)) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001980)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$KVM_GET_XSAVE(r10, 0x9000aea4, &(0x7f00000019c0)) accept(0xffffffffffffffff, 0x0, &(0x7f0000001dc0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000001e00)={'icmp\x00'}, &(0x7f0000001e40)=0x1e) openat$ashmem(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/ashmem\x00', 0x8000, 0x0) getsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000001ec0)=""/244, &(0x7f0000001fc0)=0xf4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002000)='./cgroup/syz1\x00', 0x1ff) ioctl$ASHMEM_GET_NAME(r9, 0x81007702, &(0x7f0000002040)=""/252) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000002140)=""/222) 06:46:02 executing program 1: eventfd2(0x4, 0x801) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x440800, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}}}, &(0x7f0000000140)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000180)={@mcast2, r1}, 0x14) r2 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet6_dccp_int(r2, 0x21, 0x6, &(0x7f0000000200), &(0x7f0000000240)=0x4) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x700f00, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f00000002c0)={0x400, 0x8, 0x4, 0x40000, {}, {0x3, 0x0, 0x5, 0x1f, 0x8, 0x3f, "59169eb0"}, 0xfffff800, 0x1, @fd, 0x4}) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x80000, 0x0) ioctl$CAPI_REGISTER(r4, 0x400c4301, &(0x7f0000000380)={0x4, 0x7b, 0x6}) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vhost-vsock\x00', 0x2, 0x0) dup3(r2, r5, 0x80000) getsockopt$bt_hci(r4, 0x0, 0x1, &(0x7f0000000400)=""/18, &(0x7f0000000440)=0x12) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) ptrace$setopts(0x4200, r6, 0x2, 0x3) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vsock\x00', 0x440000, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000500)={0x0, 0x80000, r4}) ioctl$DRM_IOCTL_GEM_CLOSE(r7, 0x40086409, &(0x7f0000000540)={r8}) r9 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000580)='/dev/btrfs-control\x00', 0x200901, 0x0) getsockopt$inet6_buf(r9, 0x29, 0x1b, &(0x7f00000005c0)=""/176, &(0x7f0000000680)=0xb0) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000006c0)={0xffffffffffffffff}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r10, 0xc0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x10001, 0x0, 0x0, 0x0, &(0x7f0000000740)={0x1, 0x5}, 0x0, 0x0, &(0x7f0000000780)={0x5, 0x5, 0x79c, 0x3}, &(0x7f00000007c0)=0x9, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=0x5}}, 0x10) r11 = syz_open_dev$dmmidi(&(0x7f0000000940)='/dev/dmmidi#\x00', 0x7fffffff, 0x101000) fcntl$setlease(r11, 0x400, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xd, &(0x7f0000000980)=@raw=[@map={0x18, 0x6}, @map={0x18, 0x7, 0x1, 0x0, 0x1}, @alu={0x58a575f86ed1967, 0x0, 0x9, 0x1, 0x6, 0x80, 0xfffffffffffffffc}, @jmp={0x5, 0x0, 0x2042721152477764, 0x8, 0x1, 0x0, 0x8}, @alu={0x4, 0x0, 0xe, 0xa, 0x4, 0x7, 0x4}, @ldst={0x3, 0x3, 0x3, 0x9, 0x5, 0xfffffffffffffffe, 0x10}, @exit, @call={0x85, 0x0, 0x0, 0x19}, @alu={0x7, 0x1, 0x6, 0x0, 0x5, 0xfffffffffffffff0, 0xfffffffffffffff1}, @map={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000a00)='GPL\x00', 0x8, 0x0, &(0x7f0000000a40), 0x41100, 0x1, [], 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f0000000a80)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000ac0)={0x0, 0xa, 0xffffff17, 0x7fff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000d80)={r12, 0xc0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=0xf3, 0x0, 0x0, 0x0, &(0x7f0000000bc0)={0x6, 0x1}, 0x0, 0x0, &(0x7f0000000c00)={0x3, 0x4, 0x7f, 0x7}, &(0x7f0000000c40)=0x3f, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80)=0x6}}, 0x10) r13 = socket$l2tp(0x18, 0x1, 0x1) fdatasync(r13) r14 = socket$inet6(0xa, 0x3, 0x3) getsockopt$inet6_mtu(r14, 0x29, 0x17, &(0x7f0000000dc0), &(0x7f0000000e00)=0x4) [ 344.741384][ T7271] IPVS: ftp: loaded support on port[0] = 21 [ 344.878280][ T7271] chnl_net:caif_netlink_parms(): no params data found [ 344.959902][ T7271] bridge0: port 1(bridge_slave_0) entered blocking state [ 344.980117][ T7271] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.000110][ T7271] device bridge_slave_0 entered promiscuous mode 06:46:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)='\x00', &(0x7f00000000c0)='ppp0%vmnet0(cpuset\'/\x00'], &(0x7f0000000380)=[&(0x7f0000000140)='proc(@em0\x00', &(0x7f0000000180)='\x1c\x00', &(0x7f00000001c0)='n\x00', &(0x7f0000000200)='wlan0\x00', &(0x7f0000000240)='[GPL{:]!system\x00', &(0x7f0000000280)='[\x00', &(0x7f00000002c0)='user@md5sum\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)=' lo\x00'], 0xa00) r1 = socket$nl_crypto(0x10, 0x3, 0x15) r2 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$lock(r1, 0x5, &(0x7f0000000400)={0x1, 0x4, 0x101, 0x10000, r2}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x8}, 0x10) getresuid(&(0x7f0000000900), &(0x7f0000000940)=0x0, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000c00)=0xe8) syz_mount_image$btrfs(&(0x7f00000004c0)='btrfs\x00', &(0x7f0000000500)='./file0/file0\x00', 0x8, 0x4, &(0x7f0000000880)=[{&(0x7f0000000540)="7a14e7794ca6ba53ca551d95a73cd0eca31497bb1eaf552a0d9b77dd5c99dc0a09c3b7f5fdfe22fb1715d363c3f2163c598ef4a39ed82bf65d93eb0e451a45e9736fb11c0548ec42ee63ea3f481ed5b24c02bdb1616c68c2e4d8dd222bbc560a193e89b54807873a9012b49ec4b2372847d57c6b3f69af93756c84ed89f564fcb92f6803b97f4e76a06d2b75a77def8137b6ee7ee81e293193e17aa1c4550c78c6b428cecd9e3318c576506accdaf66ada0afe715c5909b1e6fa14bab72f777dae8dd4a10b43b17bf622d85dc712cf055f28ef26a0d131a44e4027b98374f3", 0xdf, 0x7}, {&(0x7f0000000640)="2611e8cd64324288bfc30a2f0ab94ccb06ee074aeece2ec6b3964d519dd704827ea9a4b162ad9a09d5c581840abf3981eb772522067f14daff7d29a17d0bb48614b977f78f948209", 0x48, 0x6911}, {&(0x7f00000006c0)="a986ead82dc20ec4da8e5f24b66bf3a53c02023ee223ee7c9a86d8f0648c85ae9734cb0ba89bef8b21c7404d8c6bf7ff9b2ffe473b6abc20c9da5d90699f2aafc622bf8660f0c74aebbfc26865eaa868cce47e28e552e621c1346f58004b7e4d6e3a716a642fee9518eda85681a385a6c8ae1e6d19761611e3bfcfc53ba9cf87e07b11dfc55cfa2c66814295b6b6973ebf5a5f60204641f6705a5ac4711215109fab5629b30758e37d5a3f", 0xab, 0x2}, {&(0x7f0000000780)="7956bc42daf92248427e17556e3d0994fb9791eb89cafebf10bfdd88d4b0c4cdb77359e709b163f97960a31d4afee461c4fdec73920b673974b1041a4c1d063f2d521e037dca0facffec746bd81439f4b1506b68618b64ac82a808d7b36a73f5aebaf6d6e79b37b527db45c82f5c3bc174d08ac29e026314d37fabb757dbcb2cdb07db953f0322dde5f0a2b7799276798b9824457480d7bed85cb365b63f822ae6b19c9c49563f8f5d9a945b483b54da2a996dcec556d2de3ab745433ae138ae839040177cf052c94e15bf44885d84ebdadbc3248f549a9908d64c763ae23b7f40c316eea4cfa9d2c0ac44492c03c3ade354c51c00705f7414", 0xf9, 0x99}], 0x80, &(0x7f0000000c40)={[{@commit={'commit', 0x3d, 0x7d}}, {@flushoncommit='flushoncommit'}, {@check_int_data='check_int_data'}, {@ssd_spread='ssd_spread'}, {@degraded='degraded'}, {@check_int_data='check_int_data'}, {@noenospc_debug='noenospc_debug'}, {@compress_force_algo={'compress-force', 0x3d, 'zlib'}}, {@notreelog='notreelog'}, {@space_cache='space_cache'}], [{@euid_eq={'euid', 0x3d, r3}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@smackfsdef={'smackfsdef', 0x3d, 'wlan0\x00'}}, {@appraise='appraise'}, {@pcr={'pcr', 0x3d, 0xa}}, {@subj_role={'subj_role', 0x3d, 'user@md5sum\x00'}}, {@euid_eq={'euid', 0x3d, r5}}]}) r6 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000d80), 0x0) fsetxattr$security_evm(r6, &(0x7f0000000dc0)='security.evm\x00', &(0x7f0000000e00)=@v1={0x2, "4d546b22dd7ae14b"}, 0x9, 0x2) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='io.stat\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r7, &(0x7f0000000e80), 0x2) r8 = syz_open_dev$admmidi(&(0x7f0000000ec0)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r8, 0x400443c9, &(0x7f0000000f00)={{0x8, 0xf7, 0x3, 0xc9, 0x8, 0x3}, 0x6}) pipe(&(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONERANGE(r9, 0x4020940d, &(0x7f0000000f80)={r6, 0x0, 0x2, 0x9, 0xff}) r10 = syz_open_dev$mice(&(0x7f0000000fc0)='/dev/input/mice\x00', 0x0, 0x40c880) ioctl$PPPIOCGMRU(r10, 0x80047453, &(0x7f0000001000)) r11 = syz_open_dev$binderN(&(0x7f0000001040)='/dev/binder#\x00', 0x0, 0x800) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000010c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000001080)='/dev/admmidi#\x00', 0xffffffffffffffff}, 0x30) fcntl$lock(r11, 0x5, &(0x7f0000001100)={0x2, 0x1, 0x100, 0x4, r12}) r13 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001140)='/dev/snapshot\x00', 0x10000, 0x0) ioctl$GIO_UNISCRNMAP(r13, 0x4b69, &(0x7f0000001180)=""/234) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r10, 0x40045731, &(0x7f0000001280)=0x2) r14 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/dlm_plock\x00', 0x200, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r14, 0x6, 0x1d, &(0x7f0000001300), &(0x7f0000001340)=0x14) r15 = accept4$nfc_llcp(r14, &(0x7f0000001380), &(0x7f0000001400)=0x60, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r15, 0x8933, &(0x7f0000001440)={'team0\x00'}) [ 345.031500][ T7271] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.038772][ T7271] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.047220][ T7271] device bridge_slave_1 entered promiscuous mode [ 345.066527][ T7275] IPVS: ftp: loaded support on port[0] = 21 [ 345.112199][ T7271] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 345.132992][ T7271] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 345.191365][ T7271] team0: Port device team_slave_0 added [ 345.232125][ T7271] team0: Port device team_slave_1 added 06:46:03 executing program 3: lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1800, &(0x7f0000000180)={'trans=unix,', {[{@access_uid={'access', 0x3d, r0}}], [{@pcr={'pcr', 0x3d, 0x2b}}]}}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x20000, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000240)=""/4096) setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000001240)={0xc535, 0x9, 0x80, 0xac}, 0x6) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000001280)='bond_slave_1\x00') ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000012c0)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001300)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001340)={0x0, 0xa0, 0x40, 0x4965, 0x101, 0x7fff, 0x7f, 0x2, {0x0, @in6={{0xa, 0x4e20, 0x2c1c261, @dev={0xfe, 0x80, [], 0xc}, 0x83b5}}, 0x0, 0x6, 0x3ff, 0x7}}, &(0x7f0000001400)=0xb0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000001440)={r3, 0x8}, &(0x7f0000001480)=0x8) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/loop-control\x00', 0x400000, 0x0) msync(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4) ioctl$BLKBSZSET(r2, 0x40081271, &(0x7f0000001500)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000001540)={'HL\x00'}, &(0x7f0000001580)=0x1e) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001640)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000015c0)="3f1e4a83815f115b0b2d6cffd8836441b12f5a00a47ce89ac872ec49f199660084a2aa89108c4b382aca57ec600a17280df9dd59014d41e4d84afd0b525ad9c6bf4a0aa98551dc6f6c79706259d723f989baec58", 0x54, r4}, 0x68) prctl$PR_SET_DUMPABLE(0x4, 0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/mixer\x00', 0x100, 0x0) ioctl$IMGETCOUNT(r5, 0x80044943, &(0x7f0000001700)) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001740)='/dev/dlm_plock\x00', 0x2082c0, 0x0) r7 = syz_genetlink_get_family_id$devlink(&(0x7f00000017c0)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f0000001900)={&(0x7f0000001780)={0x10, 0x0, 0x0, 0x100001}, 0xc, &(0x7f00000018c0)={&(0x7f0000001800)={0x88, r7, 0x0, 0x70bd2c, 0x25dfdbfc, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x88}, 0x1, 0x0, 0x0, 0x20044045}, 0x20000000) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001940)='/dev/dlm_plock\x00', 0xc0000, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r8, 0x84, 0x1e, &(0x7f0000001980), &(0x7f00000019c0)=0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001a40)={&(0x7f0000001a00)='./file0\x00', r8}, 0x10) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000001a80)={0x2, 0x24, [0x7, 0x0, 0xfff, 0x5, 0x3, 0xad, 0x1f, 0x12, 0x2]}) r9 = openat(r1, &(0x7f0000001ac0)='./file0\x00', 0x0, 0xc9) ioctl$SIOCX25SCUDMATCHLEN(r9, 0x89e7, &(0x7f0000001b00)={0x42}) r10 = openat(0xffffffffffffff9c, &(0x7f0000001b40)='./file0\x00', 0x40, 0x8) accept4$rose(r10, &(0x7f0000001b80)=@short={0xb, @remote, @default}, &(0x7f0000001bc0)=0x1c, 0x0) [ 345.383299][ T7271] device hsr_slave_0 entered promiscuous mode [ 345.420527][ T7271] device hsr_slave_1 entered promiscuous mode [ 345.467565][ T7275] chnl_net:caif_netlink_parms(): no params data found [ 345.477949][ T7278] IPVS: ftp: loaded support on port[0] = 21 [ 345.569207][ T7275] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.590100][ T7275] bridge0: port 1(bridge_slave_0) entered disabled state [ 345.626118][ T7275] device bridge_slave_0 entered promiscuous mode [ 345.674078][ T7275] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.707158][ T7275] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.761149][ T7275] device bridge_slave_1 entered promiscuous mode [ 345.842547][ T7282] IPVS: ftp: loaded support on port[0] = 21 [ 345.881957][ T7271] bridge0: port 2(bridge_slave_1) entered blocking state [ 345.889401][ T7271] bridge0: port 2(bridge_slave_1) entered forwarding state [ 345.896793][ T7271] bridge0: port 1(bridge_slave_0) entered blocking state [ 345.903868][ T7271] bridge0: port 1(bridge_slave_0) entered forwarding state 06:46:03 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x5, 0x20000) getsockopt$inet_tcp_int(r1, 0x6, 0x5, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x10000, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r2, 0x110, 0x4, &(0x7f00000001c0), 0x4) r3 = open$dir(&(0x7f0000000200)='./file0\x00', 0x10200, 0x42) getdents(r3, &(0x7f0000000240)=""/102, 0x66) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r4, 0x401870cc, &(0x7f0000000300)={0x1ff, 0x401, 0x6, 0x800}) r5 = syz_open_pts(0xffffffffffffffff, 0xc00) lseek(r5, 0x5, 0x3) r6 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x30000) io_uring_register$IORING_UNREGISTER_FILES(r6, 0x3, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000380)=0x756) io_setup(0x0, &(0x7f00000003c0)=0x0) r8 = socket$inet_sctp(0x2, 0x1, 0x84) r9 = syz_open_dev$swradio(&(0x7f0000000500)='/dev/swradio#\x00', 0x1, 0x2) io_cancel(r7, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x8, 0x3ff, r8, &(0x7f0000000400)="7cbab5443b36422a8c4a392b874388b39a634efbeff7fe170c4747d6cbf471a7433c0090d249cd2dcecb9c8b2fa5e96444a8edccad577f03f3e027e5437d5abd6e5af8b4ce1a7725fac8814dc8b7efbd63623890be8dd338dbd0c4800c97a367cf12d1dc97f68cdd553132919dd23ee37c43063481a1893a98bc5c67f63e367e7d3939aa17752dd8f9a5284679c8745317e2ad8cb2ad742cd78e19bdcaf88969d148f898b55cdcdf38c335fd214aff9d82056e57d6bb630a52cdc5e3f3946d9abe8a", 0xc2, 0x9, 0x0, 0x1, r9}, &(0x7f0000000580)) r10 = syz_open_dev$sndpcmp(&(0x7f00000005c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0x400000) ioctl$KVM_GET_XCRS(r10, 0x8188aea6, &(0x7f0000000600)={0x2, 0x81, [{0x8}, {0x5, 0x0, 0x2bb}]}) r11 = dup(0xffffffffffffffff) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000f, 0x80072, r11, 0x50) r12 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/mixer\x00', 0x0, 0x0) timerfd_settime(r12, 0x0, &(0x7f0000000680)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000006c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000008c0)=0xe8) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000900)={@rand_addr="3d0ff2821ced525f703405fce60238b3", @empty, @loopback, 0x1, 0x5, 0x9, 0x0, 0x8, 0x200000, r13}) r14 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000980)='/dev/video1\x00', 0x2, 0x0) r15 = openat$uinput(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/uinput\x00', 0x2, 0x0) dup3(r14, r15, 0x80000) [ 346.032497][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 346.072169][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 346.109694][ T7275] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 346.146371][ T7275] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 346.325739][ T7275] team0: Port device team_slave_0 added [ 346.402885][ T7275] team0: Port device team_slave_1 added [ 346.412811][ T7271] 8021q: adding VLAN 0 to HW filter on device bond0 [ 346.513229][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 346.543300][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 346.574490][ T7271] 8021q: adding VLAN 0 to HW filter on device team0 [ 346.634643][ T7275] device hsr_slave_0 entered promiscuous mode [ 346.682272][ T7275] device hsr_slave_1 entered promiscuous mode [ 346.710085][ T7275] debugfs: Directory 'hsr0' with parent '/' already present! [ 346.737972][ T7308] IPVS: ftp: loaded support on port[0] = 21 [ 346.754486][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 346.781579][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 346.810410][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 346.817544][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 346.850851][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 346.882102][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 346.910908][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 346.917989][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 346.962233][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 346.991885][ T7278] chnl_net:caif_netlink_parms(): no params data found [ 347.035999][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 347.052666][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 347.090877][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 347.135162][ T7282] chnl_net:caif_netlink_parms(): no params data found [ 347.166701][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 347.181659][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 347.233074][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 06:46:04 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x22202, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000040)={0x7, 0x77, 0x1f, 0x200}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x230080, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x200000, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000100)={'veth0_to_bridge\x00', 0xe00}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@initdev, @in6=@ipv4={[], [], @remote}}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r3 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x620000, 0x2) r4 = openat$cgroup_subtree(r3, &(0x7f00000002c0)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f0000000340)=0xff, 0x4) fspick(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x1) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0x0, 0x4, 0x3}}, 0x14) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x44000, 0x0) ioctl$KVM_SET_TSC_KHZ(r6, 0xaea2, 0xe520) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$CAN_RAW_RECV_OWN_MSGS(r7, 0x65, 0x4, &(0x7f0000000940)=0x1, 0x4) fcntl$notify(r1, 0x402, 0x1) readv(0xffffffffffffffff, &(0x7f0000001ec0)=[{&(0x7f0000000980)=""/227, 0xe3}, {&(0x7f0000000a80)=""/152, 0x98}, {&(0x7f0000000b40)=""/54, 0x36}, {&(0x7f0000000b80)=""/50, 0x32}, {&(0x7f0000000bc0)=""/166, 0xa6}, {&(0x7f0000000c80)=""/164, 0xa4}, {&(0x7f0000000d40)=""/4096, 0x1000}, {&(0x7f0000001d40)=""/119, 0x77}, {&(0x7f0000001dc0)=""/207, 0xcf}], 0x9) read(r4, &(0x7f0000001f80)=""/4096, 0x1000) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000002f80)={r3, r5}) r8 = syz_open_dev$sndpcmp(&(0x7f0000002fc0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x4a4480) setns(r8, 0x8000000) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000003000)=0x7ff, 0x4) ioctl$ION_IOC_ALLOC(r6, 0xc0184900, &(0x7f0000003040)={0x6, 0x8, 0x1, 0xffffffffffffffff}) r10 = syz_open_dev$sndctrl(&(0x7f0000003080)='/dev/snd/controlC#\x00', 0x0, 0x0) r11 = accept4$x25(r5, 0x0, &(0x7f00000030c0), 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000003140)={0x8, &(0x7f0000003100)=[r9, r10, r11, 0xffffffffffffffff]}, 0x4) getxattr(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)=@random={'user.', 'GPL\x00'}, &(0x7f0000003200)=""/116, 0x74) syz_open_dev$video(&(0x7f0000003280)='/dev/video#\x00', 0xfffffffffffffe00, 0x401100) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000032c0)={'syz1', "5fb68f06821f0c981bc9bf81ab2e8fbf22b548a362e3dbdc43d9f332571eb7268c8dcee682396a1a76216ee3dd9580e0ede6b10005226e4d4472db2535215c976ca39afa45934446df3c1add44fe53978a77125083a822a884c3f1208a7000d53af4a0e24c69db424a447ef17eec2ddbeb420802703404c1bd4cea55950915fa61435e8c2744ffa218d930c0855b3e535e380409e7afaa47b7648f1fff56a3a6c5cd45e5c5c2abf0dd593ca191a1c026e0c5c37f582e9a3cdaa5c28944559a7bc0dfc4583995a166eb474cad5d2f4352e75dea1f57c43d3066f5a6bfcbcdbec3844ec2c794856cce424c2a6c543fb3887174c54ca605c7"}, 0xfb) [ 347.279466][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 347.332430][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 347.385700][ T7271] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 347.433384][ T7271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 347.495017][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 347.507411][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 347.721037][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 347.728539][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 347.773201][ T7271] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 347.800719][ T7278] bridge0: port 1(bridge_slave_0) entered blocking state [ 347.807791][ T7278] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.871017][ T7278] device bridge_slave_0 entered promiscuous mode [ 347.964616][ T7278] bridge0: port 2(bridge_slave_1) entered blocking state [ 347.980559][ T7278] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.988496][ T7278] device bridge_slave_1 entered promiscuous mode [ 348.160680][ T7278] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 348.224330][ T7282] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.231904][ T7282] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.270303][ T7282] device bridge_slave_0 entered promiscuous mode [ 348.351700][ T7278] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 348.410204][ T7282] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.417283][ T7282] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.434244][ T7332] IPVS: ftp: loaded support on port[0] = 21 [ 348.470875][ T7282] device bridge_slave_1 entered promiscuous mode [ 348.494308][ T7275] 8021q: adding VLAN 0 to HW filter on device bond0 [ 348.545586][ T7278] team0: Port device team_slave_0 added [ 348.588964][ T7275] 8021q: adding VLAN 0 to HW filter on device team0 [ 348.634530][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 348.650815][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 348.665734][ T7278] team0: Port device team_slave_1 added [ 348.724924][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 348.780681][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 348.797255][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.804354][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.854572][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 348.894168][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 06:46:06 executing program 0: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYPTR, @ANYRESDEC=0x0, @ANYRESHEX, @ANYRES16, @ANYBLOB="c6292fdfe740aba80100010000000000a178fb1fb08629f55c16d6d19b3d8097237f7d860b7274ce37fba681b500d0c814f87ca67c8c5eba1ef47e8e4a94339e16d0b524e0ef4ea10fc5291793ea975cc22ca7c07ced93b665d9025871f7687d63f44d4d868a2bf9e07a4bbe73665b0a0fe52f521c2b1f5f802bbb"], 0xab) lseek(r0, 0x0, 0x0) fallocate(r0, 0x8, 0x0, 0x8000) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000d00ea1100000005000000", 0x29}], 0x1) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000180)=0x88000) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="7f"], 0x1) [ 348.914174][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.921338][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.960744][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 348.984784][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 349.035036][ T7282] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 349.078043][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 349.110782][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 349.119528][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 349.151303][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 349.180690][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 349.189676][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 349.220855][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 349.251423][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 349.270686][ T3006] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 349.297161][ T7308] chnl_net:caif_netlink_parms(): no params data found [ 349.325975][ T7282] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 349.343228][ T7358] netlink: 'syz-executor.0': attribute type 13 has an invalid length. [ 349.383779][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 349.433578][ T7278] device hsr_slave_0 entered promiscuous mode [ 349.490723][ T7278] device hsr_slave_1 entered promiscuous mode [ 349.530083][ T7278] debugfs: Directory 'hsr0' with parent '/' already present! [ 349.552183][ T7358] netlink: 'syz-executor.0': attribute type 13 has an invalid length. 06:46:07 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0xf3eae937f6c46e7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x2000003, 0x12, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') fcntl$setstatus(r0, 0x4, 0x42000) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0xfe019d20f1800dbe, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r3, 0x400, 0x0, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000010) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x44f015859987e743}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r3, 0x400, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x24004080}, 0x4044008) mkdirat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x1ff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)=@broute={'\n\x00oute\x00', 0x20, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20d9f000], 0x0, 0x0, 0x0}, 0xa8) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000100)={{0x2, 0x0, @remote}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10, {0x2, 0x4e22, @multicast1}, 'veth0_to_bridge\x00'}) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$kcm(0xa, 0x2, 0x73) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) msgget(0x3, 0x0) chdir(0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x40002000, 0x0, 0x0) r5 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a80000000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100636271001804020004040600030000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed48000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a00"/539], 0x3}}, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000940)={r6, @dev={0xac, 0x14, 0x14, 0x1e}, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) socket(0x10, 0x3, 0x0) [ 349.808859][ T7308] bridge0: port 1(bridge_slave_0) entered blocking state [ 349.850119][ T7308] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.858023][ T7308] device bridge_slave_0 entered promiscuous mode [ 349.959756][ T7282] team0: Port device team_slave_0 added [ 349.991624][ T7308] bridge0: port 2(bridge_slave_1) entered blocking state [ 349.998692][ T7308] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.033456][ T7308] device bridge_slave_1 entered promiscuous mode [ 350.079526][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 350.100317][ T3500] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 350.100361][ C0] hrtimer: interrupt took 34821 ns [ 350.109944][ T7275] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 350.121365][ T7282] team0: Port device team_slave_1 added [ 350.187471][ T7390] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.194744][ T7390] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.470761][ T7308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 350.533482][ T7282] device hsr_slave_0 entered promiscuous mode 06:46:08 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000080)=0xfffffffd, 0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x7}, @timestamp, @window, @sack_perm, @mss, @timestamp, @window, @mss], 0x8) r2 = open(&(0x7f0000000240)='./bus\x00', 0x100000141042, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0xc00) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r5, &(0x7f0000000280)={0x2, 0x4e24, @remote}, 0x10) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r5, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) read(r5, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000100)=0x80, 0x4) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r4, 0x4020565b, &(0x7f00000000c0)={0x8001008, 0x2, 0x1}) r6 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ftruncate(r2, 0x10099b7) sendfile(r0, r2, 0x0, 0x8000fffffffe) connect$unix(r1, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e22}, 0x6e) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) [ 350.590394][ T7282] device hsr_slave_1 entered promiscuous mode [ 350.650196][ T7282] debugfs: Directory 'hsr0' with parent '/' already present! [ 350.669962][ T7308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 350.714876][ T7278] 8021q: adding VLAN 0 to HW filter on device bond0 [ 350.773465][ T7332] chnl_net:caif_netlink_parms(): no params data found [ 350.810327][ T7278] 8021q: adding VLAN 0 to HW filter on device team0 [ 350.865965][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 350.900810][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 351.037699][ T7308] team0: Port device team_slave_0 added [ 351.051407][ T7308] team0: Port device team_slave_1 added [ 351.150685][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 351.189680][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 351.295009][ T7305] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.302160][ T7305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 351.378612][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 351.423500][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 06:46:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet(0x2, 0xa, 0xf8) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000017c0)=0xe8) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}, &(0x7f0000001840)=0x14) r8 = socket(0xa, 0x80001, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r8, 0x29, 0x22, &(0x7f00000008c0)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r9, 0x1, 0x8, 0x6, @random="91789dfedd83"}, 0x14) sendmsg$inet(r3, &(0x7f0000001980)={&(0x7f0000000500)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10, &(0x7f0000001680)=[{&(0x7f0000000540)="149b939eac55952d17c68405a267d75438ee11d50974addcad1d7b9fff0de5a16019ee54d495aff56366f1c6d95c9db0a964c51b979c64146222407b96e46e759c342f7d0d4c9408d659bcc7cc598edfd352e51a6eeb99c54e906ea6560d3882655e7bbbc828800d94d21144be48defb9378f90aca6f28d401b6911a", 0x7c}, {&(0x7f00000005c0)="322863501b5cf0aad9a8ab7b385ef98db9da6ecb6ff6", 0x16}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="7f4883e88482a7e422be4f80eb4a535c47fbaba1d0d2e9801b1ee189facbf1bc80e2573abcea132d48f8d05eb4f4bc578e5d45b774924b5dddbf3ac80daaddda0285d33e3d8698b45935f32a6d28bc9c5d1de5b57bbda259068fef6bd598fd87f2d7eb1866df23f39ae658a2490a761e36056257cb85e1cee7b154965aabfa", 0x7f}], 0x4, &(0x7f0000001880)=[@ip_retopts={{0x28, 0x0, 0x7, {[@end, @lsrr={0x83, 0x7, 0x3, [@multicast2]}, @rr={0x7, 0xb, 0xff, [@empty, @dev={0xac, 0x14, 0x14, 0x25}]}, @lsrr={0x83, 0x3, 0x20}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xc6d}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @empty, @dev={0xac, 0x14, 0x14, 0x19}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}}}], 0xd0}, 0x24004011) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000340)=[@textreal={0x8, 0x0}], 0x1, 0x71, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000100)={0x30003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r10 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x2, 0x4080) r11 = socket(0x3, 0x3, 0x9) ioctl$sock_inet_SIOCSIFFLAGS(r11, 0x8923, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x8000}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r11, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r13 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x8}}, r13, 0x0, 0xffffffffffffffff, 0x0) waitid(0x2, r13, &(0x7f0000000040), 0x2, &(0x7f00000000c0)) sendmsg$key(r11, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r12, @ANYRESDEC=r13]], 0xfffffffffffffe56}}, 0x20004850) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r12}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r10, &(0x7f0000000240)={0x8, 0x120, 0xfa00, {0x4, {0x9, 0x8, "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", 0x59, 0x8, 0x82, 0x0, 0x94, 0x3e, 0x3}, r12}}, 0x128) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000000)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000380)=[{0x20, 0x0, [0x8, 0x9, 0x3, 0x80, 0x80000001, 0x0, 0x7fffffff, 0x80000001, 0x2, 0x69f, 0x8001, 0x6, 0x3ff, 0x3ff, 0x62, 0x2]}, {0x10, 0x0, [0xffffffff, 0xeb96, 0x4, 0x3, 0x2, 0x1, 0x1f, 0x9, 0x5, 0xffffffff, 0x6, 0x6, 0x1ff, 0x7fffffff, 0x7, 0x240000]}], r12, 0x1, 0x1, 0x90}}, 0x20) [ 351.521459][ T7305] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.528550][ T7305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.610804][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 351.642038][ T7431] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 351.686265][ T7432] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) [ 351.701508][ T7305] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 352.423287][ T7308] device hsr_slave_0 entered promiscuous mode 06:46:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x100082) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000340), 0x0, 0x81806) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0}) ppoll(&(0x7f0000000500)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r4+10000000}, 0x0, 0x0) [ 352.463777][ T7308] device hsr_slave_1 entered promiscuous mode [ 352.570103][ T7308] debugfs: Directory 'hsr0' with parent '/' already present! [ 352.580884][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 352.589359][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 352.660738][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 352.694897][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 352.730817][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 352.798410][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 06:46:10 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f00000004c0)={0x46, 0x3, 0x0, {0x6, 0x25, 0x0, ',]proc$wlan0-[vboxnet0em1vmnet1[wlan0'}}, 0x46) r1 = socket$inet6(0xa, 0x3, 0x20000000021) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0bc5310, &(0x7f00000000c0)) setsockopt(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000001000), 0xc5) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2, 0x0, 0x200000000000df8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x2, 0x176) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=""/174, 0xae) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000280)="ad5f5330fa66342423927208d76abda7802cf7bc4c355d6b14d06be5cd189aaff5dde835d77c59dc7025d08f6a7a07e907ba123f938256e6cc190b7e738adf7594e451f2dbed1b33b947ac7320a5282d92bf573ea028ba9974289f8a193fcaa9b2693fd9fac26f0423d04ccf496c6fab1499e3f5174f00a1bd94816e6d90795d6726362f4e957ef3c8da7594a873856c309923c54434658e74abf256134db793ac85bfea810a94f5fccd71df860461f4b2f7e47428e724ddc7a92a2e6a", &(0x7f0000000340)="453649ecec35d7e854551ef408f50e5a6a8cc09bfb3e0e3bfd077cb2e8fb3c487ff723468f8aa6b66de006d4d29e80ac6f43a38931b900081b81f8a4e71a335154a7066f633d"}, 0x20) ioctl$PPPIOCSPASS(0xffffffffffffffff, 0x40107447, &(0x7f0000000440)={0x6, &(0x7f0000000400)=[{0x9, 0xee, 0x9, 0xbf5}, {0x6, 0x7f, 0x5, 0xfffffffe}, {0x0, 0xc4, 0x2, 0x8}, {0x9, 0x1, 0x5, 0x7f}, {0x2, 0x8, 0x7f, 0x3}, {0x17, 0x8, 0x6, 0x5}]}) sendto$inet6(r1, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) [ 352.851259][ T7274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 06:46:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000800)=0x16c, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_buf(r2, 0x1, 0x1c, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @rand_addr=0x2}}, 0x0, 0x20000000005, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='cdg\x00', 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @loopback}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 8b e4 ff ff 48 89 ee 48 89 c7 e8 60 e5 ff ff 48 85 c0 48 89 c3 [ 353.813788][ T7239] RSP: 002b:00007ffc6a2dca00 EFLAGS: 00010202 [ 353.819846][ T7239] RAX: 0000000000000000 RBX: 00007ffc6a2ddfd0 RCX: 0000000000000200 [ 353.827806][ T7239] RDX: 0000000000000000 RSI: 00007ffc6a2ddfd0 RDI: 0000000001c5d0c0 [ 353.835771][ T7239] RBP: 00007ffc6a2ddfd0 R08: 0000000000000001 R09: 00007f30d7dffe00 [ 353.843731][ T7239] R10: 74656e2f73656369 R11: 00007f30d7e31a50 R12: 0000000001c5cfd0 [ 353.851693][ T7239] R13: 0000000001c5d0c0 R14: 0000000000000001 R15: 0000000001c68159 [ 353.861022][ T7239] Kernel Offset: disabled [ 353.865340][ T7239] Rebooting in 86400 seconds..