[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 58.171182][ T25] audit: type=1800 audit(1575444666.517:25): pid=9013 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 58.204367][ T25] audit: type=1800 audit(1575444666.527:26): pid=9013 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 58.244348][ T25] audit: type=1800 audit(1575444666.527:27): pid=9013 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.61' (ECDSA) to the list of known hosts. 2019/12/04 07:31:17 fuzzer started 2019/12/04 07:31:19 dialing manager at 10.128.0.26:33135 2019/12/04 07:31:19 syscalls: 2528 2019/12/04 07:31:19 code coverage: enabled 2019/12/04 07:31:19 comparison tracing: enabled 2019/12/04 07:31:19 extra coverage: extra coverage is not supported by the kernel 2019/12/04 07:31:19 setuid sandbox: enabled 2019/12/04 07:31:19 namespace sandbox: enabled 2019/12/04 07:31:19 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/04 07:31:19 fault injection: enabled 2019/12/04 07:31:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/04 07:31:19 net packet injection: enabled 2019/12/04 07:31:19 net device setup: enabled 2019/12/04 07:31:19 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/04 07:31:19 devlink PCI setup: PCI device 0000:00:10.0 is not available 07:33:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read$alg(r0, &(0x7f0000000040)=""/4096, 0x1000) 07:33:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000cab000)) fstatfs(r0, &(0x7f0000000100)=""/217) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@getneigh={0x14, 0x1e, 0x101}, 0x14}}, 0x0) syzkaller login: [ 183.711971][ T9178] IPVS: ftp: loaded support on port[0] = 21 [ 183.866154][ T9178] chnl_net:caif_netlink_parms(): no params data found [ 183.877134][ T9181] IPVS: ftp: loaded support on port[0] = 21 [ 183.918543][ T9178] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.926803][ T9178] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.936712][ T9178] device bridge_slave_0 entered promiscuous mode [ 183.957232][ T9178] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.964853][ T9178] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.972911][ T9178] device bridge_slave_1 entered promiscuous mode 07:33:12 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/packet\x00') read(r0, &(0x7f0000001600)=""/260, 0x44a) [ 184.036733][ T9178] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.109016][ T9178] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.173861][ T9181] chnl_net:caif_netlink_parms(): no params data found [ 184.187473][ T9184] IPVS: ftp: loaded support on port[0] = 21 [ 184.210046][ T9178] team0: Port device team_slave_0 added [ 184.224000][ T9178] team0: Port device team_slave_1 added 07:33:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) listen(r0, 0x0) socket$inet(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 184.327768][ T9178] device hsr_slave_0 entered promiscuous mode [ 184.364739][ T9178] device hsr_slave_1 entered promiscuous mode [ 184.419350][ T9181] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.436966][ T9181] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.457256][ T9181] device bridge_slave_0 entered promiscuous mode [ 184.493655][ T9181] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.516541][ T9181] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.525863][ T9181] device bridge_slave_1 entered promiscuous mode [ 184.578550][ T9181] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.597364][ T9178] netdevsim netdevsim0 netdevsim0: renamed from eth0 07:33:13 executing program 4: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b0000f4afd7030a7c", 0x131, 0x0, 0x0, 0xfffffffffffffe4c) [ 184.636560][ T9186] IPVS: ftp: loaded support on port[0] = 21 [ 184.691607][ T9181] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.761165][ T9178] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 184.833057][ T9178] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 184.851916][ T9189] IPVS: ftp: loaded support on port[0] = 21 07:33:13 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = dup2(r0, r1) r3 = socket$unix(0x1, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x129900, 0x0) ioctl$KVM_GET_PIT2(r6, 0x8070ae9f, &(0x7f0000000040)) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, "52c2b6a5576286f1a1afbc09896af347f4b3bf8746c4cc2903c4a09bb4c68a15e03b1a4e457d86c34052c5cd1fb664ab2491163d68e72daba9e622cbc3064cf6", "8eeea2a8b39b78c28cf46496a9ec112de8f43c106772af3edb5d3a17ff1a2ed70ae26a1b0fc8117cbe77e9214a0f6caf1e5966c47b6c8a2fea5b5e10e8ce9e02", "de40632fcf848e76bfdf7136e0a5e8f5498d92bb88cf4153eca1c7563672b598"}) [ 184.910985][ T9181] team0: Port device team_slave_0 added [ 184.942431][ T9178] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 185.002449][ T9184] chnl_net:caif_netlink_parms(): no params data found [ 185.013283][ T9181] team0: Port device team_slave_1 added [ 185.087873][ T9192] IPVS: ftp: loaded support on port[0] = 21 [ 185.157695][ T9181] device hsr_slave_0 entered promiscuous mode [ 185.194839][ T9181] device hsr_slave_1 entered promiscuous mode [ 185.234489][ T9181] debugfs: Directory 'hsr0' with parent '/' already present! [ 185.266221][ T9184] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.273434][ T9184] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.282744][ T9184] device bridge_slave_0 entered promiscuous mode [ 185.326392][ T9184] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.333568][ T9184] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.342533][ T9184] device bridge_slave_1 entered promiscuous mode [ 185.409725][ T9181] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 185.456323][ T9181] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 185.496380][ T9181] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 185.557703][ T9186] chnl_net:caif_netlink_parms(): no params data found [ 185.573440][ T9184] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.587604][ T9184] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.602410][ T9181] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 185.666577][ T9184] team0: Port device team_slave_0 added [ 185.710075][ T9184] team0: Port device team_slave_1 added [ 185.728416][ T9186] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.736480][ T9186] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.744294][ T9186] device bridge_slave_0 entered promiscuous mode [ 185.766563][ T9186] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.773671][ T9186] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.782536][ T9186] device bridge_slave_1 entered promiscuous mode [ 185.877571][ T9184] device hsr_slave_0 entered promiscuous mode [ 185.914822][ T9184] device hsr_slave_1 entered promiscuous mode [ 185.954452][ T9184] debugfs: Directory 'hsr0' with parent '/' already present! [ 186.038644][ T9189] chnl_net:caif_netlink_parms(): no params data found [ 186.052121][ T9186] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.068340][ T9186] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.107058][ T9178] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.163051][ T9178] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.174165][ T9186] team0: Port device team_slave_0 added [ 186.187544][ T9192] chnl_net:caif_netlink_parms(): no params data found [ 186.196753][ T9184] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 186.269486][ T9184] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 186.318003][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.326823][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.344513][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.353693][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.362421][ T9193] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.369889][ T9193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.378298][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.387415][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.396191][ T9193] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.403390][ T9193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.411119][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.420973][ T9186] team0: Port device team_slave_1 added [ 186.442749][ T9184] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 186.487014][ T9184] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 186.557843][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.566465][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.621934][ T9192] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.629298][ T9192] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.637228][ T9192] device bridge_slave_0 entered promiscuous mode [ 186.696483][ T9186] device hsr_slave_0 entered promiscuous mode [ 186.764816][ T9186] device hsr_slave_1 entered promiscuous mode [ 186.814411][ T9186] debugfs: Directory 'hsr0' with parent '/' already present! [ 186.822244][ T9189] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.829672][ T9189] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.840912][ T9189] device bridge_slave_0 entered promiscuous mode [ 186.850454][ T9189] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.857782][ T9189] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.865745][ T9189] device bridge_slave_1 entered promiscuous mode [ 186.872910][ T9192] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.882169][ T9192] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.890387][ T9192] device bridge_slave_1 entered promiscuous mode [ 186.902687][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.913187][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.921724][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.976711][ T9181] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.990942][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.000610][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.010066][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.018692][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.028199][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.036644][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.053360][ T9178] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.063464][ T9192] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.082529][ T9192] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.101066][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.109338][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.119463][ T9189] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.131274][ T9189] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.156986][ T9181] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.217505][ T9196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.227926][ T9196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.236632][ T9196] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.244417][ T9196] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.252047][ T9196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.260954][ T9196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.269442][ T9196] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.276569][ T9196] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.284509][ T9196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.293274][ T9186] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 187.381471][ T9189] team0: Port device team_slave_0 added [ 187.389757][ T9192] team0: Port device team_slave_0 added [ 187.397789][ T9192] team0: Port device team_slave_1 added [ 187.416609][ T9178] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.427158][ T9196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.438344][ T9196] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.446437][ T9196] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.454906][ T9186] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 187.517623][ T9189] team0: Port device team_slave_1 added [ 187.523496][ T9186] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 187.610347][ T9186] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 187.681585][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.690497][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.699818][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.708400][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.717860][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.727089][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.777608][ T9192] device hsr_slave_0 entered promiscuous mode [ 187.836480][ T9192] device hsr_slave_1 entered promiscuous mode [ 187.874873][ T9192] debugfs: Directory 'hsr0' with parent '/' already present! [ 187.912208][ T9181] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 187.923593][ T9181] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 187.952015][ T9184] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.998888][ T9189] device hsr_slave_0 entered promiscuous mode [ 188.045365][ T9189] device hsr_slave_1 entered promiscuous mode [ 188.084383][ T9189] debugfs: Directory 'hsr0' with parent '/' already present! [ 188.094105][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.102831][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.111611][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.120317][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.131149][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.175627][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 188.188710][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 188.197501][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.208935][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 07:33:16 executing program 0: perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x209e1e, 0x3, 0x1, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000080), 0x0}, 0x20) [ 188.231970][ T9181] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.250039][ T9184] 8021q: adding VLAN 0 to HW filter on device team0 07:33:16 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000009280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000000)=@hat={'permhat \xb7\xcb\a\xf7\xe6h\x98\xfb\xe6\xb3\x02\xffs\xb81\xb8\x99\xac*\x8db\xf78\xe3\xcd\x83\xca\\\xc9\x05\xcd\xa1]\xcf\xb7;\aR\xc86%\xff\xb0[2K\"\x90p\xc7\v>\x94&'}, 0x51) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) io_setup(0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) dup2(r2, r1) close(0xffffffffffffffff) io_submit(0x0, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x12f}]) [ 188.301905][ T9192] netdevsim netdevsim5 netdevsim0: renamed from eth0 07:33:16 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x1e0, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x500000000000000) [ 188.363757][ T9208] AppArmor: change_hat: Invalid input 'hs1*b8̓\͡]Ϸ;R6%[2K"p >&0x0000000000000000^' [ 188.366469][ T9192] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 188.457129][ T9192] netdevsim netdevsim5 netdevsim2: renamed from eth2 07:33:16 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$key(0xf, 0x3, 0x2) recvmmsg(r3, &(0x7f0000000440), 0x6f5, 0x0, &(0x7f0000000480)={0x77359400}) sendmsg$key(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="020500000200000000000000000000006622e85f3d08e1fb8abc9e557817db65bc28dce194bb4cabd6f87a264c66c0c37e2b34fbb2401107900b4e1e0e2d275caa821047c7dd3da4cee9ca5560e245db02becafa39679f8f4a817bde2f29bf00"/117], 0x10}}, 0x0) [ 188.527049][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.539367][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.559682][ T3686] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.566888][ T3686] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.577503][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.590057][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.599742][ T3686] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.607055][ T3686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.622286][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.633021][ T9189] netdevsim netdevsim4 netdevsim0: renamed from eth0 07:33:17 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) syz_open_procfs(0x0, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x6c02) dup3(r2, r1, 0x0) [ 188.677300][ T9192] netdevsim netdevsim5 netdevsim3: renamed from eth3 07:33:17 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2300) dup3(r2, r1, 0x0) [ 188.760381][ T9186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.776129][ T9189] netdevsim netdevsim4 netdevsim1: renamed from eth1 07:33:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000180)) read(r0, &(0x7f0000000040)=""/11, 0x158) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r2, &(0x7f0000f46000)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) syz_open_pts(r0, 0x4080) [ 188.826307][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.836642][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.847056][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.857318][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.895813][ T9189] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 188.937154][ T9189] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 188.987202][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.998012][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.008755][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.017895][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.028250][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 07:33:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0x0, 0x0, 0x0, 0x7, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}}, &(0x7f0000000380)=""/249, 0x36, 0xf9, 0x8}, 0x20) [ 189.037389][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.045456][ T9193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.056964][ T9186] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.093349][ T9190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.112068][ T9190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.147877][ T9184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.166754][ T9190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.194872][ T9190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.203265][ T9190] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.210447][ T9190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.218748][ T9190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.227657][ T9190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.236575][ T9190] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.243699][ T9190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.251657][ T9190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.290291][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.298505][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 189.306725][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 189.316325][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.326684][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.336045][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.344918][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.372095][ T9184] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.406063][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.419861][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.479752][ T9189] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.489300][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.503401][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.512285][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.521300][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.541315][ T9186] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.563741][ T9189] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.577130][ T9192] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.584107][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.605038][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 07:33:18 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000180)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4000002) ftruncate(r0, 0x48280) r3 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r3, &(0x7f0000000080)={0x14}, 0xfffffff4) socket$inet6(0xa, 0x800, 0x3f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0xe10e6030e298bd6, 0x0) [ 189.655917][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.665967][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.674710][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.681821][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.690138][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 189.713492][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 189.733763][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.740960][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.757676][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 189.765748][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 189.788743][ T9192] 8021q: adding VLAN 0 to HW filter on device team0 [ 189.807866][ T9186] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 189.825526][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 189.837539][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.853556][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.863239][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.871282][ T3114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.885460][ T9190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.894165][ T9190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.907538][ T9190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 189.925500][ T9190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 189.936054][ T9190] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.943468][ T9190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 189.968126][ T9190] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.977200][ T9190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.022018][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.031698][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.041212][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.048470][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.065349][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.075143][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.083643][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.094487][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.103099][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.111808][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.120456][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.129273][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.138367][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.148525][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.160370][ T9189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.205314][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.233298][ T9192] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 190.251613][ T9192] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.278859][ T9189] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.295857][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.305772][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.306468][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.322282][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.330748][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.338965][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.346578][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.355081][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.375188][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.383056][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.390765][ T3686] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.412235][ T9192] 8021q: adding VLAN 0 to HW filter on device batadv0 07:33:18 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = gettid() tkill(r0, 0x3c) prctl$PR_SET_PTRACER(0x59616d61, r0) 07:33:19 executing program 4: accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0xc00) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfb120eb7) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) setreuid(0xffffffffffffffff, 0x0) keyctl$chown(0x4, r2, 0x0, 0x0) socket$inet(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000001c0)) setreuid(0xffffffffffffffff, 0x0) lstat(0x0, &(0x7f0000000300)) keyctl$chown(0x4, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) fstat(r0, 0x0) fstat(r1, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) r4 = socket(0x0, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket(0x0, 0x803, 0x0) getsockname$packet(r5, 0x0, &(0x7f0000000140)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0xee00) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) lstat(&(0x7f0000000040)='./bus\x00', &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000680)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000001800)={0xa0, 0x19, 0x1, {0x40, {0x0, 0x2, 0x6}, 0x0, r7, 0x0, 0x0, 0x10000, 0x0, 0x9, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1f, 0x4}}, 0xa0) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB='\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r3, @ANYBLOB="afbd11345406453e916cfbfd2df4e7611e8595638e230c394797b197bb601e2404c600abb389652faaa119f8112e6da289802d719b939f17ff95d2dda8b868937833830501b328e860d180cb6c4914a3dc9891934b9d88f73231c85caf70407d0169cc29cf1ce2c9bb38c4032815b964fd529aed5824eb0991c567b221aadc2167b6315bd4a19e8834075d15dc5c94e805f13044b6ad3b7f24f2888a937421b41ccc302770b500ca02fecd418c46736088", @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYRES32, @ANYBLOB="d9ff", @ANYRES32=r6, @ANYBLOB="080002", @ANYRES32], 0x15, 0x3) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) bind$inet(r8, &(0x7f0000000280)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r8, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000000100)=[{0x0}, {0x0}, {&(0x7f00000002c0)="f7fc370763ed7a4dbfaf549cd1dc94c047d2bfd2da573ebddcf5db435637f045346375f1b75c21a0106605fa2c", 0x2d}, {0x0}], 0x4}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000000b40)}, {0x0}, {&(0x7f0000000f40)="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", 0x33d}], 0x3}}], 0x2, 0x80) sendto$inet(r8, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) 07:33:19 executing program 5: clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000100)='./file0\x00', 0x1142, 0x0) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000200)='./file0\x00', 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) ptrace(0x11, r0) 07:33:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="74000000240007050000290a0000000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="00080a80000000000300000008000100753332005800020014000500000000000000000000000000000000004000060084941ce8b13c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532e73f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) 07:33:19 executing program 0: accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0xc00) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfb120eb7) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='rdma.current\x00', 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, r3) setreuid(0xffffffffffffffff, 0x0) keyctl$chown(0x4, r3, 0x0, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, 0x0, &(0x7f00000001c0)) setreuid(0xffffffffffffffff, 0x0) lstat(0x0, &(0x7f0000000300)) keyctl$chown(0x4, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cgroup.events\x00', 0x0, 0x0) fstat(r0, 0x0) fstat(r1, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) r6 = socket(0x0, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) write$P9_RGETATTR(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r7 = socket(0x0, 0x803, 0x0) getsockname$packet(r7, 0x0, &(0x7f0000000140)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, 0xee00) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) setreuid(0x0, 0x0) lstat(&(0x7f0000000040)='./bus\x00', &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000680)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000001800)={0xa0, 0x19, 0x1, {0x40, {0x0, 0x2, 0x6}, 0x0, r9, 0x0, 0x0, 0x10000, 0x100000000, 0x9, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1f, 0x4}}, 0xa0) fsetxattr$system_posix_acl(r2, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYRES32, @ANYBLOB="02000600", @ANYRES32, @ANYBLOB='\x00', @ANYRES32, @ANYBLOB="02000200eddd32208f9f16556225ae9f45d251e2f6335a7e288135cd4d5759c8375876e0671508c9f1bda6d8fef7f12f5f7008c98bc04dd474a5b3ed7c68220c85cf284760fb09bd563858b95108fff9829ecf993bd1c1", @ANYRES32, @ANYRES32, @ANYBLOB="04000700000000", @ANYRES32=r5, @ANYBLOB="afbd11345406453e916cfbfd2df4e7611e8595638e230c394797b197bb601e2404c600abb389652faaa119f8112e6da289802d719b939f17ff95d2dda8b868937833830501b328e860d180cb6c4914a3dc9891934b9d88f73231c85caf70407d0169cc29cf1ce2c9bb38c4032815b964fd529aed5824eb0991c567b221aadc2167b6315bd4a19e8834075d15dc5c94e805f13044b6ad3b7f24f2888a937421b41ccc302770b500ca02fecd418c46736088", @ANYRES32, @ANYBLOB="08000400", @ANYRES32, @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYRES32, @ANYBLOB="d9ff", @ANYRES32=r8, @ANYBLOB="080002", @ANYRES32], 0x16, 0x3) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) bind$inet(r10, &(0x7f0000000280)={0x2, 0x4e23, @rand_addr=0x5}, 0x10) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r10, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r10, &(0x7f0000004b00)=[{{0x0, 0x0, &(0x7f0000000100)=[{0x0}, {0x0}, {&(0x7f00000002c0)="f7fc370763ed7a4dbfaf549cd1dc94c047d2bfd2da573ebddcf5db435637f045346375f1b75c21a0106605fa2c", 0x2d}, {0x0}], 0x4}}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000000b40)}, {0x0}, {&(0x7f0000000f40)="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", 0x33d}], 0x3}}], 0x2, 0x80) sendto$inet(r10, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) 07:33:19 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x6c00) dup3(r2, r1, 0x0) 07:33:19 executing program 3: clone(0x205, 0x0, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000100)=""/11, 0x1b2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x84a, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, 0x0) 07:33:19 executing program 2: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) [ 190.829008][ T9292] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 07:33:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="74000000240007050000290a0000000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="00080a80000000000300000008000100753332005800020014000500000000000000000000000000000000004000060084941ce8b13c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532e73f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) 07:33:19 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8000fffffffa) 07:33:19 executing program 0: r0 = socket(0x10, 0x803, 0x0) bind$packet(r0, 0x0, 0x0) [ 191.107616][ T9324] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 07:33:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="74000000240007050000290a0000000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="00080a80000000000300000008000100753332005800020014000500000000000000000000000000000000004000060084941ce8b13c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532e73f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) 07:33:19 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x40042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000143000/0x2000)=nil, 0x3) [ 191.387625][ T9339] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 07:33:19 executing program 4: creat(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r0, 0x4c01) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r3) 07:33:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/169, 0xa9}], 0x1, 0x0) 07:33:20 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x6c060000) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fc9fe0)={0xffffffffffffffff, &(0x7f0000e7d000), 0x0}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:33:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) 07:33:20 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) write$P9_RATTACH(r0, &(0x7f0000000180)={0x14}, 0x14) 07:33:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='!N\x00\x00\x00\x00y '], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'memory'}]}, 0x8) write$cgroup_int(r5, &(0x7f0000000200), 0x7000) 07:33:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="74000000240007050000290a0000000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="00080a80000000000300000008000100753332005800020014000500000000000000000000000000000000004000060084941ce8b13c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532e73f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) [ 191.718338][ T9361] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 07:33:20 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x0, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x48041, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) waitid$P_PIDFD(0x3, r2, &(0x7f0000000440), 0x0, &(0x7f0000000580)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) socket(0x10, 0x2, 0x0) setsockopt$packet_drop_memb(r5, 0x107, 0x2, &(0x7f0000000180)={0x0, 0x1, 0x6, @remote}, 0x10) getsockopt$inet_pktinfo(r5, 0x0, 0x29, 0x0, &(0x7f0000000240)=0x93) setsockopt$sock_int(r5, 0x1, 0x13, 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000240)={0x18}) r6 = epoll_create1(0x80000) fsetxattr(r6, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) unshare(0x0) sched_setattr(0x0, &(0x7f0000000400)={0x30, 0x1, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b4}, &(0x7f0000000200)={0x0, r7+30000000}, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x20000000000003fa) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 191.764649][ T9364] IPVS: ftp: loaded support on port[0] = 21 07:33:20 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="850000002a000000a5000000000000009500000000000000d1e68e0a357ac874f768a4781e0a881076ab6561a53cc62bf58a07610536fb3177259cd10ca8c3de5d307022a31a4df754b2d3cd7f0ae9a9521a1985c23c67a124243ebcfff03d233762420968ee0019a265905ec89e922ac72c004a680de06bd99354e31b95d29afa436e72f6de7f4731cb8c20011f542e70f5a8b304578965d6f5677a922d5fce40c3bc399bb8da508e8d6554bcd65256dff322b38fcfe722cbe09b777bd70c34cba3b7473f6efe506816826cb3e763"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r2, 0x0, 0x0}, 0x10) 07:33:20 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, @igmp={0x12, 0x0, 0x0, @remote}}}}}, 0x0) 07:33:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="74000000240007050000290a0000000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="00080a80000000000300000008000100753332005800020014000500000000000000000000000000000000004000060084941ce8b13c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532e73f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) 07:33:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup(0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x400880c, &(0x7f0000000000)={0x2, 0x4620, @multicast2}, 0x10) close(r3) 07:33:20 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x8001) 07:33:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x40000000000025d, 0x0) 07:33:20 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) 07:33:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="74000000240007050000290a0000000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="00080a80000000000300000008000100753332005800020014000500000000000000000000000000000000004000060084941ce8b13c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532e73f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) 07:33:20 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x0, 0x0) 07:33:20 executing program 5: ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)=0x90010) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000001c0)=[{0x200000000006, 0x0, 0x0, 0x50000}]}) ioctl$TCSETA(0xffffffffffffff9c, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) 07:33:20 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_gettime(r0, 0x0) 07:33:20 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$KDSKBSENT(r0, 0x4b49, 0x0) 07:33:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\a'], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="74000000240007050000290a0000000000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="00080a80000000000300000008000100753332005800020014000500000000000000000000000000000000004000060084941ce8b13c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000000000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532e73f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) [ 192.316534][ T420] tipc: TX() has been purged, node left! [ 192.363239][ T9414] ================================================================== [ 192.371709][ T9414] BUG: KASAN: slab-out-of-bounds in bpf_prog_create+0xe9/0x250 [ 192.379276][ T9414] Read of size 64 at addr ffff8880a6f0bb00 by task syz-executor.3/9414 [ 192.387533][ T9414] [ 192.389896][ T9414] CPU: 1 PID: 9414 Comm: syz-executor.3 Not tainted 5.4.0-syzkaller #0 [ 192.398152][ T9414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.408245][ T9414] Call Trace: [ 192.411563][ T9414] dump_stack+0x197/0x210 [ 192.416013][ T9414] ? bpf_prog_create+0xe9/0x250 [ 192.420893][ T9414] print_address_description.constprop.0.cold+0xd4/0x30b [ 192.427979][ T9414] ? bpf_prog_create+0xe9/0x250 [ 192.432878][ T9414] ? bpf_prog_create+0xe9/0x250 [ 192.437766][ T9414] __kasan_report.cold+0x1b/0x41 [ 192.442726][ T9414] ? find_next_bit+0xc0/0x130 [ 192.447418][ T9414] ? bpf_prog_create+0xe9/0x250 [ 192.452279][ T9414] kasan_report+0x12/0x20 [ 192.456703][ T9414] check_memory_region+0x134/0x1a0 [ 192.461820][ T9414] memcpy+0x24/0x50 [ 192.465650][ T9414] bpf_prog_create+0xe9/0x250 [ 192.470342][ T9414] get_filter.isra.0+0x108/0x1a0 [ 192.475293][ T9414] ? ppp_push+0x1290/0x1290 [ 192.480348][ T9414] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.486608][ T9414] ? _copy_from_user+0x12c/0x1a0 [ 192.491569][ T9414] ppp_ioctl+0x12f7/0x2750 [ 192.496008][ T9414] ? ppp_nl_newlink+0x2a0/0x2a0 [ 192.500882][ T9414] ? ppp_nl_newlink+0x2a0/0x2a0 [ 192.505759][ T9414] do_vfs_ioctl+0x977/0x14e0 [ 192.510353][ T9414] ? compat_ioctl_preallocate+0x220/0x220 [ 192.516076][ T9414] ? __fget+0x37f/0x550 [ 192.520279][ T9414] ? ksys_dup3+0x3e0/0x3e0 [ 192.524711][ T9414] ? nsecs_to_jiffies+0x30/0x30 [ 192.529658][ T9414] ? tomoyo_file_ioctl+0x23/0x30 [ 192.534602][ T9414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 192.534628][ T9414] ? security_file_ioctl+0x8d/0xc0 [ 192.534644][ T9414] ksys_ioctl+0xab/0xd0 [ 192.534662][ T9414] __x64_sys_ioctl+0x73/0xb0 [ 192.534678][ T9414] do_syscall_64+0xfa/0x790 [ 192.559408][ T9414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.565310][ T9414] RIP: 0033:0x45a679 [ 192.569204][ T9414] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.589349][ T9414] RSP: 002b:00007f08ce007c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 192.597756][ T9414] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 192.605731][ T9414] RDX: 0000000020000080 RSI: 0000000040107447 RDI: 0000000000000003 [ 192.613705][ T9414] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 192.621798][ T9414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08ce0086d4 [ 192.629770][ T9414] R13: 00000000004c47ce R14: 00000000004d9f50 R15: 00000000ffffffff [ 192.637754][ T9414] [ 192.640075][ T9414] Allocated by task 9414: [ 192.644389][ T9414] save_stack+0x23/0x90 [ 192.648529][ T9414] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 192.654150][ T9414] kasan_kmalloc+0x9/0x10 [ 192.658478][ T9414] __kmalloc_track_caller+0x15f/0x760 [ 192.663833][ T9414] memdup_user+0x26/0xb0 [ 192.668059][ T9414] get_filter.isra.0+0xd7/0x1a0 [ 192.672894][ T9414] ppp_ioctl+0x12f7/0x2750 [ 192.677294][ T9414] do_vfs_ioctl+0x977/0x14e0 [ 192.681871][ T9414] ksys_ioctl+0xab/0xd0 [ 192.686009][ T9414] __x64_sys_ioctl+0x73/0xb0 [ 192.690583][ T9414] do_syscall_64+0xfa/0x790 [ 192.695106][ T9414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.700975][ T9414] [ 192.703311][ T9414] Freed by task 9019: [ 192.707276][ T9414] save_stack+0x23/0x90 [ 192.711426][ T9414] __kasan_slab_free+0x102/0x150 [ 192.716363][ T9414] kasan_slab_free+0xe/0x10 [ 192.720852][ T9414] kfree+0x10a/0x2c0 [ 192.724732][ T9414] tomoyo_find_next_domain+0x6e7/0x1f6c [ 192.730261][ T9414] tomoyo_bprm_check_security+0x124/0x1a0 [ 192.735966][ T9414] security_bprm_check+0x63/0xb0 [ 192.740888][ T9414] search_binary_handler+0x71/0x570 [ 192.746082][ T9414] __do_execve_file.isra.0+0x1329/0x22b0 [ 192.751728][ T9414] __x64_sys_execve+0x8f/0xc0 [ 192.756422][ T9414] do_syscall_64+0xfa/0x790 [ 192.760925][ T9414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.766928][ T9414] [ 192.769256][ T9414] The buggy address belongs to the object at ffff8880a6f0bb00 [ 192.769256][ T9414] which belongs to the cache kmalloc-32 of size 32 [ 192.783127][ T9414] The buggy address is located 0 bytes inside of [ 192.783127][ T9414] 32-byte region [ffff8880a6f0bb00, ffff8880a6f0bb20) [ 192.796217][ T9414] The buggy address belongs to the page: [ 192.801832][ T9414] page:ffffea00029bc2c0 refcount:1 mapcount:0 mapping:ffff8880aa4001c0 index:0xffff8880a6f0bfc1 [ 192.812248][ T9414] raw: 00fffe0000000200 ffffea00028deb88 ffffea00027b83c8 ffff8880aa4001c0 [ 192.820821][ T9414] raw: ffff8880a6f0bfc1 ffff8880a6f0b000 000000010000003f 0000000000000000 [ 192.829382][ T9414] page dumped because: kasan: bad access detected [ 192.835781][ T9414] [ 192.838092][ T9414] Memory state around the buggy address: [ 192.843707][ T9414] ffff8880a6f0ba00: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 192.851765][ T9414] ffff8880a6f0ba80: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 192.859812][ T9414] >ffff8880a6f0bb00: 00 fc fc fc fc fc fc fc fb fb fb fb fc fc fc fc [ 192.867885][ T9414] ^ [ 192.872218][ T9414] ffff8880a6f0bb80: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 192.880264][ T9414] ffff8880a6f0bc00: fb fb fb fb fc fc fc fc 00 fc fc fc fc fc fc fc [ 192.889170][ T9414] ================================================================== [ 192.897228][ T9414] Disabling lock debugging due to kernel taint [ 192.904677][ C0] protocol 88fb is buggy, dev hsr_slave_0 07:33:21 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x373, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r1 = getpid() socket$nl_route(0x10, 0x3, 0x0) tkill(r1, 0x9) socket$packet(0x11, 0x0, 0x300) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/89], 0x3}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32, @ANYBLOB="0008008000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000100000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) r5 = socket(0x10, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000000)={0x7ff}, 0x10) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000600)=ANY=[@ANYRES16=r5, @ANYRES32=0x0, @ANYBLOB="0000000000000000740012000c0001006970366772650000640002000800050040000000080002000100000008000300020000000800050007000000080010004e210000040012000800080008000000080005000200000008000100", @ANYBLOB="14000700b0c7828d68f5b703e3bfda0f00"], 0x4}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r6, 0x0, 0x0) sendmmsg(r6, &(0x7f000000ac80), 0x66, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$inet6(0xa, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'\xf4eam0@\x00\x00\b\x00', r7}) [ 192.905359][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 192.910466][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 192.916314][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 192.922103][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 192.937598][ T9414] Kernel panic - not syncing: panic_on_warn set ... [ 192.944243][ T9414] CPU: 1 PID: 9414 Comm: syz-executor.3 Tainted: G B 5.4.0-syzkaller #0 [ 192.953905][ T9414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.963969][ T9414] Call Trace: [ 192.967280][ T9414] dump_stack+0x197/0x210 [ 192.971636][ T9414] panic+0x2e3/0x75c [ 192.975545][ T9414] ? add_taint.cold+0x16/0x16 [ 192.980238][ T9414] ? bpf_prog_create+0xe9/0x250 [ 192.985104][ T9414] ? preempt_schedule+0x4b/0x60 [ 192.989967][ T9414] ? ___preempt_schedule+0x16/0x18 [ 192.995092][ T9414] ? trace_hardirqs_on+0x5e/0x240 [ 192.999129][ T4079] kobject: 'loop1' (00000000264e1bce): kobject_uevent_env [ 193.000302][ T9414] ? bpf_prog_create+0xe9/0x250 [ 193.000322][ T9414] end_report+0x47/0x4f [ 193.016535][ T9414] ? bpf_prog_create+0xe9/0x250 [ 193.020770][ T4079] kobject: 'loop1' (00000000264e1bce): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 193.021392][ T9414] __kasan_report.cold+0xe/0x41 [ 193.021414][ T9414] ? find_next_bit+0xc0/0x130 [ 193.041181][ T9414] ? bpf_prog_create+0xe9/0x250 [ 193.046013][ T4079] kobject: 'loop5' (000000002ed70430): kobject_uevent_env [ 193.046052][ T9414] kasan_report+0x12/0x20 [ 193.057477][ T9414] check_memory_region+0x134/0x1a0 [ 193.058700][ T4079] kobject: 'loop5' (000000002ed70430): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 193.062596][ T9414] memcpy+0x24/0x50 [ 193.062616][ T9414] bpf_prog_create+0xe9/0x250 [ 193.081222][ T9414] get_filter.isra.0+0x108/0x1a0 [ 193.086192][ T9414] ? ppp_push+0x1290/0x1290 [ 193.090714][ T9414] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 193.096971][ T9414] ? _copy_from_user+0x12c/0x1a0 [ 193.101922][ T9414] ppp_ioctl+0x12f7/0x2750 [ 193.106525][ T9414] ? ppp_nl_newlink+0x2a0/0x2a0 [ 193.111385][ T9414] ? ppp_nl_newlink+0x2a0/0x2a0 [ 193.116222][ T9414] do_vfs_ioctl+0x977/0x14e0 [ 193.120798][ T9414] ? compat_ioctl_preallocate+0x220/0x220 [ 193.126500][ T9414] ? __fget+0x37f/0x550 [ 193.130638][ T9414] ? ksys_dup3+0x3e0/0x3e0 [ 193.135037][ T9414] ? nsecs_to_jiffies+0x30/0x30 [ 193.139872][ T9414] ? tomoyo_file_ioctl+0x23/0x30 [ 193.144792][ T9414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.151016][ T9414] ? security_file_ioctl+0x8d/0xc0 [ 193.156199][ T9414] ksys_ioctl+0xab/0xd0 [ 193.160340][ T9414] __x64_sys_ioctl+0x73/0xb0 [ 193.164915][ T9414] do_syscall_64+0xfa/0x790 [ 193.169489][ T9414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.175364][ T9414] RIP: 0033:0x45a679 [ 193.179241][ T9414] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.198827][ T9414] RSP: 002b:00007f08ce007c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 193.207222][ T9414] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a679 [ 193.215179][ T9414] RDX: 0000000020000080 RSI: 0000000040107447 RDI: 0000000000000003 [ 193.223129][ T9414] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 193.231082][ T9414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f08ce0086d4 [ 193.239035][ T9414] R13: 00000000004c47ce R14: 00000000004d9f50 R15: 00000000ffffffff [ 193.248468][ T9414] Kernel Offset: disabled [ 193.252800][ T9414] Rebooting in 86400 seconds..