[ OK ] Started Getty on tty2. Starting Load/Save RF Kill Switch Status... [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Load/Save RF Kill Switch Status. [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.137' (ECDSA) to the list of known hosts. 2020/10/10 06:20:39 fuzzer started 2020/10/10 06:20:40 dialing manager at 10.128.0.26:37207 2020/10/10 06:20:40 syscalls: 3449 2020/10/10 06:20:40 code coverage: enabled 2020/10/10 06:20:40 comparison tracing: enabled 2020/10/10 06:20:40 extra coverage: enabled 2020/10/10 06:20:40 setuid sandbox: enabled 2020/10/10 06:20:40 namespace sandbox: enabled 2020/10/10 06:20:40 Android sandbox: /sys/fs/selinux/policy does not exist 2020/10/10 06:20:40 fault injection: enabled 2020/10/10 06:20:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/10/10 06:20:40 net packet injection: enabled 2020/10/10 06:20:40 net device setup: enabled 2020/10/10 06:20:40 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/10/10 06:20:40 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/10/10 06:20:40 USB emulation: enabled 2020/10/10 06:20:40 hci packet injection: enabled 2020/10/10 06:20:40 wifi device emulation: enabled 06:23:48 executing program 0: 06:23:48 executing program 1: 06:23:48 executing program 2: 06:23:49 executing program 3: 06:23:49 executing program 4: 06:23:49 executing program 5: syzkaller login: [ 250.381544][ T6891] IPVS: ftp: loaded support on port[0] = 21 [ 250.539070][ T6891] chnl_net:caif_netlink_parms(): no params data found [ 250.595860][ T6893] IPVS: ftp: loaded support on port[0] = 21 [ 250.751292][ T6891] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.760103][ T6891] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.769800][ T6891] device bridge_slave_0 entered promiscuous mode [ 250.783088][ T6891] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.801190][ T6891] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.809662][ T6891] device bridge_slave_1 entered promiscuous mode [ 250.838608][ T6891] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 250.851935][ T6891] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 250.930909][ T6891] team0: Port device team_slave_0 added [ 250.942518][ T6891] team0: Port device team_slave_1 added [ 250.988090][ T6895] IPVS: ftp: loaded support on port[0] = 21 [ 251.020495][ T6891] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 251.028113][ T6891] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 251.057779][ T6891] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 251.084257][ T6891] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 251.091206][ T6891] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 251.127416][ T6891] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 251.150520][ T6893] chnl_net:caif_netlink_parms(): no params data found [ 251.249178][ T6899] IPVS: ftp: loaded support on port[0] = 21 [ 251.253714][ T6897] IPVS: ftp: loaded support on port[0] = 21 [ 251.331393][ T6891] device hsr_slave_0 entered promiscuous mode [ 251.346775][ T6891] device hsr_slave_1 entered promiscuous mode [ 251.520475][ T6904] IPVS: ftp: loaded support on port[0] = 21 [ 251.577975][ T6893] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.585487][ T6893] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.593126][ T6893] device bridge_slave_0 entered promiscuous mode [ 251.607759][ T6893] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.615912][ T6893] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.623523][ T6893] device bridge_slave_1 entered promiscuous mode [ 251.703569][ T6893] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 251.742692][ T6893] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 251.808138][ T6895] chnl_net:caif_netlink_parms(): no params data found [ 251.852776][ T6893] team0: Port device team_slave_0 added [ 251.897445][ T6893] team0: Port device team_slave_1 added [ 251.953935][ T6893] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 251.963228][ T6893] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 251.989936][ T6893] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 252.092768][ T6893] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 252.101110][ T6893] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 252.127731][ T6893] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 252.237902][ T6895] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.250129][ T6895] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.259516][ T6895] device bridge_slave_0 entered promiscuous mode [ 252.307199][ T6897] chnl_net:caif_netlink_parms(): no params data found [ 252.319317][ T6893] device hsr_slave_0 entered promiscuous mode [ 252.328317][ T6893] device hsr_slave_1 entered promiscuous mode [ 252.335354][ T6893] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 252.343154][ T6893] Cannot create hsr debugfs directory [ 252.349941][ T6895] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.357314][ T6895] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.367353][ T6895] device bridge_slave_1 entered promiscuous mode [ 252.375554][ T6899] chnl_net:caif_netlink_parms(): no params data found [ 252.385265][ T48] Bluetooth: hci0: command 0x0409 tx timeout [ 252.394865][ T6904] chnl_net:caif_netlink_parms(): no params data found [ 252.484779][ T6891] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 252.533027][ T6895] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 252.542964][ T6891] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 252.582467][ T6895] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 252.592092][ T6891] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 252.624011][ T48] Bluetooth: hci1: command 0x0409 tx timeout [ 252.654110][ T6891] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 252.718681][ T6897] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.726414][ T6897] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.734461][ T6897] device bridge_slave_0 entered promiscuous mode [ 252.773165][ T6895] team0: Port device team_slave_0 added [ 252.779784][ T6897] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.787888][ T6897] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.796186][ T6897] device bridge_slave_1 entered promiscuous mode [ 252.821777][ T6899] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.838933][ T6899] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.849087][ T6899] device bridge_slave_0 entered promiscuous mode [ 252.857484][ T6904] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.864569][ T48] Bluetooth: hci2: command 0x0409 tx timeout [ 252.872704][ T6904] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.882163][ T6904] device bridge_slave_0 entered promiscuous mode [ 252.891428][ T6895] team0: Port device team_slave_1 added [ 252.932756][ T6899] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.944301][ T6899] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.952041][ T6899] device bridge_slave_1 entered promiscuous mode [ 252.960564][ T6904] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.969293][ T6904] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.980087][ T6904] device bridge_slave_1 entered promiscuous mode [ 252.989061][ T6895] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 252.996366][ T6895] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.022664][ T6895] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 253.056737][ T6897] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.081529][ T6895] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 253.088991][ T6895] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.114981][ T48] Bluetooth: hci3: command 0x0409 tx timeout [ 253.121196][ T6895] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 253.142576][ T6897] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.178806][ T6893] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 253.197640][ T6904] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.222623][ T6904] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.237860][ T6899] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.248964][ T6893] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 253.261860][ T6893] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 253.271913][ T48] Bluetooth: hci4: command 0x0409 tx timeout [ 253.291795][ T6895] device hsr_slave_0 entered promiscuous mode [ 253.299483][ T6895] device hsr_slave_1 entered promiscuous mode [ 253.307035][ T6895] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 253.315544][ T6895] Cannot create hsr debugfs directory [ 253.329076][ T6899] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.346239][ T6893] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 253.360704][ T6897] team0: Port device team_slave_0 added [ 253.370326][ T6897] team0: Port device team_slave_1 added [ 253.402689][ T6904] team0: Port device team_slave_0 added [ 253.449985][ T6899] team0: Port device team_slave_0 added [ 253.459172][ T6904] team0: Port device team_slave_1 added [ 253.483151][ T6897] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 253.490950][ T6897] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.503964][ T39] Bluetooth: hci5: command 0x0409 tx timeout [ 253.517566][ T6897] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 253.539238][ T6897] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 253.546277][ T6897] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.573649][ T6897] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 253.591739][ T6899] team0: Port device team_slave_1 added [ 253.610201][ T6904] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 253.621391][ T6904] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.648593][ T6904] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 253.694257][ T6904] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 253.701345][ T6904] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.731465][ T6904] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 253.762475][ T6899] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 253.769830][ T6899] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.796544][ T6899] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 253.851776][ T6897] device hsr_slave_0 entered promiscuous mode [ 253.859738][ T6897] device hsr_slave_1 entered promiscuous mode [ 253.867421][ T6897] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 253.875085][ T6897] Cannot create hsr debugfs directory [ 253.888759][ T6899] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 253.901773][ T6899] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 253.928552][ T6899] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 253.961187][ T6904] device hsr_slave_0 entered promiscuous mode [ 253.969890][ T6904] device hsr_slave_1 entered promiscuous mode [ 253.977424][ T6904] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 253.985902][ T6904] Cannot create hsr debugfs directory [ 254.096233][ T6899] device hsr_slave_0 entered promiscuous mode [ 254.106203][ T6899] device hsr_slave_1 entered promiscuous mode [ 254.112696][ T6899] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 254.121174][ T6899] Cannot create hsr debugfs directory [ 254.165072][ T6891] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.229267][ T6895] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 254.247656][ T6895] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 254.284739][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.293360][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.307390][ T6891] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.328071][ T6895] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 254.363975][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.372670][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.386280][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.393487][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.412840][ T6895] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 254.446613][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.462550][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.472282][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.481013][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.488156][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.503892][ T17] Bluetooth: hci0: command 0x041b tx timeout [ 254.514984][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 254.585562][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 254.600122][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 254.609082][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.668753][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 254.677115][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.687031][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.696003][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.703637][ T17] Bluetooth: hci1: command 0x041b tx timeout [ 254.707244][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.731592][ T6897] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 254.751831][ T6897] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 254.772496][ T6893] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.798759][ T6897] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 254.808851][ T6897] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 254.819978][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.829518][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.868281][ T6891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.902884][ T6904] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 254.920035][ T6904] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 254.943971][ T39] Bluetooth: hci2: command 0x041b tx timeout [ 254.956897][ T6899] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 254.971223][ T6899] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 254.987976][ T6904] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 254.999844][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.010848][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.031968][ T6893] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.040865][ T6899] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 255.055307][ T6899] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 255.070293][ T6904] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 255.100768][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.112163][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.121481][ T2662] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.128593][ T2662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.176096][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.184851][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.193342][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.202020][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.209216][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.217532][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 255.225259][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.232647][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 255.241675][ T5] Bluetooth: hci3: command 0x041b tx timeout [ 255.256519][ T6891] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 255.310654][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 255.320908][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 255.330260][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.347893][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 255.356240][ T5] Bluetooth: hci4: command 0x041b tx timeout [ 255.381270][ T6895] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.393219][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 255.404150][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.449107][ T6893] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 255.460094][ T6893] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 255.472704][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 255.482347][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 255.491389][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 255.501483][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 255.510570][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 255.519545][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 255.528499][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 255.549715][ T6891] device veth0_vlan entered promiscuous mode [ 255.570572][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 255.580023][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.589289][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 255.597485][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 255.613906][ T17] Bluetooth: hci5: command 0x041b tx timeout [ 255.627176][ T6895] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.644566][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.652364][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.679810][ T6891] device veth1_vlan entered promiscuous mode [ 255.698979][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 255.707417][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 255.715951][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 255.723321][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.741753][ T6893] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 255.755036][ T6897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.788707][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 255.800623][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 255.809515][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.816735][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.826685][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.836601][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.845103][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.852152][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.859926][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 255.872823][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 255.918072][ T6904] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.943904][ T6899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.953668][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 255.962368][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 255.980224][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.011795][ T6891] device veth0_macvtap entered promiscuous mode [ 256.030389][ T6891] device veth1_macvtap entered promiscuous mode [ 256.050761][ T6897] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.061326][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 256.069403][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 256.079866][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.088641][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.097104][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.105326][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 256.114423][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 256.122748][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 256.131212][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.139380][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.147653][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 256.156930][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 256.167796][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.176686][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.192845][ T6899] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.206940][ T6904] 8021q: adding VLAN 0 to HW filter on device team0 [ 256.229282][ T6895] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 256.242187][ T6895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 256.251217][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 256.260344][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 256.268610][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 256.276458][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 256.285422][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 256.294199][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.302674][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.312414][ T39] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.319525][ T39] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.334035][ T6891] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 256.376677][ T6893] device veth0_vlan entered promiscuous mode [ 256.387406][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.396504][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.405562][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.414246][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.421269][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.429857][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 256.438832][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 256.447717][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.456975][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.466390][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.473512][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.481361][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.490885][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 256.499530][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.524143][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 256.532875][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 256.553769][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.560872][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.573905][ T6891] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 256.602059][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.612398][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.620667][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.630907][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 256.639962][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 256.649102][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 256.657895][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.667675][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 256.675259][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 256.682653][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.691528][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.700035][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.707168][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.726548][ T17] Bluetooth: hci0: command 0x040f tx timeout [ 256.739228][ T6893] device veth1_vlan entered promiscuous mode [ 256.756797][ T6895] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 256.783378][ T39] Bluetooth: hci1: command 0x040f tx timeout [ 256.789445][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 256.797503][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 256.806886][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 256.816395][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.823504][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.831035][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.839931][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.848726][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.857354][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 256.867211][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 256.876088][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 256.884714][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 256.892927][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 256.901329][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 256.911923][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 256.920656][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 256.934701][ T6891] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.952526][ T6891] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.961401][ T6891] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.970172][ T6891] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.988046][ T6897] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 256.999943][ T6897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.015083][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 257.023134][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 257.033671][ T5] Bluetooth: hci2: command 0x040f tx timeout [ 257.036067][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 257.049736][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 257.058311][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.067002][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 257.133970][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 257.142688][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.151734][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 257.165296][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.173640][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 257.181041][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 257.216026][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 257.234314][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 257.242860][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 257.259641][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.270023][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 257.273469][ T5] Bluetooth: hci3: command 0x040f tx timeout [ 257.285841][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 257.295251][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.303968][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 257.315773][ T6899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.331770][ T6897] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 257.364022][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 257.371900][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 257.394518][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 257.432849][ T6893] device veth0_macvtap entered promiscuous mode [ 257.439451][ T12] Bluetooth: hci4: command 0x040f tx timeout [ 257.549254][ T6893] device veth1_macvtap entered promiscuous mode [ 257.563573][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 257.571585][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.593977][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 257.601389][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 257.622850][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 257.631578][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.639920][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 257.648686][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.661731][ T6899] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 257.672303][ T17] Bluetooth: hci5: command 0x040f tx timeout [ 257.694779][ T42] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 257.699580][ T6904] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 257.713094][ T42] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 257.728528][ T6904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 257.762994][ T6893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.777705][ T6893] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.790202][ T6893] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 257.799188][ T6895] device veth0_vlan entered promiscuous mode [ 257.813197][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.820930][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.834605][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 257.842313][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 257.851654][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.860337][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 257.869413][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.894088][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 257.902675][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 257.925897][ T6893] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.954636][ T6893] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.977557][ T6893] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 257.988884][ T6895] device veth1_vlan entered promiscuous mode [ 258.022134][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 258.032576][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 258.042565][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 258.058135][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 258.066712][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 258.079352][ T6893] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.091490][ T6893] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.100515][ T6893] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.109877][ T6893] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.127304][ T6904] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 258.140194][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 258.149530][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 258.165302][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.175534][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.183658][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.197289][ T6897] device veth0_vlan entered promiscuous mode [ 258.218674][ T7] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 258.231482][ T7] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 258.255900][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 258.265194][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 258.275347][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 258.308731][ T6897] device veth1_vlan entered promiscuous mode [ 258.330497][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 258.341810][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 258.362479][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 258.376613][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 258.401591][ T6899] device veth0_vlan entered promiscuous mode 06:23:57 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0xd3, &(0x7f0000000140)=""/211}, &(0x7f0000000240)="cfa667122160fcb0f11cea4453d916bda7", &(0x7f0000000280)=""/41, 0x0, 0x10010, 0x0, 0x0}) [ 258.432229][ T6895] device veth0_macvtap entered promiscuous mode [ 258.509153][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 258.528994][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 06:23:57 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x11, 0x0, @buffer={0x0, 0xd3, &(0x7f0000000140)=""/211}, &(0x7f0000000240)="cfa667122160fcb0f11cea4453d916bda7", &(0x7f0000000280)=""/41, 0x0, 0x10010, 0x0, 0x0}) [ 258.562684][ T6899] device veth1_vlan entered promiscuous mode [ 258.620371][ T6895] device veth1_macvtap entered promiscuous mode [ 258.660883][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 258.674433][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 258.689739][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 06:23:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x1009, 0x0) socket$xdp(0x2c, 0x3, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f00000001c0)=ANY=[@ANYBLOB="9c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000006033000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f300000000000000000000000000000000000000000000000000080000000000bbcbfa9da0f013cd08fc9f9d5c612b6d36788c19ab03699095b38045673cc5b549c919882b37aa0ab7593563cba1ad60c2f474cf35c997790cd60876d8"]) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100), 0xc, &(0x7f0000000500)={0x0, 0xcc}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xdc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$full(0xffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x2104, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r1, &(0x7f0000000000)={0x60002005}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f00000000c0)={0x1, 'vlan0\x00', {}, 0x4}) [ 258.707948][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 258.734092][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 258.742775][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 258.756791][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 258.775778][ T6897] device veth0_macvtap entered promiscuous mode [ 258.784184][ T17] Bluetooth: hci0: command 0x0419 tx timeout [ 258.823854][ C0] hrtimer: interrupt took 28672 ns [ 258.835953][ T6897] device veth1_macvtap entered promiscuous mode [ 258.866776][ T8239] Bluetooth: hci1: command 0x0419 tx timeout [ 258.893027][ T40] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 258.900957][ T40] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 258.919010][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 258.948504][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 258.974267][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 258.989730][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 258.999472][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.009017][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 259.022622][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.041759][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.053989][ T6904] device veth0_vlan entered promiscuous mode [ 259.103471][ T2662] Bluetooth: hci2: command 0x0419 tx timeout [ 259.342887][ T12] Bluetooth: hci3: command 0x0419 tx timeout [ 259.504250][ T12] Bluetooth: hci4: command 0x0419 tx timeout [ 259.743776][ T12] Bluetooth: hci5: command 0x0419 tx timeout [ 259.774942][ T6895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.786384][ T6895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.796339][ T6895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.806813][ T6895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.818502][ T6895] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 259.838746][ T6904] device veth1_vlan entered promiscuous mode [ 259.852088][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 259.860727][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 259.870208][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 259.884660][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 06:23:59 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x5, 0x0) read$alg(r0, 0x0, 0x0) [ 259.896722][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 259.931052][ T6897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.943826][ T6897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.955491][ T6897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.966431][ T6897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 259.977380][ T6897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 259.988722][ T6897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.013246][ T6897] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 260.046720][ T6899] device veth0_macvtap entered promiscuous mode [ 260.062351][ T6895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.081598][ T7] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 260.089959][ T6895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.102177][ T7] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 260.109931][ T6895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.120568][ T6895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.131710][ T6895] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 260.140412][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 260.155444][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 260.164190][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 260.173245][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 260.181818][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 260.191846][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 260.417120][ T6897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.429215][ T6897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.440902][ T6897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.452115][ T6897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.462379][ T6897] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 260.473897][ T6897] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 260.485525][ T6897] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 260.498889][ T6899] device veth1_macvtap entered promiscuous mode 06:23:59 executing program 0: mount$fuse(0x0, &(0x7f00000044c0)='./file0\x00', &(0x7f0000004500)='fuse\x00', 0x0, &(0x7f0000006580)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 260.522914][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 260.530868][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 06:24:00 executing program 0: pselect6(0x0, 0x0, 0x0, &(0x7f0000008f40), &(0x7f0000008f80), &(0x7f0000009000)={&(0x7f0000008fc0), 0x8}) [ 260.563767][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 260.575690][ T6897] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.601361][ T6897] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.612767][ T6897] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.621657][ T6897] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.637788][ T6895] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.646720][ T6895] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.655946][ T6895] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.672642][ T6895] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 06:24:00 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) 06:24:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x24}}, 0x4801) [ 261.117136][ T21] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 261.206506][ T6899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 261.247626][ T6899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.286481][ T6899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 261.325814][ T6899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.356213][ T6899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 261.386402][ T6899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.402247][ T6899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 261.417630][ T6899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.439804][ T6899] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 261.452335][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 261.473264][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.481845][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 261.503347][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.528830][ T6904] device veth0_macvtap entered promiscuous mode [ 261.771677][ T21] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 261.809626][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 261.837687][ T6899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 261.858807][ T6899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.878449][ T6899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 261.890776][ T6899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.911349][ T6899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 261.928895][ T6899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.939203][ T6899] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 261.950121][ T6899] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.964358][ T6899] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 262.015051][ T6904] device veth1_macvtap entered promiscuous mode [ 262.282119][ T21] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 262.308703][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 262.323440][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.333378][ T6899] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.346234][ T6899] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.355083][ T6899] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.371158][ T6899] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.619480][ T21] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 262.663236][ T6904] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.682816][ T6904] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.703007][ T6904] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.714374][ T6904] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.725133][ T6904] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.737316][ T6904] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.750013][ T6904] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.761301][ T6904] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.772012][ T6904] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 262.783632][ T6904] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.796524][ T6904] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 262.834881][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.853536][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.880253][ T42] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 262.884033][ T6904] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.909157][ T42] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 262.912409][ T6904] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.928038][ T6904] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.938718][ T6904] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.949340][ T6904] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 262.960308][ T6904] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.981332][ T6904] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 263.002217][ T6904] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 263.012043][ T6904] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 263.023861][ T6904] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 263.045285][ T6904] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 263.076486][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 263.095606][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 263.110703][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 263.169165][ T40] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 263.199193][ T40] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 263.218662][ T6904] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 263.323841][ T6904] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 263.352275][ T6904] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 263.361486][ T6904] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 263.378506][ T21] tipc: TX() has been purged, node left! [ 263.469460][ T8324] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 263.856626][ T7] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 263.873726][ T7] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 264.170665][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 264.188788][ T7] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 264.223335][ T7] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 264.235340][ T42] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 264.239953][ T3553] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 264.255572][ T42] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 264.286618][ T3553] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 06:24:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000040)="bf76ee3cc18b879e1ef2a8be", 0xc) [ 264.561930][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 264.570137][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 264.593245][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 06:24:04 executing program 3: syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff8000/0x2000)=nil, 0x0, 0x0) [ 264.918358][ T124] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 264.958726][ T124] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 06:24:04 executing program 4: syz_io_uring_setup(0x46b1, &(0x7f0000000a00), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000000a80), &(0x7f0000000ac0)) io_uring_enter(0xffffffffffffffff, 0x31ea, 0x0, 0x0, 0x0, 0x0) [ 265.195461][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 265.216563][ T7] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 265.261203][ T7] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 265.378706][ T39] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 06:24:04 executing program 5: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUTCMAP(r0, 0x4605, &(0x7f00000001c0)={0x604d, 0x1, &(0x7f0000000000)=[0x0], &(0x7f0000000100), &(0x7f0000000140), 0x0}) 06:24:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x75) 06:24:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x81, @loopback}, 0x10) 06:24:04 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x0, 0x99, &(0x7f0000000440)}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x293b02}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:24:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0xf0}, [@IFLA_GSO_MAX_SIZE={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 06:24:04 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x4, 0x70, 0x0, 0x90, 0xfe, 0x81, 0x0, 0x0, 0x80, 0xa, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x288, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x7, 0x4dc, 0x7, 0x9, 0xa7, 0x1}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a210da2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559"}, 0x28) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)=0x10000, 0x12) [ 265.521961][ T8427] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 266.046261][ T8425] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 266.085349][ T8425] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.109089][ T8425] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 266.195346][ T8386] IPVS: ftp: loaded support on port[0] = 21 [ 266.507841][ T8449] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 266.518092][ T8449] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.528534][ T8449] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 266.990980][ T8386] chnl_net:caif_netlink_parms(): no params data found [ 267.198373][ T21] device hsr_slave_0 left promiscuous mode [ 267.206064][ T21] device hsr_slave_1 left promiscuous mode [ 267.213529][ T21] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 267.220961][ T21] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 267.229845][ T21] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 267.239251][ T21] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 267.249539][ T21] device bridge_slave_1 left promiscuous mode [ 267.257994][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.270193][ T21] device bridge_slave_0 left promiscuous mode [ 267.277597][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.293158][ T21] device veth1_macvtap left promiscuous mode [ 267.299328][ T21] device veth0_macvtap left promiscuous mode [ 267.306598][ T21] device veth1_vlan left promiscuous mode [ 267.312914][ T21] device veth0_vlan left promiscuous mode [ 267.822242][ T48] Bluetooth: hci0: command 0x0409 tx timeout [ 269.901475][ T48] Bluetooth: hci0: command 0x041b tx timeout [ 271.652111][ T21] team0 (unregistering): Port device team_slave_1 removed [ 271.667960][ T21] team0 (unregistering): Port device team_slave_0 removed [ 271.685975][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 271.701580][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 271.768075][ T21] bond0 (unregistering): Released all slaves [ 271.839003][ T8386] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.846204][ T8386] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.857340][ T8386] device bridge_slave_0 entered promiscuous mode [ 271.867750][ T8386] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.875202][ T8386] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.883624][ T8386] device bridge_slave_1 entered promiscuous mode [ 271.909770][ T8386] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 271.924719][ T8386] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 271.956577][ T8386] team0: Port device team_slave_0 added [ 271.969601][ T8386] team0: Port device team_slave_1 added [ 271.981194][ T7310] Bluetooth: hci0: command 0x040f tx timeout [ 271.996979][ T8386] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 272.004256][ T8386] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 272.031825][ T8386] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 272.045867][ T8386] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 272.054412][ T8386] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 272.083564][ T8386] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 272.115415][ T8386] device hsr_slave_0 entered promiscuous mode [ 272.123767][ T8386] device hsr_slave_1 entered promiscuous mode [ 272.398436][ T8386] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.435092][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 272.456448][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.475016][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.489261][ T8386] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.506801][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.516541][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.527247][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.534375][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.555394][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.564537][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.574485][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.585259][ T2662] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.592381][ T2662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.633890][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.652251][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 272.688673][ T8324] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.701810][ T8324] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.717893][ T8386] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 272.732285][ T8386] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 272.740981][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.772362][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.779795][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.798659][ T8386] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 272.920221][ T8324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 272.942062][ T8324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.988469][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 273.006102][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.018954][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.036809][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.056492][ T8386] device veth0_vlan entered promiscuous mode [ 273.090165][ T8386] device veth1_vlan entered promiscuous mode [ 273.151999][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 273.160161][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 273.169422][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 273.178795][ T2662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 273.194416][ T8386] device veth0_macvtap entered promiscuous mode [ 273.219183][ T8386] device veth1_macvtap entered promiscuous mode [ 273.243701][ T8386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.254312][ T8386] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.264979][ T8386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.276019][ T8386] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.287256][ T8386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.298785][ T8386] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.308895][ T8386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.322258][ T8386] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.332407][ T8386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 273.343337][ T8386] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.356163][ T8386] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 273.365035][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 273.374709][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.387273][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 273.405665][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 273.422232][ T8386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.435479][ T8386] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.446122][ T8386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.456881][ T8386] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.467224][ T8386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.478144][ T8386] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.488226][ T8386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.500070][ T8386] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.511082][ T8386] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 273.521852][ T8386] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 273.534713][ T8386] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 273.546715][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 273.557206][ T8196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 273.686744][ T42] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 273.721128][ T42] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 273.729764][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 273.808251][ T42] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 273.823512][ T42] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 273.844583][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 06:24:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000013c00)) r0 = socket$unix(0x1, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 06:24:13 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@generic={0x1, 0x0, 0x2}) 06:24:13 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000001c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) 06:24:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/wireless\x00') read$usbfs(r0, &(0x7f0000000040)=""/226, 0xfffffff0) 06:24:13 executing program 2: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) rmdir(&(0x7f00000000c0)='./bus/file0\x00') 06:24:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x1}, 0x11000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x4040005) openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={0x0}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) [ 274.060895][ T48] Bluetooth: hci0: command 0x0419 tx timeout 06:24:13 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@generic={0x1, 0x0, 0x2}) [ 274.166643][ T8706] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. [ 274.326946][ T8707] EXT4-fs warning (device loop0): ext4_enable_quotas:6162: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 06:24:13 executing program 3: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') 06:24:13 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) pselect6(0x40, &(0x7f0000000180)={0x8}, 0x0, 0x0, &(0x7f0000000280), 0x0) 06:24:13 executing program 1: r0 = socket(0x18, 0x0, 0x2) accept4$tipc(r0, 0x0, 0x0, 0x0) [ 274.367891][ T8707] EXT4-fs (loop0): mount failed 06:24:13 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x1}, 0x11000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x4040005) openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz1\x00', 0x200002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={0x0}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) [ 274.503428][ T8707] EXT4-fs warning (device loop0): ext4_enable_quotas:6162: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 06:24:13 executing program 5: [ 274.589501][ T8707] EXT4-fs (loop0): mount failed 06:24:14 executing program 0: 06:24:14 executing program 1: 06:24:14 executing program 3: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') 06:24:14 executing program 2: [ 274.749388][ T8746] binder: 8744:8746 ioctl c0306201 0 returned -14 [ 274.776209][ T8746] binder: 8744:8746 ioctl c0306201 0 returned -14 06:24:14 executing program 1: 06:24:14 executing program 5: 06:24:14 executing program 0: 06:24:14 executing program 2: 06:24:14 executing program 2: 06:24:14 executing program 1: 06:24:14 executing program 4: 06:24:14 executing program 2: 06:24:14 executing program 5: 06:24:14 executing program 1: 06:24:14 executing program 3: r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) mkdirat(r0, &(0x7f0000000980)='./file3\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='./file3\x00', r0, &(0x7f0000000200)='./file0\x00') 06:24:14 executing program 0: 06:24:14 executing program 5: 06:24:14 executing program 2: 06:24:14 executing program 4: 06:24:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="00080007000000ff"]}) 06:24:15 executing program 1: r0 = socket(0x22, 0x2, 0x3) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f00000001c0)) 06:24:15 executing program 5: socket(0x22, 0x3, 0x0) 06:24:15 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) mknod(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 06:24:15 executing program 4: openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) 06:24:15 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000140)) 06:24:15 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCSPGRP(r0, 0x8902, 0xfffffffffffffffe) 06:24:15 executing program 2: socketpair(0x2b, 0x1, 0x100, 0x0) 06:24:15 executing program 0: r0 = socket(0xa, 0x2, 0x0) sendmsg$rds(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4d}, 0x0) 06:24:15 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) read$usbfs(r0, &(0x7f0000000040)=""/226, 0xfffffcb0) 06:24:15 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_GET_CAPABILITIES(r0, 0x8004551a, &(0x7f0000000040)) 06:24:15 executing program 5: socket$phonet_pipe(0x23, 0x5, 0x2) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) syz_open_dev$binderN(&(0x7f0000000240)='/dev/binder#\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000040), 0x0) pselect6(0x40, &(0x7f0000000280), &(0x7f00000002c0)={0x95}, 0x0, 0x0, 0x0) [ 275.992208][ T8800] usb usb5: usbfs: interface 0 claimed by usbfs while 'syz-executor.3' sets config #0 06:24:15 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe431, 0x81) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000040)) 06:24:15 executing program 4: waitid(0x1, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000001c0)) 06:24:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000100), &(0x7f0000000040)=0x4) [ 276.063247][ T8811] usb usb5: usbfs: interface 0 claimed by usbfs while 'syz-executor.3' sets config #0 06:24:15 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)) 06:24:15 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f00000036c0)=[{{0x0, 0x3f000000, &(0x7f00000013c0)=[{&(0x7f0000000100)="1bef6b0c4c954879fdd022b87c3d77718d6f3e0242df22a7b8d936e887", 0xf}, {&(0x7f0000000140)="9b83ef", 0x20000143}], 0x2}}], 0x1, 0x0) 06:24:15 executing program 4: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x0) 06:24:15 executing program 2: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) statx(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f00000006c0)) 06:24:15 executing program 5: r0 = socket(0xa, 0x2, 0x0) sendmsg$rds(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000080)=""/129, 0x81}], 0x1}, 0x8d0) 06:24:15 executing program 0: timer_create(0x7, &(0x7f0000000000)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000040)) timer_gettime(0x0, &(0x7f0000000100)) 06:24:15 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)) 06:24:15 executing program 4: socketpair(0x10, 0x2, 0x1, 0x0) [ 276.457017][ T8831] overlayfs: overlapping lowerdir path 06:24:15 executing program 5: socket$inet_sctp(0x2, 0x6, 0x84) 06:24:16 executing program 2: syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) 06:24:16 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000), 0x26) 06:24:16 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)) 06:24:16 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000000)=0x6, 0x4) 06:24:16 executing program 4: r0 = socket(0x1e, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000000080)={&(0x7f0000000000), 0x10, 0x0}, 0x0) 06:24:16 executing program 0: r0 = socket(0xa, 0x2, 0x0) sendmsg$rds(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000200)=[{0x0}, {0x0}], 0x100000000000008c, &(0x7f0000000480)=[@fadd={0x58, 0x114, 0x6, {{}, 0x0, 0x0}}, @mask_fadd={0x58, 0x114, 0x8, {{}, 0x0, 0x0}}], 0xb0}, 0x0) 06:24:16 executing program 2: syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x80000000, 0x10f202) 06:24:16 executing program 5: prctl$PR_SET_THP_DISABLE(0x29, 0x1) 06:24:16 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) fallocate(r0, 0x3, 0x0, 0xfff000) 06:24:16 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)) 06:24:16 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000140)={0x80, 0x12, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000080)="8b"}) 06:24:16 executing program 5: syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 06:24:16 executing program 2: pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) mq_open(0x0, 0x0, 0x0, &(0x7f0000000040)) pkey_mprotect(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x7, 0xffffffffffffffff) 06:24:16 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x11, &(0x7f0000000100)="e93214fefeea8ba86f272bf5f86bced0c2"}) 06:24:16 executing program 1: ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000000)) 06:24:16 executing program 3: r0 = socket(0x28, 0x1, 0x0) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000a40)={&(0x7f0000000000), 0xc, &(0x7f0000000a00)={0x0}}, 0x0) 06:24:16 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(0xffffffffffffffff, 0x3b65, 0x0) read$dsp(r0, 0x0, 0x0) 06:24:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="58000000710001"], 0x58}}, 0x0) 06:24:16 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, 0x0) 06:24:16 executing program 1: ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000000)) 06:24:17 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) fallocate(r0, 0x3, 0x0, 0xfff000) 06:24:17 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000001780)={0x0, @rc={0x1f, @none}, @l2={0x1f, 0x0, @none}, @ipx={0x4, 0x0, 0x0, "6bf56f25a7a7"}}) 06:24:17 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(0xffffffffffffffff, 0xc1004110, 0x0) 06:24:17 executing program 2: r0 = getpid() ioprio_get$pid(0x3, r0) 06:24:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f00000011c0)={&(0x7f0000000000)=@in={0x2, 0x4e24, @broadcast}, 0x80, 0x0}, 0x0) 06:24:17 executing program 1: ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000000)) 06:24:17 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, 0x0) 06:24:17 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0xe42f, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)) 06:24:17 executing program 5: mmap$snddsp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x7000002, 0xa8132, 0xffffffffffffffff, 0x0) 06:24:17 executing program 2: r0 = socket(0xa, 0x2, 0x0) bind$rose(r0, &(0x7f0000000000)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, 0x0, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x40) 06:24:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x30, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @private2}]}, 0x30}}, 0x0) 06:24:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000340)={'ip_vti0\x00', &(0x7f0000000680)=ANY=[]}) 06:24:18 executing program 2: openat$nullb(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nullb0\x00', 0x40, 0x0) 06:24:18 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0xe42f, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)) 06:24:18 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) 06:24:18 executing program 3: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) pkey_mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 06:24:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 06:24:18 executing program 0: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x2, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x2c) 06:24:18 executing program 5: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_GET(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 06:24:18 executing program 1: r0 = syz_open_dev$usbfs(0x0, 0xe42f, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)) 06:24:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e400001000000000000000400000000000020000000000000000000100000000000200000000000000001000000010000000100000010000000100000000000000000010000000000072d860e1771347e1a50b3cd8162c0fb5", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000001cc0)={[{@barrier='barrier'}]}) 06:24:18 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x3, {0xa, 0x0, 0x0, @remote}}}, 0x32) 06:24:18 executing program 3: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x4000) 06:24:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000000), 0x4) 06:24:18 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) read$usbfs(r0, &(0x7f0000000040)=""/226, 0xfffffcb0) read$usbfs(r0, 0x0, 0x0) [ 279.358388][ T8954] BTRFS: device fsid 9fd069f9-9b51-4f58-b143-43c07f72f4a9 devid 1 transid 7 /dev/loop0 scanned by syz-executor.0 (8954) 06:24:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)=ANY=[]}) 06:24:18 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_REWIND(r0, 0x40084146, 0xfffffffffffffffd) 06:24:18 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "e82d0cdf4885274c3254c4675389a0d8028bf1c36662936df01e0d1635358d4ba90b4a3c548da32f43ac744805932950de4cf8e5097e057a15b376079973a903dd3b3c6f0780a15663781d1bd218f525fa97a199856fd75a30f372c854dd88d6d0e6253881fd5c468e09a5eeae777c765dbcdbff3077062cd1faf4b8b70541a5b4b78c48b7e46724539faaa3c452face662abdc1b1b4291742979442138689265436e76a8d1ab6f56e4a9d582aa878276cd5fa32c104e65f20d7f4df55cd992bf641d7e21786c2ac5023ffc315bfc1667744bf2ebe12a283d68869a3656592e65b02a04619b1e82ecbc14e1e7e618afc45f6f1df1ac0b5e5cb82eb6f77411d69"}) 06:24:18 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)) 06:24:18 executing program 2: r0 = socket(0xa, 0x2, 0x0) sendmsg$rds(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x2, 0x4e21, @loopback}, 0x10, 0x0}, 0x0) [ 279.573024][ T8954] BTRFS info (device loop0): disk space caching is enabled [ 279.617556][ T8954] BTRFS info (device loop0): has skinny extents 06:24:19 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f00000011c0)={0x0, 0x0, 0x0}, 0x0) 06:24:19 executing program 3: pkey_mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) [ 279.849703][ T8954] attempt to access beyond end of device [ 279.862211][ T8954] loop0: rw=4096, want=2064, limit=267 [ 279.876016][ T8954] BTRFS error (device loop0): failed to read chunk root [ 279.998055][ T8954] BTRFS error (device loop0): open_ctree failed [ 280.044858][ T8954] BTRFS info (device loop0): disk space caching is enabled [ 280.059542][ T8954] BTRFS info (device loop0): has skinny extents [ 280.092819][ T8954] attempt to access beyond end of device [ 280.098485][ T8954] loop0: rw=4096, want=2064, limit=267 [ 280.108649][ T8954] BTRFS error (device loop0): failed to read chunk root 06:24:19 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)) 06:24:19 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000080)) 06:24:19 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:19 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000001600)) 06:24:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e400001000000000000000400000000000020000000000000000000100000000000200000000000000001000000010000000100000010000000100000000000000000010000000000072d860e1771347e1a50b3cd8162c0fb5", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000001cc0)={[{@barrier='barrier'}]}) 06:24:19 executing program 3: r0 = socket$pptp(0x18, 0x1, 0x2) connect$pptp(r0, &(0x7f0000000280)={0x18, 0x2, {0x0, @remote}}, 0x1e) [ 280.185392][ T8954] BTRFS error (device loop0): open_ctree failed 06:24:19 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)) 06:24:19 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000140)) 06:24:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='0'], 0x1c}}, 0x0) 06:24:19 executing program 3: r0 = socket(0xa, 0x2, 0x0) sendmsg$rds(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x2, 0x4e21}, 0x10, 0x0}, 0x20000094) 06:24:19 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:19 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)) 06:24:19 executing program 2: r0 = socket(0xa, 0x2, 0x0) connect$rds(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) [ 280.414902][ T9046] BTRFS info (device loop0): disk space caching is enabled 06:24:19 executing program 2: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000080)) 06:24:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, 0x0) [ 280.501213][ T9046] BTRFS info (device loop0): has skinny extents 06:24:20 executing program 2: mmap$snddsp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x5000004, 0xa8132, 0xffffffffffffffff, 0x0) [ 280.699164][ T9046] attempt to access beyond end of device [ 280.725912][ T9046] loop0: rw=4096, want=2064, limit=267 [ 280.740075][ T9046] BTRFS error (device loop0): failed to read chunk root [ 280.828716][ T9046] BTRFS error (device loop0): open_ctree failed 06:24:20 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000040)=@generic={0x0, "2c2e036854bfcf3c8bbe2bff017e72a36e154cf0e5c42a1663f9484bfd8569ff242249e6f064e6ca54be45571377a21e53bce22562ca4ef9f1c5ea9dc32a0f49dc0d1cf40ded0b4dec18933b4c483e0000000000000000daee27011deefdabd87651f2f4a73eeb8a22e646773144bdb7118d4734eff55401aabfc0ec00"}, 0x80, &(0x7f0000001500)=[{0x0}, {0x0}, {&(0x7f0000000280)='$', 0x1}], 0x3}, 0x0) 06:24:20 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)) 06:24:20 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:20 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x8}, 0x0, &(0x7f00000001c0), 0x0) 06:24:20 executing program 4: r0 = socket(0xa, 0x2, 0x0) sendmsg$rds(r0, &(0x7f00000007c0)={&(0x7f0000000000)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000080)=""/129, 0x81}], 0x1}, 0x0) 06:24:20 executing program 2: socket$phonet_pipe(0x23, 0x5, 0x2) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) pselect6(0x40, &(0x7f0000000280), &(0x7f00000002c0)={0x95}, 0x0, 0x0, 0x0) 06:24:20 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="54000000040801"], 0x54}}, 0x0) 06:24:20 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x0) [ 281.054255][ T9107] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 06:24:20 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x200821, 0x0) 06:24:20 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)) 06:24:20 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000080)={"990e7ff6c8b323a3faaaa19304703e78"}) 06:24:20 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "e82d0cdf4885274c3254c4675389a0d8028bf1c36662936df01e0d1635358d4ba90b4a3c548da32f43ac744805932950de4cf8e5097e057a15b376079973a903dd3b3c6f0780a15663781d1bd218f525fa97a199856fd75a30f372c854dd88d6d0e6253881fd5c468e09a5eeae777c765dbcdbff3077062cd1faf4b8b70541a5b4b78c48b7e46724539faaa3c452face662abdc1b1b4291742979442138689265436e76a8d1ab6f56e4a9d582aa878276cd5fa32c104e65f20d7f4df55cd992bf641d7e21786c2ac5023ffc315bfc1667744bf2ebe12a283d68869a3656592e65b02a04619b1e82ecbc14e1e7e618afc45f6f1df1ac0b5e5cb82eb6f77411d69"}) 06:24:20 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_CONNECTINFO(r0, 0x40085511, &(0x7f0000000100)) 06:24:20 executing program 2: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)={[{@statfs_percent={'statfs_percent', 0x3d, 0xffff}}]}) 06:24:20 executing program 1: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000000)) 06:24:20 executing program 0: syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7ddb, 0x0) 06:24:20 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2, 0x1, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 06:24:20 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:20 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f00000003c0)=@urb_type_iso={0x0, {}, 0x0, 0x0, &(0x7f0000000040)="fb", 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, [{}]}) 06:24:20 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) [ 281.439400][ T9123] gfs2: statfs_percent mount option requires a numeric argument between 0 and 100 06:24:20 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "8280c33b9268b8f894281c755f433367fef5abe1ffa22a0fab1cbafedbc22d803485b64532573d301c53c39161571794f57c8a39bf10500df2299dfc52a4d3f9", "77abc43534128a4e1892aa5d7b6fd0418b88792c794f11fac210077e8e835a308d881a1b93cb085ada972c4bf0af5771648050a60b6f95d54f252d5108caed56", "3a43c87b6d92ae1a704ee9b0d620119bfc82c8621bd1e2b3fcd5deee9e53b01e"}) 06:24:20 executing program 0: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x4000) 06:24:20 executing program 1: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000000)) 06:24:20 executing program 4: mmap$snddsp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x5000001, 0xa8132, 0xffffffffffffffff, 0x0) 06:24:21 executing program 1: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000000)) [ 281.600475][ T9123] gfs2: statfs_percent mount option requires a numeric argument between 0 and 100 06:24:21 executing program 3: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 06:24:21 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x80800, 0x0) 06:24:21 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, 0x0) 06:24:21 executing program 5: ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:21 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, 0x13, 0xa, 0x201, 0x0, 0x0, {0x3}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 06:24:21 executing program 0: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x4000) 06:24:21 executing program 5: ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:21 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, 0x0) 06:24:21 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 06:24:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[], 0x1c}}, 0x0) 06:24:21 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:21 executing program 0: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x4000) 06:24:21 executing program 5: ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:21 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, 0x0) 06:24:21 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_BULK(r0, 0xc0185502, 0x0) 06:24:21 executing program 3: r0 = fanotify_init(0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_READI_FRAMES(r0, 0x80184151, 0x0) [ 282.159493][ T26] audit: type=1804 audit(1602311061.556:2): pid=9178 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/34/file0/bus" dev="ramfs" ino=34818 res=1 errno=0 06:24:21 executing program 0: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x4000) 06:24:21 executing program 5: r0 = syz_open_dev$usbfs(0x0, 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "e82d0cdf4885274c3254c4675389a0d8028bf1c36662936df01e0d1635358d4ba90b4a3c548da32f43ac744805932950de4cf8e5097e057a15b376079973a903dd3b3c6f0780a15663781d1bd218f525fa97a199856fd75a30f372c854dd88d6d0e6253881fd5c468e09a5eeae777c765dbcdbff3077062cd1faf4b8b70541a5b4b78c48b7e46724539faaa3c452face662abdc1b1b4291742979442138689265436e76a8d1ab6f56e4a9d582aa878276cd5fa32c104e65f20d7f4df55cd992bf641d7e21786c2ac5023ffc315bfc1667744bf2ebe12a283d68869a3656592e65b02a04619b1e82ecbc14e1e7e618afc45f6f1df1ac0b5e5cb82eb6f77411d69"}) 06:24:21 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, 0x0, 0x0) 06:24:21 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$rose(0xb, 0x5, 0x0) 06:24:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f00000011c0)={&(0x7f0000000000)=@in={0x2, 0x4e24, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000001100)=[@timestamping={{0x14}}], 0x18}, 0x0) [ 282.360907][ T26] audit: type=1804 audit(1602311061.766:3): pid=9189 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/34/file0/file0/bus" dev="ramfs" ino=34836 res=1 errno=0 06:24:21 executing program 0: syz_open_dev$usbfs(0x0, 0xe42f, 0x4000) 06:24:21 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:21 executing program 5: r0 = syz_open_dev$usbfs(0x0, 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1e, 0x0, &(0x7f0000000980)="b0ff08c66b0d698cb89e2fe088ca1f74ffff10000000638877fbac14140c", 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:24:21 executing program 1: sendto$rose(0xffffffffffffffff, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0) 06:24:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000380)={0xfffffffffffffffe, 0x45, &(0x7f0000000340)={0x0}}, 0x0) 06:24:22 executing program 0: syz_open_dev$usbfs(0x0, 0xe42f, 0x4000) 06:24:22 executing program 5: r0 = syz_open_dev$usbfs(0x0, 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:22 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, "8280c33b9268b8f894281c755f433367fef5abe1ffa22a0fab1cbafedbc22d803485b64532573d301c53c39161571794f57c8a39bf10500df2299dfc52a4d3f9", "77abc43534128a4e1892aa5d7b6fd0418b88792c794f11fac210077e8e835a308d881a1b93cb085ada972c4bf0af5771648050a60b6f95d54f252d5108caed56", "3a43c87b6d92ae1a704ee9b0d620119bfc82c8621bd1e2b3fcd5deee9e53b01e"}) 06:24:22 executing program 3: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x4, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0}) select(0x40, &(0x7f0000000040)={0x2}, &(0x7f0000000080)={0x8}, 0x0, &(0x7f0000000140)={r0}) 06:24:22 executing program 0: syz_open_dev$usbfs(0x0, 0xe42f, 0x4000) [ 282.855093][ T26] audit: type=1804 audit(1602311062.256:4): pid=9217 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/35/file0/bus" dev="ramfs" ino=34786 res=1 errno=0 06:24:22 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:22 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x0, 0x0) 06:24:22 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x4004081, 0x0, 0x0) 06:24:22 executing program 3: pkey_mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 06:24:22 executing program 0: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x4000) 06:24:22 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:22 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, &(0x7f0000000140)) 06:24:22 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, "8280c33b9268b8f894281c755f433367fef5abe1ffa22a0fab1cbafedbc22d803485b64532573d301c53c39161571794f57c8a39bf10500df2299dfc52a4d3f9", "77abc43534128a4e1892aa5d7b6fd0418b88792c794f11fac210077e8e835a308d881a1b93cb085ada972c4bf0af5771648050a60b6f95d54f252d5108caed56", "3a43c87b6d92ae1a704ee9b0d620119bfc82c8621bd1e2b3fcd5deee9e53b01e"}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1000) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='fsi_master_acf_cmd_abs_addr\x00'}, 0x10) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x2, 0xa, 0x1f, 0x9, "984dc9f8dde16b6c5fe55e2a9db25bde74a2bf6f22a932c227be66061165dc3f3467b47cc6223b483ac1c881904a6a766e9fc57bf16d3d0ac9042f3958f6cb96", "4871867561cabf0c360185da073545ac1a5a49cf7b689636145f5620d3eb137c", [0x8, 0x3]}) 06:24:22 executing program 4: read(0xffffffffffffffff, &(0x7f00000002c0)=""/113, 0x71) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="0287003f5798a4386a2b91f01f74ae"], 0x10}}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mq_getsetattr(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x2004c009, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, 0x0) sendmsg$sock(r2, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000100)="9a97", 0x2}], 0x2}, 0x4004045) splice(r2, 0x0, r1, 0x0, 0x60000, 0x0) [ 283.259104][ T26] audit: type=1804 audit(1602311062.656:5): pid=9239 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/36/file0/bus" dev="ramfs" ino=34927 res=1 errno=0 06:24:22 executing program 0: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x4000) 06:24:22 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'team_slave_1\x00'}) 06:24:22 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:22 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000000)={@broadcast, @empty, @void, {@ipv4={0x800, @dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @multicast1, @multicast2}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "5bf40a", 0x0, "8f9dbe"}}}}}}, 0x0) 06:24:22 executing program 0: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x4000) 06:24:22 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000000), 0x8) 06:24:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x0) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe431, 0x81) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, 0x0) 06:24:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30}, 0x30) 06:24:23 executing program 0: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x0) [ 283.651015][ T26] audit: type=1804 audit(1602311063.056:6): pid=9264 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/37/file0/bus" dev="ramfs" ino=34960 res=1 errno=0 06:24:23 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 06:24:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x0) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "e82d0cdf4885274c3254c4675389a0d8028bf1c36662936df01e0d1635358d4ba90b4a3c548da32f43ac744805932950de4cf8e5097e057a15b376079973a903dd3b3c6f0780a15663781d1bd218f525fa97a199856fd75a30f372c854dd88d6d0e6253881fd5c468e09a5eeae777c765dbcdbff3077062cd1faf4b8b70541a5b4b78c48b7e46724539faaa3c452face662abdc1b1b4291742979442138689265436e76a8d1ab6f56e4a9d582aa878276cd5fa32c104e65f20d7f4df55cd992bf641d7e21786c2ac5023ffc315bfc1667744bf2ebe12a283d68869a3656592e65b02a04619b1e82ecbc14e1e7e618afc45f6f1df1ac0b5e5cb82eb6f77411d69"}) 06:24:23 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$VFIO_CHECK_EXTENSION(0xffffffffffffffff, 0x3b65, 0x0) read$dsp(r0, &(0x7f0000000000)=""/16, 0x10) 06:24:23 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x80800, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 06:24:23 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:23 executing program 0: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x0) 06:24:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30}, 0x30) 06:24:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x0) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:23 executing program 0: syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x0) 06:24:23 executing program 1: 06:24:23 executing program 3: [ 284.215514][ T26] audit: type=1804 audit(1602311063.616:7): pid=9300 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/38/file0/bus" dev="ramfs" ino=35009 res=1 errno=0 06:24:23 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:23 executing program 4: 06:24:23 executing program 0: 06:24:23 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:23 executing program 1: 06:24:23 executing program 3: [ 284.514606][ T26] audit: type=1804 audit(1602311063.916:8): pid=9313 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/39/file0/bus" dev="ramfs" ino=35027 res=1 errno=0 06:24:23 executing program 4: 06:24:23 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:24 executing program 0: 06:24:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:24 executing program 1: 06:24:24 executing program 3: 06:24:24 executing program 4: [ 284.714268][ T26] audit: type=1804 audit(1602311064.116:9): pid=9321 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/40/file0/bus" dev="ramfs" ino=35042 res=1 errno=0 06:24:24 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:24 executing program 0: 06:24:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:24 executing program 1: 06:24:24 executing program 4: 06:24:24 executing program 3: 06:24:24 executing program 0: 06:24:24 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "e82d0cdf4885274c3254c4675389a0d8028bf1c36662936df01e0d1635358d4ba90b4a3c548da32f43ac744805932950de4cf8e5097e057a15b376079973a903dd3b3c6f0780a15663781d1bd218f525fa97a199856fd75a30f372c854dd88d6d0e6253881fd5c468e09a5eeae777c765dbcdbff3077062cd1faf4b8b70541a5b4b78c48b7e46724539faaa3c452face662abdc1b1b4291742979442138689265436e76a8d1ab6f56e4a9d582aa878276cd5fa32c104e65f20d7f4df55cd992bf641d7e21786c2ac5023ffc315bfc1667744bf2ebe12a283d68869a3656592e65b02a04619b1e82ecbc14e1e7e618afc45f6f1df1ac0b5e5cb82eb6f77411d69"}) 06:24:24 executing program 1: 06:24:24 executing program 4: 06:24:24 executing program 3: 06:24:24 executing program 0: 06:24:24 executing program 1: 06:24:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:24 executing program 4: 06:24:24 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:24 executing program 3: 06:24:24 executing program 0: 06:24:24 executing program 1: 06:24:24 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:24 executing program 4: 06:24:24 executing program 0: 06:24:24 executing program 3: 06:24:25 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:25 executing program 1: 06:24:25 executing program 4: 06:24:25 executing program 0: 06:24:25 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:25 executing program 3: 06:24:25 executing program 0: [ 285.791055][ T26] audit: type=1804 audit(1602311065.176:10): pid=9365 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/44/bus" dev="sda1" ino=15900 res=1 errno=0 06:24:25 executing program 1: 06:24:25 executing program 4: 06:24:25 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:25 executing program 0: 06:24:25 executing program 3: 06:24:25 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:25 executing program 4: 06:24:25 executing program 1: 06:24:25 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:25 executing program 0: 06:24:25 executing program 3: [ 286.167409][ T26] audit: type=1804 audit(1602311065.556:11): pid=9379 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/45/bus" dev="sda1" ino=15880 res=1 errno=0 06:24:25 executing program 4: 06:24:25 executing program 1: 06:24:25 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:25 executing program 3: 06:24:25 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:25 executing program 0: 06:24:25 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:25 executing program 4: 06:24:25 executing program 1: 06:24:25 executing program 3: 06:24:25 executing program 0: 06:24:26 executing program 4: 06:24:26 executing program 3: 06:24:26 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f00000001c0)={0x0, 0x0, "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"}) 06:24:26 executing program 1: 06:24:26 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:26 executing program 0: 06:24:26 executing program 4: 06:24:26 executing program 1: 06:24:26 executing program 3: 06:24:26 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, 0x0) 06:24:26 executing program 0: 06:24:26 executing program 1: 06:24:26 executing program 0: 06:24:26 executing program 4: 06:24:26 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, 0x0) 06:24:26 executing program 3: 06:24:26 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:26 executing program 1: 06:24:26 executing program 4: 06:24:26 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0xe42f, 0x1) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x3) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, 0x0) 06:24:26 executing program 0: 06:24:26 executing program 3: 06:24:26 executing program 1: [ 287.311099][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 287.311114][ T26] audit: type=1804 audit(1602311066.706:14): pid=9425 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/48/file0/bus" dev="ramfs" ino=36310 res=1 errno=0 06:24:26 executing program 0: 06:24:26 executing program 4: 06:24:26 executing program 5: 06:24:26 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:26 executing program 3: 06:24:26 executing program 1: 06:24:27 executing program 0: 06:24:27 executing program 4: 06:24:27 executing program 5: 06:24:27 executing program 3: 06:24:27 executing program 1: [ 287.712775][ T26] audit: type=1804 audit(1602311067.106:15): pid=9441 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/49/file0/bus" dev="ramfs" ino=35319 res=1 errno=0 06:24:27 executing program 0: 06:24:27 executing program 4: 06:24:27 executing program 3: 06:24:27 executing program 5: 06:24:27 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:27 executing program 1: 06:24:27 executing program 0: 06:24:27 executing program 4: 06:24:27 executing program 3: 06:24:27 executing program 5: 06:24:27 executing program 0: 06:24:27 executing program 1: 06:24:27 executing program 5: [ 288.127618][ T26] audit: type=1804 audit(1602311067.516:16): pid=9458 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/50/file0/bus" dev="ramfs" ino=36361 res=1 errno=0 06:24:27 executing program 4: 06:24:27 executing program 3: 06:24:27 executing program 1: 06:24:27 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:27 executing program 0: 06:24:27 executing program 5: 06:24:27 executing program 4: 06:24:27 executing program 3: 06:24:27 executing program 1: 06:24:27 executing program 0: 06:24:27 executing program 5: 06:24:27 executing program 4: 06:24:28 executing program 3: [ 288.564497][ T26] audit: type=1804 audit(1602311067.956:17): pid=9470 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/51/file0/bus" dev="ramfs" ino=35423 res=1 errno=0 06:24:28 executing program 4: 06:24:28 executing program 5: 06:24:28 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:28 executing program 1: 06:24:28 executing program 0: 06:24:28 executing program 4: 06:24:28 executing program 3: 06:24:28 executing program 5: 06:24:28 executing program 1: 06:24:28 executing program 3: 06:24:28 executing program 0: 06:24:28 executing program 4: [ 288.975645][ T26] audit: type=1804 audit(1602311068.366:18): pid=9485 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/52/file0/bus" dev="ramfs" ino=36424 res=1 errno=0 06:24:28 executing program 5: 06:24:28 executing program 1: 06:24:28 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:28 executing program 3: 06:24:28 executing program 4: 06:24:28 executing program 0: 06:24:28 executing program 1: 06:24:28 executing program 5: 06:24:28 executing program 1: 06:24:28 executing program 3: 06:24:28 executing program 0: 06:24:28 executing program 4: 06:24:28 executing program 5: [ 289.489647][ T26] audit: type=1804 audit(1602311068.886:19): pid=9501 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/53/file0/bus" dev="ramfs" ino=36451 res=1 errno=0 06:24:28 executing program 3: 06:24:29 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:29 executing program 1: 06:24:29 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) 06:24:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000002240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8}]}, 0x24}}, 0x0) 06:24:29 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@phonet, 0x80, 0x0, 0x0, &(0x7f00000002c0)=ANY=[], 0xd0}, 0x0) 06:24:29 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xfb) recvmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x3) 06:24:29 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) 06:24:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x10}, 0x0) 06:24:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000000)={&(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2d}}}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x268}, 0x20040841) 06:24:29 executing program 5: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xffff4a9e}) 06:24:29 executing program 3: sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0xb87e8c1f99a80034) [ 289.895168][ T26] audit: type=1804 audit(1602311069.286:20): pid=9520 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/54/file0/bus" dev="ramfs" ino=36487 res=1 errno=0 06:24:29 executing program 5: r0 = getpgid(0x0) waitid(0x2, r0, 0x0, 0x4, 0x0) 06:24:29 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:29 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000440)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="18"], 0x19}, 0x0) 06:24:29 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xfb) sendmsg$inet6(r0, &(0x7f0000001540)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=ANY=[], 0x268}, 0x0) 06:24:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000000)="bb", 0x1}], 0x1}, 0x4004090) 06:24:29 executing program 3: sendmsg$NL80211_CMD_UPDATE_OWE_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, 0x0}, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1}}, 0x80, 0x0, 0x0, &(0x7f0000000080)=ANY=[], 0xd0}, 0x0) 06:24:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x400}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x268}, 0x20000001) 06:24:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x40000142) 06:24:29 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)={0x420}, 0x420}}, 0x0) recvmmsg(r0, &(0x7f00000091c0)=[{{0x0, 0x0, &(0x7f0000000a80)=[{0x0}, {0x0}, {&(0x7f00000009c0)=""/90, 0x5a}], 0x3}}], 0x1, 0x0, 0x0) 06:24:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f000000b300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, 0x0) 06:24:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000100)={&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=ANY=[], 0x268}, 0x20008000) [ 290.252150][ T26] audit: type=1804 audit(1602311069.646:21): pid=9545 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/55/file0/bus" dev="ramfs" ino=35598 res=1 errno=0 06:24:29 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0xfb) sendmsg$inet6(r0, &(0x7f0000001540)={&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=ANY=[], 0x268}, 0x0) 06:24:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@txtime={{0x18}}], 0x18}}], 0x2, 0x0) 06:24:29 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:29 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000440)={&(0x7f0000000040)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='h'], 0x68}, 0x4008010) 06:24:29 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000000)={&(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty, 0x805}, 0x1c, 0x0, 0x0, &(0x7f0000001bc0)=ANY=[], 0x268}, 0x0) 06:24:29 executing program 3: mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 06:24:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) write$eventfd(r0, 0x0, 0xfffffffffffffdeb) 06:24:30 executing program 3: clock_nanosleep(0x19d0dd0f2452fbc6, 0x0, 0x0, 0x0) 06:24:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000004940)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000004900)={&(0x7f0000008f40)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x4}, @ETHTOOL_A_DEBUG_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x1e90, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x1001, 0x5, "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"}, @ETHTOOL_A_BITSET_VALUE={0xd5, 0x4, "a089b50a8789e9e0522226ae5cd13dab828267dd902e1dc279c82c5300cd53d311de4f560c79fa404ecd46da0dfbce2173adb719d1c6932f483ac90cf1a3e8ac2aca294b2ac6024fed2545e9ae6dcaa8b116862c1ff044d6af97e7b6f5fb29705f1b98547c232b7679e2189e549e325f339f34abfd038182f6e481b5fe2e75cef07cb1c12de8294f6733c8ebf41ccb6eb8a85171d41d328d7d28e7584bfbc3ce2edc26321fd7a75ddf93026de9bdb7d68446e05a5f818839dc3c13aa0d7305126f526b58ac4284c13b3b3969000ed60ac5"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xda9, 0x4, "b2a50f0be7acb4dabe568488b71bb378b3150b037da689b75a1dbfd4b09c83af026d3a3dfae098722be9b78a9e18cf0447b85d824a0776b6e3d7ed5194090fe1d6808e05e86d286afbdc070ac558580b951a9f01e80f8a5031982f85fc2c3d13659ab879780c607a69b190f2ea975a3f8862e07cefbf1ff7f399cb52a495cab33e1bd2040473360a2501a3964a6320fb0cfb42b0c18fac4f4664534ed605500d164216d9222543eca9afe7c153fbe21aa29c437e860d20906877967709d91300854c2600ce3a110bcdcb7e0e6051daaff8fcc8d56e142690849f96d4342b30853800a6062e94a740973deb7eb71860efc0111f5ae7cd83d0826cc2d7cd0972e4cbed038beddc0d971b48648d8d2dc92458b369cfc877afd45fc2256165081c91b716523a52a7368f36816dd017d960ec95fe42180d084d6dc80dc38dd07af3acd2400bd79677c056c14e8ae3fc29649d8a8d1f10b5dbbc7cc23b344a507f8f19e3b17bf10be379c23921d3d78f68d181e53f27c01b2bf5e247526104a1466bfbc93e6d6806d9a0711919472823e1404d36a5f963322136afd25154a3639e3732da5c524e29bbd0fa1d8c3f604aa426c4bacd5be79fb6558c2672bcd9653ba80de5cce86e45895d0eb6ad6144e4d381c4170c7845f11210c0a3b582740a8ac239cb905044f9998a9f739c3eeb72678a64246daca30ab0169e2418f3eaac2ce7516b71d24d43111cea044b58b7f399772b8c1c5fd7a8206a8bc003a1b08951fbf7007ee588a76fd58e6762300e1f1ddfa0d89871b2bbdae012cc4a2b7a431deccf3f0056ee5b92c989a90177c49ca785b8c040a016b0802570dbcb6a3e42275f1742999906bd6ab57bd246c3eb6503f8432feeb4f898949bd4dff9f583741218d3ee1f7d21a0b49d20ccffdc001c704ab3b327c1b76f7c8f8349076adc3233c317cdc4abe2d05a8c318cda5b1afbbcaacc4d795e3a5eb40c01934d113b8d88b88b5e7247d3f40030bf3db764a671c07b3170c549d82e648050a7820005daaf87bfe0ea107db9281c35c2464bccd72a85cf350d4011d4a5e9d004c6ea14f0c374a1a63b46cec94d9cc04e0cda46e68e478aedaff0585a63a285619ac261900699fd77b21d2d11ba2b37563f1101026301f3f3c954539ccd00592dfe37653950a218a17f9fa047631b7850b7c8e393a40cace15f5b3ebcde624cf66cd845cd0e8c50a6c3cc8ef2be1841b94058f86b0c4cb8caac69617e6c3e153ef7a828f48195af5a822806a0ce24d2564cc90d5cd5ffadd130388b2aed22652e8f8cad7a101c1df4bfff582f30d351d2d4eb670596d04da4edd461bd8dd64f6cc124ac998ad58d7dc86b691ed87646226625a0a45e099dcb853263fee9e277119fbb06ecdcbb446fdd2d4fb1ced69a6aeeaa23e71bfcbd65da4d429fefd8ef8716e9af6b0e5d602b885c6acda4a0075c432735b816872f6f0122e6851edac3330ae540828e9c2c56d61e35e1b8715933c3dea73511cbb109f0f80f40227bceecd8b31b8bc59dcc84440e4ded276d73f56be9aaccc4b4c7854d22a9505e013f9143a275107bf5781db3ac9f4fd8c966974e23ccde4539186d059b74ae5c49d8445bf1e14a67034d36b03410d153faa6776f06c846d4226e48cb35e4e180e0f01c82c70d2b49a53eae281f941df477cb67a6542955ffc8dd5e95d5afd854a1ae1c3c122e8f65ae13e73df392cb7309a9962fac89af92cd057b32c003feb9ac553f18ea99b2bc31f7bd49a7d3189c0aae76ee9fd77737906f6c30959dcb415120a1d5cadc56ab32ca8110bc1e9d2b2165c9e330e46b16dbaad98ac2ba1edaa533546d7fb4bd71a2e5a2b6d517e6b5dd187a98b15600fdbf0cf19fae4c9a620818db33c8b957bdd0ac9b196eb1375d573d1438a58a461194d3dac556e2f3d6f7713ae07fd96d41655b02cc1cebf7ec1e504c6c8a88035705e3280e0c0702f25d2b005ab0b3d37842b1cb8a32ad2eda94a017565cf3454b5af7168b04d1ded2ac28a4aed44018e8ecc3ede76b7c48fcf831a8e5655ab138f5869e0a67db7380416d3740eb2237e1506fa12a23c86df0965bef75347e3adb1d78bf509f72fe0a8848a13e58a10b44422887a43961d1228b03a20925476eb16a0328f5d5d2c13a01393e039b19e89355842f6b88c4ce9e9223f48d3dd07327f9d7b756717aac747a8d26ed8fca6f41a3587245f3e0939420c89a790e2313c70e6e6bd51ad300c92cefb7359e9e33bc422fe91fef601a71fc73078556b0d4537a3687e95c0da0104cde53fee71199a371c05b3630248693dd54b5621538f0f470d55c25b2a10ad1b0515a31ac0c179f835cb94643edbf744b90eedf02e6c49f2a4ba1c49a73cfa9a88179ca71e8b8e218df3c24d9f1f84b45a2938d58a104cdb072110f90bcda4a3c8a744a5a75d5a7b013394aa9b7b43ce6d9bc5a0cca6771fabd753c9ed225b7c9dbb6e0577ee53d285429f46171c5f9b0ffb7a7069f752db28af3bc891ae1b212a8856a16519014f0192c478af2c7380669e0932cf119b071b319051a6119704daf6007bbcc35213ae015abe83dedb51d11bdd3773e5d3d461f8b3348f29a3fea60e08512c0e045beccb713a8326f0b78a3dd560d15d6c32cae607ebdbaa16b919e48d162ad5b061efc474408fa39c27515c284e25327744e4b4a1df14efe2cc731c23417d2aa92da138b323c9956e7ea2ae90c88ac09d6ab75fb6892de4fc88c26c4b79859a3954cc5651075d2d026e6bdb91f55b7fa4db6f2a49206cdc7f0bc7f821367c6e26a28b33e2dfb87a8f89a88f6fed25eccdb8ad9214552aca91167e7336c0ee042a922c647a8e9cdacb957e13113d49cca40353edf2dc53f43722154ae8be71f8862f09f715e39d116dae3ba8eeac5c889859a8e249323fd7208a63ea9cbb564d2692012dd3dcd8852afcb3c249586f5a7529afa31b41de74775fdbf4f167482829f65cec4c4941a1425428d6a06cc81724b48e7c28ce6696d7144b7a77970f5a92b485b19e9438c59348f862b85a1d6d554ddd553b8beb46fb44f9b02514f5294cbcdc0903efe84e31ff562aad0582a99b80045e8a6053d6383d6a16088aabc694b069594eac8ac4f4c3c93ac1a676dac1dccd3afc21d16e21c053abba130ef5b6c0d1129d4b78d61a54571e2984c57ba533f85d8f1cf0559594af5baa20be9fe5037441f65331220f4a255c63552d27f6df5c48ae21bb977543bd1aca3fb8d7fe21f7163b91ebe8a8915b5e2072cecec38d402af021a131b52645804e95f9b6f3a99d4d9cd4bd73959e16298b6961cd5cd26954e7c0ff23f1c8b811d7b136b33d0a6c3ee9326e3e1f775b56656b5eaaf3529588b4dde76cd27cdc8f880575d956265752e4c7fada273db244ad36a8aa61ade6160334a5cfca6e3ef8ee652d6f80f35f3803cf6ab6a8cc50d6e798fad8fdbeb58f4d93098c4ce7fd5e7bd91396f5885b85990d97548db27b3f86e9e807f95fa661452a56918e1ea85650fc8c374cb1a1317b8bc57d85831c7bf9ef45863a9b7572e1a23b6ba28d607a6f96af6ea9466cbb7158b26ed43843401424f14c0aac533acb24383daac1b660c5f8ef668cb335ad400b4ebdf5e12f5f0015bf6da35d5c4046a86e6af470997c84acd0f5614eb122faa8ac30cb6db5b57d7472c76fa13ba1a2b79f4e9a04015cfa696d9c6f8936e3d384abbac97fdbd94f118deab680e86f1b3d26a56024c23404e753d4ca0d49bb7c41ef551b0e25bb2bd49e1e330f189085249f2b548b284f0ff383df3c72cbc9f2ebb9d0cc7e3088514dbfa29920966a79e233d20684c1424e3fc124cf5aaaf1d89f344bd075ce9dcb43e0384b83f47443ff946e78d93ce2d696447abc8f1134f57deff9ea867150b06e69d1852a06dccd66c2c0b28f334190ff08923316a48962d9f07d5af8b81d7fe2404afebda4e71bd52eea9c4e5e4bdacffb860c6405a1e755e93cf1740c88174cd3b13349ee21df2169608e598cd9721f1b662e746fe98bcf7e78bf4b9eb2f15a28763969ac304ffafe31d57ac95fd62c0467cad3e33204e3e99e98cf6074b21791546bbbd1e5059f1c110e868a960907e97c0cada72400f725df36bb82f2a6d3b617521a2839dd2d83a48b608e7451258b81b7c04ca565329824b97aa4a3b861c0e0a1a5d7b38ae20fbb997490184987f0fcad056f8f9ce810435961db26bd9cdab47754e35fcfb00c16c8bcf546a3411d466e92d6e93c4ec9bbac2b2dda297f30a618a2a52479ab4daa68198f5fc5ddddead4d4521a9c281d6b9d03662aea8bc80640f895e22c6c563d55585723f6838935d34a333df4a329ac9d177de525b2c7f4e5a2d54acc3df7775ba9ca6d74a3741062e48b69ada49efee3aad586c8b7a55601a3e7519bc72b21062fb60e59a0b8c1cca6151d98f259c27a18badd84c7781f041e0ebe564d1194605f30367da18e2e17916921e0544d11f22dd59abbb8658cd968fdfdcc7f621a5fc038179f77c91766133d22e2796e4f123115fbe8c3fcfb32f371ef6d04813238cac79f1d15fe2079d899ab38269cd92b754ddf29c762b78d95747abcc38d70781b95d01e017194c1c1105fa1bf151714ee78211b415f404577336c1dcb6a1e46c47a2dddbd4e7d28e46c9800338c0a2898a1d0ad8570771b7b4edbfcdffa23e05e55a45aabb08760ebea6e8160b836a323f61277e6cbc4c9d7be872d9911a285da0a548b7a2d847406e7cac8bc27d1fdcd0a7acbde85093a79b148c07065418e26ec6675c149e86ca62d4a2b8c348619ce3d35f099fba77f618d30f2b7dcf600d85485ad705d747309cfe6144f8a13087cd747734162b17805c3384349b4cb7b8f0747b9c71e83f1394279cd4ae81155fe733961b7fe028102538d1dd0bb33c9db90ec27fd3bb7cf162576d346a329f"}]}]}, 0x1ec4}}, 0x0) 06:24:30 executing program 4: add_key$fscrypt_provisioning(0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffe02, 0x0) 06:24:30 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$FUSE_INIT(r0, &(0x7f00000001c0)={0x50}, 0x50) write$FUSE_ENTRY(r0, &(0x7f0000000080)={0x90}, 0x90) [ 290.665526][ T26] audit: type=1804 audit(1602311070.057:22): pid=9570 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/56/file0/bus" dev="sda1" ino=15879 res=1 errno=0 06:24:30 executing program 1: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000280)={{0x77359400}, {0x0, 0x3938700}}, 0x0) 06:24:30 executing program 3: 06:24:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, 0x0, 0x0) 06:24:30 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x268}, 0x20000001) 06:24:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f0000000000)=""/172, &(0x7f00000000c0)=0xac) 06:24:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xfb) recvmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x40012100) 06:24:30 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000840)=ANY=[@ANYBLOB='%'], 0x9c}}, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 06:24:30 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000240)=""/5) 06:24:30 executing program 5: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000000000/0x1000)=nil) [ 291.089535][ T26] audit: type=1804 audit(1602311070.487:23): pid=9593 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/57/file0/bus" dev="sda1" ino=15934 res=1 errno=0 06:24:30 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x100010, r0, 0x0) 06:24:30 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x3}]}) 06:24:30 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) unshare(0x8000000) 06:24:30 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect(r0, &(0x7f0000000040)=@un=@file={0x0, './file0\x00'}, 0x80) 06:24:30 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x50709fd8, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000240)=""/5) 06:24:30 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:30 executing program 0: pkey_mprotect(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0xffffffffffffffff) 06:24:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x28, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @dev}]}, 0x28}}, 0x0) 06:24:30 executing program 5: socketpair(0x11, 0x2, 0xfbe2, &(0x7f0000000140)) 06:24:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={&(0x7f0000000040)={0xa, 0x4e21, 0x0, @local}, 0x1c, &(0x7f0000000600)=[{0x0}, {0x0}, {&(0x7f0000000200)="01", 0x1}], 0x3, &(0x7f0000000680)=[@dstopts={{0x18}}], 0x18}, 0x8001) 06:24:30 executing program 0: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x2002) 06:24:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0}, 0x2000c844) 06:24:31 executing program 5: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 06:24:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c, 0x0}, 0x2000c844) 06:24:31 executing program 3: r0 = getpid() perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) 06:24:31 executing program 2: mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect(r0, &(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80) 06:24:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0xc055) 06:24:31 executing program 5: 06:24:31 executing program 1: 06:24:31 executing program 3: 06:24:31 executing program 4: 06:24:31 executing program 5: 06:24:31 executing program 0: 06:24:31 executing program 1: 06:24:31 executing program 4: 06:24:31 executing program 3: 06:24:31 executing program 2: mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:31 executing program 0: 06:24:31 executing program 1: 06:24:31 executing program 5: 06:24:31 executing program 4: 06:24:31 executing program 3: [ 292.366248][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 292.366262][ T26] audit: type=1804 audit(1602311071.757:26): pid=9656 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/60/bus" dev="sda1" ino=15945 res=1 errno=0 06:24:31 executing program 0: 06:24:31 executing program 1: 06:24:31 executing program 5: 06:24:32 executing program 4: 06:24:32 executing program 3: 06:24:32 executing program 2: mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:32 executing program 1: 06:24:32 executing program 5: 06:24:32 executing program 0: 06:24:32 executing program 4: 06:24:32 executing program 3: 06:24:32 executing program 1: [ 292.851831][ T26] audit: type=1804 audit(1602311072.247:27): pid=9672 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/61/bus" dev="sda1" ino=15959 res=1 errno=0 06:24:32 executing program 5: 06:24:32 executing program 4: 06:24:32 executing program 0: 06:24:32 executing program 3: 06:24:32 executing program 1: 06:24:32 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:32 executing program 5: 06:24:32 executing program 4: 06:24:32 executing program 0: 06:24:32 executing program 1: 06:24:32 executing program 3: 06:24:32 executing program 0: 06:24:32 executing program 5: 06:24:32 executing program 4: [ 293.327862][ T26] audit: type=1804 audit(1602311072.717:28): pid=9688 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/62/bus" dev="sda1" ino=15689 res=1 errno=0 06:24:32 executing program 1: 06:24:32 executing program 3: 06:24:32 executing program 5: 06:24:32 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:32 executing program 0: 06:24:32 executing program 4: 06:24:32 executing program 3: 06:24:32 executing program 1: 06:24:33 executing program 5: 06:24:33 executing program 0: 06:24:33 executing program 4: [ 293.693580][ T26] audit: type=1804 audit(1602311073.087:29): pid=9701 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/63/bus" dev="sda1" ino=15826 res=1 errno=0 06:24:33 executing program 3: 06:24:33 executing program 1: 06:24:33 executing program 0: 06:24:33 executing program 5: 06:24:33 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:33 executing program 4: 06:24:33 executing program 1: 06:24:33 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000080)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 06:24:33 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) connect$l2tp(r0, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) 06:24:33 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x22, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:24:33 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 06:24:33 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) bind$phonet(r0, &(0x7f0000000040), 0x10) [ 294.075494][ T26] audit: type=1804 audit(1602311073.467:30): pid=9713 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/64/bus" dev="sda1" ino=15963 res=1 errno=0 06:24:33 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001540)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="1400000000000000290000003e000000f77fffff00000000300000000000000029000000360000002f0200000000000005020006c910fc000000000000000000000000000001000020000000000000002900000037000000290000000000000004012000003900000024"], 0x208}}], 0x1, 0x0) 06:24:33 executing program 5: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r0, &(0x7f0000000040), 0x10) 06:24:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000003500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 06:24:33 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0xe, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:24:33 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 06:24:33 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1d, 0x0, 0x0) 06:24:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r0, &(0x7f0000006900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 06:24:33 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000140)=@framed={{}, [@initr0, @map]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x1000, &(0x7f00000003c0)=""/4096, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:24:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000001400)=""/4096, 0x30, 0x1000, 0x1}, 0x20) [ 294.522342][ T26] audit: type=1804 audit(1602311073.917:31): pid=9739 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/65/file0/bus" dev="sda1" ino=15752 res=1 errno=0 06:24:34 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x14, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:24:34 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @private=0x2, @empty}, {0x0, 0x4e22, 0x8}}}}}, 0x0) 06:24:34 executing program 4: socketpair(0x9, 0x0, 0x0, &(0x7f0000000000)) 06:24:34 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x16, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:24:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) 06:24:34 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}, {0x0, [0x5f]}}, &(0x7f0000001400)=""/4096, 0x2f, 0x1000, 0x1}, 0x20) 06:24:34 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @dev}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) 06:24:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000340)={'wg2\x00'}) 06:24:34 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x12, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 295.292558][ T26] audit: type=1804 audit(1602311074.687:32): pid=9764 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/66/file0/bus" dev="sda1" ino=15966 res=1 errno=0 06:24:34 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000000680)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0}}], 0x1, 0x0) 06:24:34 executing program 1: 06:24:34 executing program 3: 06:24:34 executing program 4: 06:24:34 executing program 0: 06:24:34 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:34 executing program 3: 06:24:35 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYRES32=r0], 0x48}}, 0x89) 06:24:35 executing program 1: 06:24:35 executing program 4: 06:24:35 executing program 0: [ 295.660066][ T26] audit: type=1804 audit(1602311075.057:33): pid=9780 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/67/file0/bus" dev="sda1" ino=15969 res=1 errno=0 06:24:35 executing program 3: 06:24:35 executing program 1: 06:24:35 executing program 4: 06:24:35 executing program 5: 06:24:35 executing program 0: 06:24:35 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:35 executing program 3: 06:24:35 executing program 1: 06:24:35 executing program 4: 06:24:35 executing program 5: 06:24:35 executing program 0: 06:24:35 executing program 3: 06:24:35 executing program 4: [ 296.101310][ T26] audit: type=1804 audit(1602311075.497:34): pid=9797 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/68/file0/bus" dev="sda1" ino=15986 res=1 errno=0 06:24:35 executing program 1: 06:24:35 executing program 5: 06:24:35 executing program 1: 06:24:35 executing program 3: 06:24:35 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:35 executing program 4: 06:24:35 executing program 0: 06:24:35 executing program 1: 06:24:35 executing program 5: 06:24:35 executing program 3: 06:24:35 executing program 4: 06:24:36 executing program 1: 06:24:36 executing program 0: 06:24:36 executing program 3: [ 296.618850][ T26] audit: type=1804 audit(1602311076.017:35): pid=9814 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/69/file0/bus" dev="sda1" ino=15980 res=1 errno=0 06:24:36 executing program 5: 06:24:36 executing program 4: 06:24:36 executing program 1: 06:24:36 executing program 0: 06:24:36 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:36 executing program 3: 06:24:36 executing program 4: 06:24:36 executing program 5: 06:24:36 executing program 3: 06:24:36 executing program 1: 06:24:36 executing program 0: 06:24:36 executing program 4: 06:24:36 executing program 5: 06:24:36 executing program 3: 06:24:36 executing program 1: 06:24:36 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 06:24:36 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:36 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) 06:24:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname(r0, 0x0, &(0x7f0000000140)) 06:24:36 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) 06:24:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') ioctl$CHAR_RAW_RAGET(r0, 0x1263, 0x0) 06:24:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') sendmsg$inet(r0, 0x0, 0x0) 06:24:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') ioctl$CHAR_RAW_ROSET(r0, 0x125d, 0x0) [ 297.412693][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 297.412759][ T26] audit: type=1804 audit(1602311076.807:37): pid=9852 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/71/file0/bus" dev="ramfs" ino=38207 res=1 errno=0 06:24:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 06:24:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') ioctl$CHAR_RAW_IOMIN(r0, 0x1278, 0x0) 06:24:37 executing program 5: ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) 06:24:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, 0x0) 06:24:37 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xa0082, 0x0) 06:24:37 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 06:24:37 executing program 1: statx(0xffffffffffffffff, &(0x7f0000001340)='./file0\x00', 0x0, 0x0, 0x0) 06:24:37 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x20000, 0x0) 06:24:37 executing program 4: open$dir(&(0x7f0000000100)='./file0\x00', 0x46842, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x191980, 0x0) 06:24:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') linkat(r0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) [ 298.265339][ T26] audit: type=1800 audit(1602311077.657:38): pid=9883 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15996 res=0 errno=0 06:24:37 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x200000, 0x0) 06:24:37 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 06:24:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') timerfd_gettime(r0, 0x0) [ 298.362231][ T26] audit: type=1800 audit(1602311077.657:39): pid=9883 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15996 res=0 errno=0 [ 298.452469][ T26] audit: type=1804 audit(1602311077.657:40): pid=9884 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/72/file0/bus" dev="ramfs" ino=37222 res=1 errno=0 06:24:37 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:37 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mounts\x00') symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 06:24:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') getdents(r0, &(0x7f0000000000)=""/245, 0xf5) 06:24:38 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) 06:24:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') ioctl$RNDCLEARPOOL(r0, 0x5206, 0x0) 06:24:38 executing program 5: clock_gettime(0x7, &(0x7f0000000640)) 06:24:38 executing program 4: open$dir(&(0x7f0000000100)='./file0\x00', 0x46842, 0x0) 06:24:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') getsockname(r0, 0x0, 0x0) 06:24:38 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x521440, 0x0) 06:24:38 executing program 3: open$dir(&(0x7f0000000300)='./file0\x00', 0x101040, 0x0) [ 298.744933][ T26] audit: type=1804 audit(1602311078.137:41): pid=9907 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/73/file0/bus" dev="ramfs" ino=38295 res=1 errno=0 06:24:38 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) futimesat(r0, 0x0, &(0x7f0000000080)) [ 298.853905][ T26] audit: type=1800 audit(1602311078.207:42): pid=9910 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16003 res=0 errno=0 06:24:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) 06:24:38 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 06:24:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x148) 06:24:38 executing program 1: open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 299.000122][ T26] audit: type=1800 audit(1602311078.207:43): pid=9910 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16003 res=0 errno=0 06:24:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 06:24:38 executing program 0: semctl$SEM_STAT_ANY(0xffffffffffffffff, 0x0, 0x14, 0x0) 06:24:38 executing program 5: rt_sigaction(0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)) 06:24:38 executing program 1: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000015) [ 299.205829][ T26] audit: type=1804 audit(1602311078.597:44): pid=9931 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/74/file0/bus" dev="ramfs" ino=38325 res=1 errno=0 06:24:38 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2000, 0x0) 06:24:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') ioctl$CHAR_RAW_RESETZONE(r0, 0x40101283, 0x0) 06:24:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/if_inet6\x00') setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, 0x0, 0x0) 06:24:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000001840)='net/tcp\x00') ioctl$CHAR_RAW_BSZSET(r0, 0x40081271, 0x0) 06:24:38 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) [ 299.560079][ T26] audit: type=1804 audit(1602311078.957:45): pid=9950 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/75/file0/bus" dev="ramfs" ino=37355 res=1 errno=0 06:24:39 executing program 3: 06:24:39 executing program 5: 06:24:39 executing program 0: 06:24:39 executing program 4: 06:24:39 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:39 executing program 4: [ 300.034550][ T26] audit: type=1804 audit(1602311079.427:46): pid=9962 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/76/file0/bus" dev="ramfs" ino=38349 res=1 errno=0 06:24:39 executing program 1: 06:24:39 executing program 0: 06:24:39 executing program 5: 06:24:39 executing program 3: 06:24:39 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:39 executing program 4: 06:24:39 executing program 0: 06:24:39 executing program 5: 06:24:39 executing program 3: 06:24:39 executing program 1: 06:24:39 executing program 4: 06:24:39 executing program 0: 06:24:39 executing program 5: 06:24:39 executing program 3: 06:24:39 executing program 1: 06:24:40 executing program 4: 06:24:40 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:40 executing program 5: 06:24:40 executing program 0: 06:24:40 executing program 3: 06:24:40 executing program 1: 06:24:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x6) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup(r1) connect$inet(r2, &(0x7f0000000080)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="ff90d9"], 0xa) 06:24:40 executing program 5: getsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffff9c, 0x84, 0x3, 0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000240), &(0x7f0000000280), 0x0) 06:24:40 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x1202, &(0x7f0000000140)=ANY=[@ANYRES16], 0x8) 06:24:40 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) getsockname(r0, 0x0, &(0x7f0000000080)) 06:24:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/212, 0xd4}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000009c0)=""/180, 0xb4}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa}, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x615, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/55, 0x37}, {0x0}, {0x0}], 0x3}, 0x0) recvfrom$inet(r4, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r3, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) flock(r5, 0x40000003) shutdown(r4, 0x0) shutdown(r2, 0x0) 06:24:40 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=ANY=[], 0xd0}, 0x20185) 06:24:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000240)=""/212, 0xd4}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000009c0)=""/180, 0xb4}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xa}, 0x40102) open(&(0x7f0000000040)='./file0\x00', 0x615, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/55, 0x37}, {0x0}, {0x0}], 0x3}, 0x0) recvfrom$inet(r4, 0x0, 0x22b41b9a8748b1b5, 0x0, 0x0, 0x800e00510) shutdown(r3, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) flock(r5, 0x40000003) shutdown(r4, 0x0) shutdown(r2, 0x0) 06:24:40 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:40 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000340)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x903, &(0x7f00000000c0)={0x0, 0xfffa, 0x8001}, 0x8) 06:24:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000340)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x903, &(0x7f0000000040)={0x0, 0xbb66}, 0x8) 06:24:40 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000001c40)=0x1, 0x4) 06:24:40 executing program 3: select(0x40, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000180)={0x0, 0x1}) 06:24:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_mreqn(r0, 0x0, 0xa, 0x0, 0x0) 06:24:40 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:40 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000340)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x903, &(0x7f0000000040), 0x8) 06:24:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) 06:24:41 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$sock_int(r0, 0xffff, 0x1018, &(0x7f0000000000), &(0x7f0000000040)=0x4) 06:24:41 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x328}, 0x108) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000180)="e6", 0x1}], 0x1, &(0x7f0000001840)=ANY=[], 0xd0}, 0x0) 06:24:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000340)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="93", 0x1}], 0x1, &(0x7f0000000180)=[@authinfo={0x10}], 0x10}, 0x20106) 06:24:41 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000340)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x903, &(0x7f0000000040)={0x0, 0x3ee, 0x7f7}, 0x8) 06:24:41 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000001740)=""/4106, 0x100a}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/104, 0x68}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xa1720495f3f7edd, 0x0, 0x0, 0x800e0057f) shutdown(r3, 0x0) shutdown(r4, 0x0) 06:24:41 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000240)=ANY=[], 0x8c) 06:24:41 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 06:24:41 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 06:24:41 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) 06:24:41 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000340)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) r1 = dup(r0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x28, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000380)={r3, 0x0, 0x1, "94"}, 0x9) 06:24:41 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) r1 = dup(r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000340)=ANY=[@ANYBLOB="1c1c4e200000000000000000000000000000ffff00"/120, @ANYBLOB="fa0c0000000006b2cfa44c070000449965ff0a20c131"], 0x98) 06:24:41 executing program 1: fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) 06:24:41 executing program 3: getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) 06:24:41 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:41 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000080)='l', 0x1}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="100004"], 0x20}, 0x0) 06:24:41 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) socket$unix(0x1, 0x2, 0x0) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000080)='l', 0x1}], 0x1, &(0x7f00000000c0)=ANY=[], 0x11}, 0x0) [ 302.655030][ T26] kauditd_printk_skb: 5 callbacks suppressed [ 302.655045][ T26] audit: type=1804 audit(1602311082.048:52): pid=10106 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/82/bus" dev="sda1" ino=16000 res=1 errno=0 06:24:42 executing program 3: 06:24:42 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000080)='l', 0xfffffffffffffdd3}], 0x1, &(0x7f00000000c0)=ANY=[], 0x11}, 0x0) 06:24:42 executing program 4: 06:24:42 executing program 1: 06:24:42 executing program 5: 06:24:42 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(0x0, 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:42 executing program 3: 06:24:42 executing program 5: 06:24:42 executing program 1: 06:24:42 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(0x0, 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:42 executing program 4: 06:24:42 executing program 0: 06:24:42 executing program 1: 06:24:42 executing program 5: 06:24:42 executing program 3: 06:24:42 executing program 0: 06:24:42 executing program 4: 06:24:42 executing program 1: 06:24:42 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(0x0, 0x0) ftruncate(r2, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:42 executing program 3: 06:24:42 executing program 5: 06:24:42 executing program 4: 06:24:43 executing program 0: 06:24:43 executing program 5: 06:24:43 executing program 1: 06:24:43 executing program 3: 06:24:43 executing program 4: 06:24:43 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:43 executing program 0: 06:24:43 executing program 1: 06:24:43 executing program 5: 06:24:43 executing program 3: 06:24:43 executing program 4: 06:24:43 executing program 5: 06:24:43 executing program 3: [ 304.142565][ T26] audit: type=1804 audit(1602311083.538:53): pid=10160 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/86/file0/bus" dev="ramfs" ino=37702 res=1 errno=0 06:24:43 executing program 4: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) ioctl$TCGETS(r0, 0x5401, 0x0) 06:24:43 executing program 1: semget$private(0x0, 0x2, 0x15) 06:24:43 executing program 0: setxattr$security_capability(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 06:24:43 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:43 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x501000, 0x0) 06:24:43 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 06:24:43 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/full\x00', 0x8040, 0x0) 06:24:43 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x141000, 0x0) 06:24:43 executing program 0: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0xfffffffffffffffd) [ 304.431255][ T26] audit: type=1804 audit(1602311083.828:54): pid=10171 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/87/file0/bus" dev="ramfs" ino=37741 res=1 errno=0 06:24:43 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x208200) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:43 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x90801, 0x0) 06:24:43 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001480)='./cgroup.net/syz1\x00', 0x200002, 0x0) 06:24:44 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/full\x00', 0x0, 0x0) ioctl$CHAR_RAW_FRASET(r0, 0x1264, 0x0) 06:24:44 executing program 5: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001140)={{0x1, 0xffffffffffffffff, 0xee00, 0x0, 0xee01}}) 06:24:44 executing program 0: pipe2(&(0x7f0000000080), 0x800) 06:24:44 executing program 4: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTAT(r0, &(0x7f0000000080)=ANY=[], 0x72) 06:24:44 executing program 1: fchownat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xee00, 0x0, 0x0) [ 304.745556][ T26] audit: type=1804 audit(1602311084.138:55): pid=10189 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/88/file0/bus" dev="ramfs" ino=37780 res=1 errno=0 06:24:44 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) read$char_usb(r0, 0x0, 0xffffffffffffffe9) 06:24:44 executing program 3: mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) 06:24:44 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:44 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) timerfd_gettime(r0, 0x0) 06:24:44 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x1a, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:24:44 executing program 1: mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1) 06:24:44 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$CHAR_RAW_ALIGNOFF(r0, 0x127a, 0x0) 06:24:44 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$char_usb(r0, 0x0, 0x0) 06:24:44 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x5c9000, 0x0) [ 305.058868][ T26] audit: type=1804 audit(1602311084.458:56): pid=10210 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/89/file0/bus" dev="ramfs" ino=38721 res=1 errno=0 06:24:44 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:44 executing program 5: pipe2$9p(&(0x7f0000000080), 0x80800) 06:24:44 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/full\x00', 0x0, 0x0) futimesat(r0, 0x0, 0x0) 06:24:44 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x0) 06:24:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0xfffffffffffffffd) 06:24:44 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$KDFONTOP_GET(r0, 0x4b72, 0x0) [ 305.286311][ T26] audit: type=1804 audit(1602311084.678:57): pid=10223 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/90/file0/bus" dev="ramfs" ino=37836 res=1 errno=0 06:24:44 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/full\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, 0x0) 06:24:44 executing program 5: getrusage(0x1, &(0x7f00000004c0)) 06:24:44 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x0) open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) 06:24:44 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) 06:24:44 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/null\x00', 0x280080, 0x0) 06:24:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001140)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000001200)) [ 305.575273][ T26] audit: type=1804 audit(1602311084.968:58): pid=10240 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir575224206/syzkaller.4XkFjp/91/file0/bus" dev="ramfs" ino=37862 res=1 errno=0 06:24:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x4b64, 0x0) 06:24:45 executing program 1: syz_open_dev$char_raw(&(0x7f0000000040)='/dev/raw/raw#\x00', 0x0, 0x0) 06:24:45 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, 0x0) 06:24:45 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(0x0, 0x0, 0x0) 06:24:45 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x0) 06:24:45 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0xe9c3fc2e33e4fb60, 0x0) 06:24:45 executing program 5: ioctl$TCGETS(0xffffffffffffffff, 0x5401, 0x0) 06:24:45 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) 06:24:45 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(0x0, 0x0, 0x0) 06:24:45 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0x0) 06:24:45 executing program 0: ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) 06:24:45 executing program 5: 06:24:45 executing program 3: 06:24:45 executing program 0: 06:24:45 executing program 1: 06:24:45 executing program 4: 06:24:45 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(&(0x7f0000000280)='./file0\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x208200) open(0x0, 0x0, 0x0) 06:24:45 executing program 5: 06:24:45 executing program 1: 06:24:45 executing program 3: 06:24:45 executing program 4: 06:24:45 executing program 0: 06:24:45 executing program 5: 06:24:45 executing program 4: 06:24:45 executing program 1: 06:24:45 executing program 2: 06:24:45 executing program 3: 06:24:45 executing program 0: 06:24:46 executing program 5: 06:24:46 executing program 1: 06:24:46 executing program 2: 06:24:46 executing program 4: 06:24:46 executing program 3: 06:24:46 executing program 0: 06:24:46 executing program 5: 06:24:46 executing program 1: 06:24:46 executing program 2: 06:24:46 executing program 4: 06:24:46 executing program 3: 06:24:46 executing program 0: 06:24:46 executing program 5: 06:24:46 executing program 2: 06:24:46 executing program 1: 06:24:46 executing program 4: 06:24:46 executing program 3: 06:24:46 executing program 0: 06:24:46 executing program 2: 06:24:46 executing program 5: 06:24:46 executing program 1: 06:24:46 executing program 3: 06:24:46 executing program 0: 06:24:46 executing program 4: 06:24:46 executing program 2: 06:24:46 executing program 1: 06:24:46 executing program 5: 06:24:46 executing program 3: 06:24:46 executing program 0: 06:24:46 executing program 4: 06:24:46 executing program 2: 06:24:46 executing program 1: 06:24:46 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001640)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180), 0x8c) 06:24:46 executing program 3: r0 = socket(0x1c, 0x10000001, 0x84) connect(r0, &(0x7f0000000000)=@un=@abs={0x8}, 0x8) 06:24:47 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup2(r0, r1) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 06:24:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x20, &(0x7f0000000140), &(0x7f0000000200)=0x4) 06:24:47 executing program 2: setuid(0xffffffffffffffff) getgroups(0x3, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0]) setresgid(r0, 0xffffffffffffffff, 0x0) 06:24:47 executing program 1: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet6_udplite(0x1c, 0x2, 0x88) dup2(r1, r0) 06:24:47 executing program 5: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x28, &(0x7f0000000000), 0x4) 06:24:47 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0xbe4ad9a1af856fb0, 0x0) close(r0) truncate(&(0x7f0000000040)='./file0\x00', 0x1) 06:24:47 executing program 0: mprotect(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0) 06:24:47 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0xfffffffffffffca8, 0x1c, 0x3}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0xf, &(0x7f0000000080), &(0x7f0000000200)=0xc) 06:24:47 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c, 0x1}, 0x1c) sendmsg$unix(r1, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0xe0}, 0x0) 06:24:47 executing program 0: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1c, 0x1c}, 0x1c) 06:24:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000280), &(0x7f00000000c0)=0x3) 06:24:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000000)={0x0, 0x2, 'nF'}, &(0x7f0000000040)=0xa) 06:24:47 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup2(r0, r0) r2 = socket$inet6_udplite(0x1c, 0x2, 0x88) dup2(r1, r2) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x1c, 0x1c, 0x1}, 0x1c) 06:24:47 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1c, 0x1c, 0x2}, 0x1c) 06:24:47 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0xbe4ad9a1af856fb0, 0x0) open$dir(&(0x7f0000000000)='./file0/file0\x00', 0x400000, 0x0) 06:24:47 executing program 2: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c}, 0x1c) 06:24:47 executing program 0: getgroups(0x3, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0]) setresgid(r0, 0xffffffffffffffff, 0x0) setregid(0xffffffffffffffff, 0x0) 06:24:47 executing program 5: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) r1 = dup(r0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x2e, 0x0, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x2e, 0x0, &(0x7f0000000080)) 06:24:47 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000580), &(0x7f0000000300)=0x94) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000140), &(0x7f0000000040)=0x8) 06:24:47 executing program 4: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000000c0), 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="4fe65b8f02cb14c239f8be73d4fde38a161aacd6a22e55e80e1299915bd380e210103e1f1af9647fcab17c62231c10c6368730a99eda8b4c9a1ac109abb2dbccf52933a4beb467d457dd4fec41edb09bd2ae97e4635a902b5bcdd9921ff9c026f58aa8ed023a47bf3acae5930e49ec629bd76fccc7c409f250b31bab92c263041efcf11acb8cc6df648be1d87da58c32713b4a7e41d2f144628aaf21644f39c52f90e9e88e8cd0c20ef8baa4bc978938fc16551032db3562479b6c414cbeae53996e89f6c37ccc4c1ee04c8b69baf7ffd7d518", 0xd3}, {&(0x7f0000000240)="126bde95a555f3a06d83f665cd435b854fc6ba31dd946317b6d7ae6c34633c241da00dceb17c93d074cc5f27f734fcd150d76f4c59b7dedac62d4f3caba525ddc87746b9ef16da8d8fae44a3e70afff32f2f70c494ebcaa8b4eb9a57bde2499819009dcbff643469f0cb9994c822c7fe012ca268fca49f7418b670b1ef17a40bf3f24f3296da2013b1b7265c0ea4ec91f861294ca73973a6b1a3faa161a3a1e9", 0xa0}, {&(0x7f0000000300)="93ff8cc142bd21ea3e9e46fbd3e9e5dd25348c559aeed3b4acb5ff87e0e15abe58252876596d743468dff191ab14bc5443ebadbc4ec1a9fed9c3bbd37d2edd40ae03939ae40eb892aed17b3b10ee658a6d33a10ae24b70bfe447ffb9391789191b33e403d6cc73e6d758bb042c52560f5f770f08eee87796ea8784313687a2c69e04b76ce743ece1c4e4e3384d71b6edf16cf2f499135654be6a69c5f254c66ba417b25f289d5757ca", 0xa9}, {&(0x7f00000003c0)="907d1c71d7b4246b31799944cbfc639b18bbe6cc91168d07920e960f48f31df764966e3d243f40d7984d6e3b8899a73097a0f8913f1576fb1048679dcb40f1e3b9ce2ceb0da56bd8049dc7d2d233b1d2417a0673c2de020cf389c2b439c17c9d0669ea1626f622a9d208f4a91be83d2187208400", 0x74}, {&(0x7f0000000440)="3e3067e4fce85174b4eeb538370d45661626f43f22cc4d424b21d66f8a2dd50ba67c75b634a6c6c5f61b3d69a7264112dc8746aa90017a984045033f18a619c6636ee76a6db0ff128b7f187b14faf4b18a90083dae31559a8df671b4e0be81db5e42b3170780d2151001f9969b8143c04ff61f400337d416bf6eafb8525a33b8b0a3edadc4deb42ee6913f72a6b730816c5628752d6f66689986fc5bb2172ca7c4d9b470fe120e57e9eadf7617a92679a4be6abd0344ac2f411404a43deea1d2114c64ac9533bd9678806e1045eaf6f450c23e97a4487166cfab3014e6da2380", 0xe0}], 0x5, &(0x7f0000000580)=[@rights, @cred, @rights, @cred, @rights, @cred, @cred, @cred], 0xe8}, 0x0) 06:24:47 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_udplite(0x1c, 0x2, 0x88) connect$inet6(r2, &(0x7f00000000c0)={0x1c, 0x1c, 0x1}, 0x1c) dup2(r1, r2) 06:24:47 executing program 2: syz_emit_ethernet(0x181, &(0x7f0000002f40)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6014f6d5014b0000fe8000000000000000000000000000aaff020000000000000000000000000001000a0000000000008b"], 0x0) 06:24:47 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000180), &(0x7f00000001c0)=0x8) 06:24:48 executing program 4: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x33, 0x0, 0x0) 06:24:48 executing program 1: r0 = socket(0x1c, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0), 0x80) 06:24:48 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@random="45d390ca0100", @local, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @empty, @local, @loopback}}}}, 0x0) 06:24:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000100), &(0x7f0000000140)=0x8) 06:24:48 executing program 2: open$dir(&(0x7f0000000040)='.\x00', 0x200, 0x0) 06:24:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a012e2f76"], 0xa) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 06:24:48 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f0000000040), 0x2) 06:24:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r2 = dup2(r1, r0) getsockname$unix(r2, 0x0, &(0x7f0000000000)) 06:24:48 executing program 3: symlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='./file1\x00') renameat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00') 06:24:48 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0xbe4ad9a1af856fb0, 0x0) close(r0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 06:24:48 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) read(r1, &(0x7f0000000040)=""/129, 0x81) 06:24:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000040), &(0x7f0000000300)=0x94) 06:24:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a012e2f76"], 0xa) open$dir(&(0x7f0000000000)='./file0\x00', 0x140200, 0x0) 06:24:48 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f00000000c0)={@ipv4={[], [], @remote={0xac, 0x14, 0x0}}}, 0x14) 06:24:48 executing program 4: getgroups(0x3, &(0x7f00000000c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0]) setresgid(r0, 0xffffffffffffffff, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x0) 06:24:48 executing program 3: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, &(0x7f0000000000)=ANY=[], 0x18) 06:24:48 executing program 2: getgroups(0x3, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0]) setresgid(r0, 0xffffffffffffffff, 0x0) setregid(0x0, 0x0) 06:24:48 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x0) 06:24:48 executing program 5: mlock(&(0x7f0000c00000/0x400000)=nil, 0x400000) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 06:24:48 executing program 4: chroot(&(0x7f0000000040)='./file0\x00') chown(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 06:24:48 executing program 1: mknod(&(0x7f0000000100)='./file0\x00', 0x1000, 0xffff) 06:24:48 executing program 2: setsockopt$sock_linger(0xffffffffffffffff, 0xffff, 0x80, 0x0, 0x0) 06:24:48 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) symlinkat(&(0x7f0000000040)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 06:24:48 executing program 3: setuid(0xffffffffffffffff) nanosleep(&(0x7f0000000200), 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 06:24:48 executing program 0: r0 = socket$inet6(0x18, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1, 0x0, 0x0) 06:24:48 executing program 1: r0 = socket$inet6(0x18, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1003, 0x0, 0x0) 06:24:49 executing program 4: getgroups(0x7, &(0x7f0000000040)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) setregid(r0, 0xffffffffffffffff) 06:24:49 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000001180)='/dev/null\x00', 0x0, 0x0) clock_gettime(0x4, &(0x7f0000001140)) 06:24:49 executing program 2: getgroups(0x7, &(0x7f0000000040)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0]) setregid(r0, 0xffffffffffffffff) setregid(r0, 0x0) 06:24:49 executing program 3: 06:24:49 executing program 1: 06:24:49 executing program 0: 06:24:49 executing program 4: 06:24:49 executing program 3: 06:24:49 executing program 1: 06:24:49 executing program 5: 06:24:49 executing program 2: 06:24:49 executing program 0: 06:24:49 executing program 4: 06:24:49 executing program 1: 06:24:49 executing program 3: 06:24:49 executing program 5: 06:24:49 executing program 2: 06:24:49 executing program 4: 06:24:49 executing program 0: 06:24:49 executing program 1: 06:24:49 executing program 3: 06:24:49 executing program 2: 06:24:49 executing program 5: 06:24:49 executing program 0: 06:24:49 executing program 1: 06:24:49 executing program 4: 06:24:49 executing program 5: 06:24:49 executing program 2: 06:24:49 executing program 0: 06:24:49 executing program 3: 06:24:49 executing program 1: 06:24:50 executing program 4: 06:24:50 executing program 5: 06:24:50 executing program 3: 06:24:50 executing program 0: 06:24:50 executing program 1: 06:24:50 executing program 2: 06:24:50 executing program 4: 06:24:50 executing program 0: 06:24:50 executing program 3: 06:24:50 executing program 5: 06:24:50 executing program 2: 06:24:50 executing program 1: 06:24:50 executing program 4: 06:24:50 executing program 3: 06:24:50 executing program 4: 06:24:50 executing program 5: 06:24:50 executing program 0: 06:24:50 executing program 2: 06:24:50 executing program 1: 06:24:50 executing program 3: 06:24:50 executing program 5: 06:24:50 executing program 4: 06:24:50 executing program 2: 06:24:50 executing program 0: 06:24:50 executing program 1: 06:24:50 executing program 3: 06:24:50 executing program 5: 06:24:50 executing program 4: 06:24:50 executing program 2: 06:24:50 executing program 0: 06:24:50 executing program 5: 06:24:50 executing program 3: 06:24:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}]}}, &(0x7f00000000c0)=""/156, 0x2a, 0x9c, 0x1}, 0x20) 06:24:51 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000180)=""/235, 0x26, 0xeb, 0x8}, 0x20) close(r0) 06:24:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000040)=""/238, 0x1a, 0xee, 0x1}, 0x20) perf_event_open(&(0x7f0000000040)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:24:51 executing program 5: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x5, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext, 0x0, 0x8001, 0x0, 0x8, 0x7, 0x9, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 06:24:51 executing program 0: 06:24:51 executing program 3: 06:24:51 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x3, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x7}}, &(0x7f0000000380)='syzkaller\x00', 0x7, 0x8b, &(0x7f00000003c0)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:24:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x3, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x7, 0x8b, &(0x7f00000003c0)=""/139, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:24:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:24:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x3f9, &(0x7f0000000340)=@framed, &(0x7f0000000380)='syzkaller\x00', 0x7, 0x8b, &(0x7f00000003c0)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:24:51 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0x806000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x10, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020660b, &(0x7f0000000040)) 06:24:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@alu={0x5}]}, &(0x7f0000000380)='syzkaller\x00', 0x7, 0x8b, &(0x7f00000003c0)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:24:51 executing program 1: r0 = getpid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:24:51 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) close(r1) 06:24:51 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:24:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[], 0x20}, 0x0) 06:24:51 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:24:51 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:24:51 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x1, &(0x7f0000000040)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x9b, &(0x7f0000000100)=""/155, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:24:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@alu]}, &(0x7f0000000380)='syzkaller\x00', 0x7, 0x8b, &(0x7f00000003c0)=""/139, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:24:51 executing program 0: r0 = socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(r0, &(0x7f0000002f00)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000000)="87", 0x1}], 0x1}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 06:24:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000002c0)=""/150, 0x27, 0x96, 0x1}, 0x20) 06:24:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:24:51 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000004040000002b24ec10064b6fb14bcced1f718aef932f3889d1fdda5b9134015a02000000c37ffe36e1165d14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afe403461323110d62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d005000000000000000000001010"], 0x10b8}, 0x0) r0 = socket$kcm(0x21, 0x2, 0xa) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000002ac0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e62, 0x0, @mcast2}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[], 0x10b8}, 0x488c0) close(r0) 06:24:51 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) [ 312.504246][T10624] ------------[ cut here ]------------ [ 312.510031][T10624] WARNING: CPU: 0 PID: 10624 at kernel/entry/common.c:364 irqentry_exit+0x47/0x90 [ 312.519221][T10624] Kernel panic - not syncing: panic_on_warn set ... [ 312.525805][T10624] CPU: 0 PID: 10624 Comm: syz-executor.0 Not tainted 5.9.0-rc8-syzkaller #0 [ 312.534451][T10624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.544528][T10624] Call Trace: [ 312.547871][T10624] dump_stack+0x198/0x1fd [ 312.552247][T10624] panic+0x382/0x7fb [ 312.556118][T10624] ? __warn_printk+0xf3/0xf3 [ 312.560720][T10624] ? printk+0xba/0xed [ 312.564679][T10624] ? log_store.cold+0x16/0x16 [ 312.569378][T10624] ? no_context+0x120/0x9f0 [ 312.573857][T10624] ? __warn.cold+0x5/0x4b [ 312.578165][T10624] ? irqentry_exit+0x47/0x90 [ 312.582735][T10624] __warn.cold+0x20/0x4b [ 312.586952][T10624] ? irqentry_exit+0x47/0x90 [ 312.591517][T10624] report_bug+0x1bd/0x210 [ 312.595862][T10624] handle_bug+0x38/0x90 [ 312.599991][T10624] exc_invalid_op+0x14/0x40 [ 312.604552][T10624] asm_exc_invalid_op+0x12/0x20 [ 312.609378][T10624] RIP: 0010:irqentry_exit+0x47/0x90 [ 312.614644][T10624] Code: 27 f6 87 91 00 00 00 02 74 18 40 84 f6 75 3b 65 8b 05 ed 43 db 77 a9 ff ff ff 7f 74 11 e9 d1 59 55 f9 40 84 f6 75 3f c3 eb 89 <0f> 0b eb ca e8 90 fd 3c f9 65 48 8b 04 25 c0 fe 01 00 48 8b 00 a8 [ 312.634379][T10624] RSP: 0018:ffffc9000891e690 EFLAGS: 00010002 [ 312.640506][T10624] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffc900162c9000 [ 312.648449][T10624] RDX: 0000000000040000 RSI: 0000000000000000 RDI: ffffc9000891e6c8 [ 312.656392][T10624] RBP: ffffc9000891e6c8 R08: 0000000000000000 R09: 0000000000000000 [ 312.664352][T10624] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 312.672302][T10624] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 312.680263][T10624] exc_page_fault+0xd9/0x190 [ 312.684826][T10624] asm_exc_page_fault+0x1e/0x30 [ 312.689678][T10624] RIP: 0010:__softirqentry_text_end+0x39/0x55 [ 312.695722][T10624] Code: df 03 e0 ff b8 f2 ff ff ff 31 d2 e9 db 64 c6 ff 41 bf f2 ff ff ff 31 c0 e9 ab 3c a1 f8 41 bf f2 ff ff ff 31 ed e9 c6 3c a1 f8 <41> be f2 ff ff ff 48 31 c0 e9 d3 3f a1 f8 41 be f2 ff ff ff 48 31 [ 312.715299][T10624] RSP: 0018:ffffc9000891e770 EFLAGS: 00010046 [ 312.721338][T10624] RAX: 000000000001c0be RBX: ffffc9000891e830 RCX: ffffc900162c9000 [ 312.729417][T10624] RDX: 0000000000040000 RSI: ffffffff81014b30 RDI: 0000000000000006 [ 312.737365][T10624] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff8880972d6187 [ 312.745317][T10624] R10: 0000000000000000 R11: 0000000000000001 R12: ffffc9000891e83c [ 312.753264][T10624] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8880972d6180 [ 312.761311][T10624] ? perf_callchain_user+0x800/0xba0 [ 312.766622][T10624] get_perf_callchain+0x324/0x640 [ 312.771633][T10624] ? put_callchain_entry+0xa0/0xa0 [ 312.776764][T10624] ? __lock_acquire+0xb92/0x5780 [ 312.781677][T10624] perf_callchain+0x165/0x1c0 [ 312.786330][T10624] perf_prepare_sample+0x8fd/0x1d40 [ 312.791502][T10624] ? pgtable_bad+0x90/0x90 [ 312.795896][T10624] ? perf_callchain+0x1c0/0x1c0 [ 312.800736][T10624] perf_event_output_forward+0xf3/0x270 [ 312.806278][T10624] ? perf_prepare_sample+0x1d40/0x1d40 [ 312.811713][T10624] ? lock_downgrade+0x830/0x830 [ 312.816549][T10624] ? mark_held_locks+0x9f/0xe0 [ 312.821356][T10624] __perf_event_overflow+0x13c/0x370 [ 312.826617][T10624] perf_swevent_event+0x347/0x550 [ 312.831669][T10624] ? tracing_generic_entry_update+0x1ed/0x270 [ 312.837712][T10624] perf_tp_event+0x2e4/0xb60 [ 312.842276][T10624] ? __softirqentry_text_end+0x39/0x55 [ 312.847746][T10624] ? perf_event_mmap_output+0xa30/0xa30 [ 312.853272][T10624] ? startup_64+0x2/0x30 [ 312.857490][T10624] ? lock_is_held_type+0xbb/0xf0 [ 312.862401][T10624] ? find_held_lock+0x2d/0x110 [ 312.867138][T10624] ? perf_event_output_forward+0x16a/0x270 [ 312.872925][T10624] ? lock_downgrade+0x830/0x830 [ 312.877752][T10624] ? perf_event_output_forward+0x18c/0x270 [ 312.883532][T10624] ? perf_prepare_sample+0x1d40/0x1d40 [ 312.889001][T10624] ? perf_trace_run_bpf_submit+0x11c/0x210 [ 312.894779][T10624] ? lock_is_held_type+0xbb/0xf0 [ 312.899812][T10624] ? find_held_lock+0x2d/0x110 [ 312.904551][T10624] perf_trace_run_bpf_submit+0x11c/0x210 [ 312.910164][T10624] perf_trace_lock_acquire+0x34c/0x550 [ 312.915608][T10624] ? SOFTIRQ_verbose+0x10/0x10 [ 312.920378][T10624] ? tracing_generic_entry_update+0x1ed/0x270 [ 312.926431][T10624] ? perf_tp_event+0x622/0xb60 [ 312.931258][T10624] lock_acquire+0x37c/0xaf0 [ 312.935821][T10624] ? __bpf_address_lookup+0x290/0x290 [ 312.941184][T10624] ? lock_release+0x8f0/0x8f0 [ 312.945893][T10624] ? arch_stack_walk+0x5e/0xf0 [ 312.950635][T10624] ? unwind_next_frame+0xe3b/0x1f90 [ 312.955806][T10624] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 312.962004][T10624] is_bpf_text_address+0x36/0x160 [ 312.967003][T10624] ? __bpf_address_lookup+0x290/0x290 [ 312.972385][T10624] kernel_text_address+0xbd/0xf0 [ 312.977299][T10624] __kernel_text_address+0x9/0x30 [ 312.982299][T10624] unwind_get_return_address+0x51/0x90 [ 312.987813][T10624] ? profile_setup.cold+0xc1/0xc1 [ 312.992920][T10624] arch_stack_walk+0x97/0xf0 [ 312.997499][T10624] stack_trace_save+0x8c/0xc0 [ 313.002169][T10624] ? stack_trace_consume_entry+0x160/0x160 [ 313.007951][T10624] save_trace+0x43/0xba0 [ 313.012167][T10624] ? lock_repin_lock+0x460/0x460 [ 313.017077][T10624] ? mark_lock+0x82/0x1660 [ 313.021470][T10624] __lock_acquire+0x4aa5/0x5780 [ 313.026300][T10624] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 313.032261][T10624] lock_acquire+0x1f3/0xaf0 [ 313.036831][T10624] ? __rhashtable_insert_fast.constprop.0+0x42f/0x16e0 [ 313.043654][T10624] ? lock_release+0x8f0/0x8f0 [ 313.048331][T10624] ? __lock_acquire+0xb92/0x5780 [ 313.053246][T10624] ? lock_is_held_type+0xbb/0xf0 [ 313.058156][T10624] ? lock_is_held_type+0xbb/0xf0 [ 313.063065][T10624] ? lock_is_held_type+0xbb/0xf0 [ 313.067977][T10624] __rhashtable_insert_fast.constprop.0+0x45e/0x16e0 [ 313.074624][T10624] ? __rhashtable_insert_fast.constprop.0+0x42f/0x16e0 [ 313.081445][T10624] ? sctp_csum_update+0x30/0x30 [ 313.086269][T10624] ? sctp_csum_update+0x30/0x30 [ 313.091091][T10624] ? sk_add_backlog+0x5f0/0x5f0 [ 313.095916][T10624] ? find_held_lock+0x2d/0x110 [ 313.100653][T10624] ? sctp_hash_transport+0x401/0x610 [ 313.105912][T10624] ? rht_key_get_hash.constprop.0.isra.0+0x90/0x90 [ 313.112385][T10624] ? sctp_hash_key+0x230/0x230 [ 313.117121][T10624] ? sctp_csum_update+0x30/0x30 [ 313.122029][T10624] ? lock_downgrade+0x830/0x830 [ 313.126895][T10624] ? sctp_v4_create_accept_sk+0x1f0/0x1f0 [ 313.132596][T10624] sctp_hash_transport+0x491/0x610 [ 313.137681][T10624] ? rht_key_get_hash.constprop.0.isra.0+0x90/0x90 [ 313.144151][T10624] ? sctp_hash_key+0x230/0x230 [ 313.148886][T10624] ? sctp_csum_update+0x30/0x30 [ 313.153710][T10624] ? sctp_transport_hashtable_destroy+0x20/0x20 [ 313.159925][T10624] ? rht_key_get_hash.constprop.0.isra.0+0x90/0x90 [ 313.166408][T10624] ? sctp_hash_key+0x230/0x230 [ 313.171151][T10624] ? sctp_csum_update+0x30/0x30 [ 313.175987][T10624] ? sctp_transport_pmtu+0x13e/0x470 [ 313.181245][T10624] ? sctp_v4_to_sk_saddr+0xd/0x80 [ 313.186345][T10624] ? sctp_do_sm.cold+0xb5/0xb5 [ 313.191077][T10624] ? sctp_transport_route+0x27b/0x350 [ 313.196421][T10624] sctp_assoc_add_peer+0xa30/0x10b0 [ 313.201593][T10624] sctp_connect_new_asoc+0x1fc/0x770 [ 313.206857][T10624] ? sctp_bind+0xd0/0xd0 [ 313.211146][T10624] ? lock_sock_nested+0x94/0x110 [ 313.216084][T10624] ? __local_bh_enable_ip+0x10f/0x1f0 [ 313.221429][T10624] ? check_preemption_disabled+0x50/0x130 [ 313.227119][T10624] ? __local_bh_enable_ip+0x10f/0x1f0 [ 313.232460][T10624] ? lock_sock_nested+0x94/0x110 [ 313.237400][T10624] ? bpf_lsm_sctp_bind_connect+0x5/0x10 [ 313.242969][T10624] ? security_sctp_bind_connect+0x8f/0xc0 [ 313.248661][T10624] sctp_sendmsg+0x1377/0x1cf0 [ 313.253313][T10624] ? sctp_setsockopt+0x97f0/0x97f0 [ 313.258395][T10624] ? lock_is_held_type+0xbb/0xf0 [ 313.263351][T10624] ? rw_copy_check_uvector+0x298/0x390 [ 313.268838][T10624] ? aa_af_perm+0x230/0x230 [ 313.273354][T10624] inet_sendmsg+0x99/0xe0 [ 313.277660][T10624] ? inet_send_prepare+0x4d0/0x4d0 [ 313.282766][T10624] sock_sendmsg+0xcf/0x120 [ 313.287159][T10624] ____sys_sendmsg+0x6e8/0x810 [ 313.291898][T10624] ? kernel_sendmsg+0x50/0x50 [ 313.296546][T10624] ? do_recvmmsg+0x6d0/0x6d0 [ 313.301124][T10624] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 313.307084][T10624] ___sys_sendmsg+0xf3/0x170 [ 313.311657][T10624] ? sendmsg_copy_msghdr+0x160/0x160 [ 313.316957][T10624] ? __fget_files+0x272/0x400 [ 313.321607][T10624] ? lock_downgrade+0x830/0x830 [ 313.326429][T10624] ? find_held_lock+0x2d/0x110 [ 313.331173][T10624] ? __fget_files+0x294/0x400 [ 313.335826][T10624] ? __fget_light+0xea/0x280 [ 313.340391][T10624] __sys_sendmsg+0xe5/0x1b0 [ 313.344868][T10624] ? __sys_sendmsg_sock+0xb0/0xb0 [ 313.349876][T10624] ? check_preemption_disabled+0x50/0x130 [ 313.355634][T10624] ? syscall_enter_from_user_mode+0x1d/0x60 [ 313.361538][T10624] do_syscall_64+0x2d/0x70 [ 313.365927][T10624] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 313.371792][T10624] RIP: 0033:0x45de59 [ 313.375662][T10624] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.395238][T10624] RSP: 002b:00007fa5754f7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 313.403653][T10624] RAX: ffffffffffffffda RBX: 000000000002e340 RCX: 000000000045de59 [ 313.411612][T10624] RDX: 0000000000000000 RSI: 0000000020002f00 RDI: 0000000000000003 [ 313.419555][T10624] RBP: 000000000118bf60 R08: 0000000000000000 R09: 0000000000000000 [ 313.427504][T10624] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 313.435454][T10624] R13: 00007ffd85cf16cf R14: 00007fa5754f89c0 R15: 000000000118bf2c [ 314.560573][T10624] Shutting down cpus with NMI [ 314.566474][T10624] Kernel Offset: disabled [ 314.570790][T10624] Rebooting in 86400 seconds..