Starting System Logging Service... Starting OpenBSD Secure Shell server... [ OK ] Started Daily Cleanup of Temporary Directories. [ OK ] Reached target Timers. [ OK ] Started Permit User Sessions. [ OK ] Started System Logging Service. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ 48.739178][ T4801] systemd-udevd (4801) used greatest stack depth: 21712 bytes left [ 49.863235][ T6725] scp (6725) used greatest stack depth: 21200 bytes left [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. Starting Load/Save RF Kill Switch Status... [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Load/Save RF Kill Switch Status. [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.182' (ECDSA) to the list of known hosts. 2020/06/27 00:39:40 fuzzer started 2020/06/27 00:39:40 dialing manager at 10.128.0.26:45395 2020/06/27 00:39:40 syscalls: 3118 2020/06/27 00:39:40 code coverage: enabled 2020/06/27 00:39:40 comparison tracing: enabled 2020/06/27 00:39:40 extra coverage: enabled 2020/06/27 00:39:40 setuid sandbox: enabled 2020/06/27 00:39:40 namespace sandbox: enabled 2020/06/27 00:39:40 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/27 00:39:40 fault injection: enabled 2020/06/27 00:39:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/27 00:39:40 net packet injection: enabled 2020/06/27 00:39:40 net device setup: enabled 2020/06/27 00:39:40 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/06/27 00:39:40 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/27 00:39:40 USB emulation: enabled 00:41:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x800454d2, 0x0) syzkaller login: [ 169.985396][ T6832] IPVS: ftp: loaded support on port[0] = 21 00:41:34 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) ioctl$KDGKBDIACR(r0, 0x560f, 0x0) [ 170.114945][ T6832] chnl_net:caif_netlink_parms(): no params data found [ 170.232674][ T6832] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.259402][ T6832] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.270935][ T6832] device bridge_slave_0 entered promiscuous mode [ 170.292631][ T6832] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.319571][ T6832] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.338669][ T6832] device bridge_slave_1 entered promiscuous mode [ 170.372965][ T6832] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.385508][ T6832] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.424549][ T6832] team0: Port device team_slave_0 added [ 170.427221][ T6962] IPVS: ftp: loaded support on port[0] = 21 [ 170.433991][ T6832] team0: Port device team_slave_1 added 00:41:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='user.syz\x00', 0x0, 0x0) [ 170.480722][ T6832] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 170.487977][ T6832] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 170.515667][ T6832] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 170.551307][ T6832] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 170.558378][ T6832] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 170.587203][ T6832] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 170.712395][ T6832] device hsr_slave_0 entered promiscuous mode 00:41:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000000)=0x7, 0x4) [ 170.808907][ T6832] device hsr_slave_1 entered promiscuous mode [ 170.924862][ T7022] IPVS: ftp: loaded support on port[0] = 21 [ 170.938294][ T6962] chnl_net:caif_netlink_parms(): no params data found [ 171.102199][ T6962] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.109844][ T6962] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.118047][ T6962] device bridge_slave_0 entered promiscuous mode [ 171.173753][ T6962] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.187758][ T6962] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.197449][ T6962] device bridge_slave_1 entered promiscuous mode [ 171.238215][ T7166] IPVS: ftp: loaded support on port[0] = 21 [ 171.311252][ T6962] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 00:41:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8, 0x3, r2}}}}}]}, 0x40}}, 0x0) [ 171.355867][ T6962] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.542286][ T6962] team0: Port device team_slave_0 added [ 171.564369][ T6832] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 171.623832][ T6832] netdevsim netdevsim0 netdevsim1: renamed from eth1 00:41:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x1c, 0x2, 0x0, 0x1, {{0x8}, {0x8}, [@IFLA_GTP_ROLE={0x8, 0x4, 0x2}]}}}}]}, 0x48}}, 0x0) [ 171.696521][ T6962] team0: Port device team_slave_1 added [ 171.714597][ T7022] chnl_net:caif_netlink_parms(): no params data found [ 171.731674][ T6832] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 171.812534][ T6832] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 171.822688][ T7300] IPVS: ftp: loaded support on port[0] = 21 [ 171.908683][ T7310] IPVS: ftp: loaded support on port[0] = 21 [ 171.933902][ T6962] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 171.941108][ T6962] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 171.970333][ T6962] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 172.012361][ T6962] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 172.020175][ T6962] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.047616][ T6962] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 172.152982][ T6962] device hsr_slave_0 entered promiscuous mode [ 172.209971][ T6962] device hsr_slave_1 entered promiscuous mode [ 172.249098][ T6962] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 172.257039][ T6962] Cannot create hsr debugfs directory [ 172.350611][ T7022] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.357702][ T7022] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.367221][ T7022] device bridge_slave_0 entered promiscuous mode [ 172.377744][ T7022] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.385373][ T7022] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.394265][ T7022] device bridge_slave_1 entered promiscuous mode [ 172.426879][ T7166] chnl_net:caif_netlink_parms(): no params data found [ 172.465666][ T7022] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 172.532192][ T7022] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.632437][ T7022] team0: Port device team_slave_0 added [ 172.707168][ T7022] team0: Port device team_slave_1 added [ 172.731873][ T7300] chnl_net:caif_netlink_parms(): no params data found [ 172.757631][ T7310] chnl_net:caif_netlink_parms(): no params data found [ 172.801635][ T7166] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.809230][ T7166] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.820049][ T7166] device bridge_slave_0 entered promiscuous mode [ 172.832091][ T7166] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.840048][ T7166] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.848105][ T7166] device bridge_slave_1 entered promiscuous mode [ 172.857814][ T7022] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 172.865887][ T7022] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.894030][ T7022] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 172.947619][ T6832] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.956582][ T7022] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 172.964082][ T7022] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.992136][ T7022] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 173.042675][ T7166] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.105631][ T7022] device hsr_slave_0 entered promiscuous mode [ 173.149259][ T7022] device hsr_slave_1 entered promiscuous mode [ 173.198806][ T7022] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 173.206542][ T7022] Cannot create hsr debugfs directory [ 173.218226][ T7166] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 173.340183][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.350758][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.375042][ T7166] team0: Port device team_slave_0 added [ 173.392100][ T7310] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.403347][ T7310] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.412964][ T7310] device bridge_slave_0 entered promiscuous mode [ 173.423371][ T7300] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.431471][ T7300] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.440761][ T7300] device bridge_slave_0 entered promiscuous mode [ 173.449943][ T7166] team0: Port device team_slave_1 added [ 173.459616][ T6832] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.480848][ T6962] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 173.510813][ T7310] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.517994][ T7310] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.526664][ T7310] device bridge_slave_1 entered promiscuous mode [ 173.534578][ T7300] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.545753][ T7300] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.554110][ T7300] device bridge_slave_1 entered promiscuous mode [ 173.592697][ T6962] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 173.636753][ T6962] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 173.707854][ T7166] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 173.716341][ T7166] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 173.742540][ T7166] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 173.754558][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.764232][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.775449][ T2514] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.782770][ T2514] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.793344][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.802863][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.811851][ T2514] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.819285][ T2514] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.828337][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.858020][ T6962] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 173.895605][ T7300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.907231][ T7166] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 173.914478][ T7166] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 173.941627][ T7166] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 173.958572][ T7310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.970637][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.992709][ T7300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 174.029954][ T7310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 174.056387][ T7300] team0: Port device team_slave_0 added [ 174.066383][ T7300] team0: Port device team_slave_1 added [ 174.112780][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.205124][ T7166] device hsr_slave_0 entered promiscuous mode [ 174.264133][ T7166] device hsr_slave_1 entered promiscuous mode [ 174.338667][ T7166] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 174.346372][ T7166] Cannot create hsr debugfs directory [ 174.356153][ T7310] team0: Port device team_slave_0 added [ 174.372436][ T7300] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 174.379787][ T7300] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 174.406351][ T7300] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 174.420405][ T7300] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 174.427987][ T7300] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 174.454982][ T7300] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 174.470186][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.479931][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.507794][ T7310] team0: Port device team_slave_1 added [ 174.541934][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 174.586695][ T7310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 174.594677][ T7310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 174.622391][ T7310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 174.694491][ T7300] device hsr_slave_0 entered promiscuous mode [ 174.740200][ T7300] device hsr_slave_1 entered promiscuous mode [ 174.809356][ T7300] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 174.817015][ T7300] Cannot create hsr debugfs directory [ 174.833023][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.845111][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.855217][ T7310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 174.862582][ T7310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 174.890222][ T7310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 174.912776][ T7022] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 174.973541][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.982837][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.992093][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 175.002047][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 175.023891][ T7022] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 175.081787][ T7022] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 175.165267][ T7022] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 175.210176][ T6832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 175.281401][ T7310] device hsr_slave_0 entered promiscuous mode [ 175.318951][ T7310] device hsr_slave_1 entered promiscuous mode [ 175.368616][ T7310] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 175.376506][ T7310] Cannot create hsr debugfs directory [ 175.520084][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 175.527731][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 175.566697][ T6832] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.584432][ T6962] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.690523][ T7166] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 175.724059][ T6962] 8021q: adding VLAN 0 to HW filter on device team0 [ 175.733493][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.744007][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.755716][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 175.766202][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 175.796047][ T6832] device veth0_vlan entered promiscuous mode [ 175.807065][ T7166] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 175.862071][ T7166] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 175.912189][ T7166] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 175.989946][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 175.999218][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.012382][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.020895][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.063664][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.074103][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.085413][ T2632] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.092654][ T2632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.102702][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.112025][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.121068][ T2632] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.129231][ T2632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.137559][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.147647][ T6832] device veth1_vlan entered promiscuous mode [ 176.186495][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 176.196053][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.204755][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.215297][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 176.226307][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.235967][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 176.245190][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 176.254709][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.263440][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.320221][ T7300] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 176.350929][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 176.359891][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 176.395810][ T7300] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 176.443889][ T6962] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 176.455462][ T6962] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 176.465393][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.475544][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.492170][ T7022] 8021q: adding VLAN 0 to HW filter on device bond0 [ 176.505152][ T7310] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 176.581665][ T7310] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 176.645196][ T7300] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 176.710472][ T6832] device veth0_macvtap entered promiscuous mode [ 176.723553][ T6832] device veth1_macvtap entered promiscuous mode [ 176.738594][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 176.747282][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.756895][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 176.765240][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.773703][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.782798][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 176.792927][ T7310] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 176.857361][ T7310] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 176.893804][ T7300] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 176.964698][ T7022] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.998216][ T6832] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 177.023154][ T6832] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 177.034568][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 177.043423][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 177.051662][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.061072][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.070847][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.080626][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.096333][ T6962] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 177.151203][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.162394][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.173401][ T2628] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.180722][ T2628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.189315][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 177.197884][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.207386][ T2628] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.214548][ T2628] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.224806][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.286601][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 177.494515][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 177.508053][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 177.529764][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 177.577854][ T7166] 8021q: adding VLAN 0 to HW filter on device bond0 [ 177.587038][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 177.601724][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 177.612324][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 177.621303][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.643775][ T6962] device veth0_vlan entered promiscuous mode [ 177.657438][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 177.666242][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.678032][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.689565][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 177.699035][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.707439][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 177.717480][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 00:41:42 executing program 0: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000002300)=ANY=[], 0x801) sendfile(r0, r0, &(0x7f0000000080), 0x8080fffffffe) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x4) [ 177.747115][ T6962] device veth1_vlan entered promiscuous mode [ 177.766229][ T7022] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 177.779248][ T7022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 177.796414][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 177.805956][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 177.816243][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.873758][ T7166] 8021q: adding VLAN 0 to HW filter on device team0 [ 177.899301][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 177.907509][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 177.929980][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 177.949352][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.957889][ T2632] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.965068][ T2632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.010080][ T2632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 00:41:42 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000200)='\vem1\xc1\xf8\xa6\xea\x8dN\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff\x1d\a+\x1e\xb8\xe8\x86@V\x03\xb6\xb1\xc03\x1e,`\x02\xae\xba\xebg\x17\x92\xad\b\x16\xb6.\x01%\xaf\xe10x0}) setfsgid(r4) sendfile(r1, r2, &(0x7f0000d83ff8)=0xe00, 0x8000fffffffe) [ 178.968977][ T2559] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.976111][ T2559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.007427][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 179.020216][ T8120] FAT-fs (loop0): bogus number of FAT sectors [ 179.027130][ T8120] FAT-fs (loop0): Can't find a valid FAT filesystem [ 179.029199][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 179.048933][ T2559] bridge0: port 1(bridge_slave_0) entered blocking state [ 179.056029][ T2559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 179.076772][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 179.085951][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 179.095194][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 179.103341][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 179.120172][ T29] audit: type=1804 audit(1593218503.497:2): pid=8123 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir469180028/syzkaller.AMj2oq/5/file0/bus" dev="sda1" ino=15738 res=1 [ 179.128516][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.162873][ T29] audit: type=1800 audit(1593218503.527:3): pid=8123 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15738 res=0 [ 179.191008][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 179.206000][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.215826][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.231816][ T2559] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.239317][ T2559] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.247748][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 179.257163][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 179.265994][ T2559] bridge0: port 2(bridge_slave_1) entered blocking state [ 179.273476][ T2559] bridge0: port 2(bridge_slave_1) entered forwarding state [ 179.283974][ T2559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.300137][ T7166] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 179.318032][ T7022] device veth0_vlan entered promiscuous mode [ 179.410063][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 179.422854][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.433306][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 179.443364][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.467810][ T7022] device veth1_vlan entered promiscuous mode [ 179.551515][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.563343][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.577368][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 179.594760][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 179.632407][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 179.645134][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.655428][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.664907][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.674659][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.684350][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 179.694899][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 179.704463][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 179.716066][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 179.796749][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.805192][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 179.815159][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.824564][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.828376][ T8120] FAT-fs (loop0): bogus number of FAT sectors [ 179.835591][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 179.845025][ T8120] FAT-fs (loop0): Can't find a valid FAT filesystem [ 179.850629][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 179.862008][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 179.871006][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 179.923227][ T29] audit: type=1804 audit(1593218504.297:4): pid=8120 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir469180028/syzkaller.AMj2oq/5/file0/bus" dev="sda1" ino=15738 res=1 00:41:44 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000240)='./bus\x00', 0x105010, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x393700582498b3b4, 0x0) fstat(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r4) sendfile(r1, r2, &(0x7f0000d83ff8)=0xe00, 0x8000fffffffe) [ 179.985322][ T29] audit: type=1804 audit(1593218504.327:5): pid=8128 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir469180028/syzkaller.AMj2oq/5/file0/bus" dev="sda1" ino=15738 res=1 [ 180.023776][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 180.039142][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 180.048131][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 180.054087][ T29] audit: type=1800 audit(1593218504.327:6): pid=8128 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15738 res=0 [ 180.123205][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 180.132302][ T8134] FAT-fs (loop0): bogus number of FAT sectors [ 180.139553][ T8134] FAT-fs (loop0): Can't find a valid FAT filesystem 00:41:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000240)='./bus\x00', 0x105010, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x393700582498b3b4, 0x0) fstat(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r4) sendfile(r1, r2, &(0x7f0000d83ff8)=0xe00, 0x8000fffffffe) [ 180.174141][ T29] audit: type=1804 audit(1593218504.547:7): pid=8134 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir469180028/syzkaller.AMj2oq/6/file0/bus" dev="sda1" ino=15744 res=1 [ 180.216188][ T7310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 180.288939][ T29] audit: type=1800 audit(1593218504.547:8): pid=8134 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="bus" dev="sda1" ino=15744 res=0 [ 180.344577][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 180.359960][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 180.375512][ T8141] FAT-fs (loop1): bogus number of FAT sectors [ 180.386774][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 180.398032][ T8141] FAT-fs (loop1): Can't find a valid FAT filesystem [ 180.408471][ T2628] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 180.427470][ T7022] device veth0_macvtap entered promiscuous mode [ 180.509289][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 180.517701][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 180.533866][ T29] audit: type=1804 audit(1593218504.907:9): pid=8143 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir975258389/syzkaller.IUnlUO/1/file0/bus" dev="sda1" ino=15746 res=1 [ 180.640505][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.668694][ T29] audit: type=1800 audit(1593218504.937:10): pid=8143 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15746 res=0 [ 180.725799][ T7022] device veth1_macvtap entered promiscuous mode [ 180.751401][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 180.772490][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.785001][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.804941][ T7300] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 180.868845][ T7166] device veth0_vlan entered promiscuous mode [ 181.007086][ T7166] device veth1_vlan entered promiscuous mode [ 181.037731][ T7310] 8021q: adding VLAN 0 to HW filter on device batadv0 00:41:45 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ftruncate(r1, 0x1000) lseek(r1, 0x0, 0x2) r2 = open(&(0x7f0000000240)='./bus\x00', 0x105010, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x393700582498b3b4, 0x0) fstat(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r4) sendfile(r1, r2, &(0x7f0000d83ff8)=0xe00, 0x8000fffffffe) [ 181.083349][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 181.099119][ T2486] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 181.167539][ T7022] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.206583][ T7022] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.234981][ T8156] FAT-fs (loop0): bogus number of FAT sectors [ 181.246342][ T8156] FAT-fs (loop0): Can't find a valid FAT filesystem [ 181.254454][ T7022] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.278160][ T7022] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.301363][ T7022] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 181.337079][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 181.360757][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 181.392165][ T29] audit: type=1804 audit(1593218505.767:11): pid=8156 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir469180028/syzkaller.AMj2oq/7/file0/bus" dev="sda1" ino=15740 res=1 [ 181.399656][ T7022] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.431710][ T7022] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.448829][ T7022] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.484347][ T7022] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.525160][ T7022] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 181.568536][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 181.594035][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 181.605595][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 181.624375][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 181.646464][ T7166] device veth0_macvtap entered promiscuous mode [ 181.689652][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 181.703363][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 181.714365][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 181.748347][ T7166] device veth1_macvtap entered promiscuous mode [ 181.841898][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 181.857488][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 181.867653][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 181.883702][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 181.894798][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 181.931059][ T7300] device veth0_vlan entered promiscuous mode [ 181.973029][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 181.983445][ T2514] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 182.056187][ T7166] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 182.107646][ T7166] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 182.129647][ T7166] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 00:41:46 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000200)='\vem1\xc1\xf8\xa6\xea\x8dN\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff\x1d\a+\x1e\xb8\xe8\x86@V\x03\xb6\xb1\xc03\x1e,`\x02\xae\xba\xebg\x17\x92\xad\b\x16\xb6.\x01%\xaf\xe10x0}) setfsgid(r4) sendfile(r1, r2, &(0x7f0000d83ff8)=0xe00, 0x8000fffffffe) 00:41:48 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x8, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={r0, &(0x7f0000000340), &(0x7f0000000440)=@udp=r1}, 0x20) 00:41:48 executing program 3: 00:41:48 executing program 2: 00:41:48 executing program 5: 00:41:48 executing program 3: 00:41:48 executing program 5: 00:41:48 executing program 2: [ 184.190622][ T8207] FAT-fs (loop1): bogus number of FAT sectors [ 184.244877][ T8207] FAT-fs (loop1): Can't find a valid FAT filesystem 00:41:48 executing program 0: 00:41:48 executing program 4: [ 184.299493][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 184.299506][ T29] audit: type=1804 audit(1593218508.677:13): pid=8212 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir975258389/syzkaller.IUnlUO/2/file0/bus" dev="sda1" ino=15761 res=1 00:41:48 executing program 3: 00:41:48 executing program 5: [ 184.447323][ T29] audit: type=1800 audit(1593218508.717:14): pid=8212 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=15761 res=0 00:41:49 executing program 1: 00:41:49 executing program 2: 00:41:49 executing program 4: 00:41:49 executing program 0: 00:41:49 executing program 3: 00:41:49 executing program 5: 00:41:49 executing program 5: open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') 00:41:49 executing program 3: r0 = socket(0x18, 0x2, 0x0) getsockopt$sock_int(r0, 0xffff, 0x8, &(0x7f0000000100), &(0x7f0000001180)=0x4) 00:41:49 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) 00:41:49 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x1d, 0x40000003, 0x0) fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) 00:41:49 executing program 2: semget$private(0x0, 0x2, 0x0) 00:41:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002700)={0xffffffffffffffff}) dup3(r0, 0xffffffffffffffff, 0x0) 00:41:49 executing program 3: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000380)="765d678a96f6fbe398866a76e9ec4d34a24e1ca8015ff66cba212b2910edfa50", 0x20}], 0x1) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) 00:41:49 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) r1 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x1000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 00:41:49 executing program 4: syz_usb_connect(0x0, 0x36, &(0x7f00000001c0)=ANY=[], 0x0) 00:41:49 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x615, 0x0) open$dir(0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) writev(r0, &(0x7f0000000340)=[{0x0}], 0x1) 00:41:49 executing program 0: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x1000) 00:41:49 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x1000) 00:41:49 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) 00:41:49 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) io_uring_setup(0x66f, &(0x7f0000000300)={0x0, 0x0, 0xa, 0x2}) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x24000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) unshare(0x40000000) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000002c0)="2e00000010008108040f35ecdb4cb92e0a480e002a000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x20040840) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000100)={0x1, 0x7}) ioctl$sock_proto_private(r1, 0x89ee, &(0x7f0000000480)="6cfc33a24d0e7ef87fffffff955b19273817817b27b7a88d28fe63d4cb297231cfff00714def1c3e87a84015bf93405321910237613b82cd5cb45cd64539d641cfe2a2342aa4c41d605d03cef0c201eb464b1915b015844d184c568074b522b9d49a246e33f2b67b8391a9f1b75b21b1d9e563f8c0af522f14ad773dc4fbe2f6e0b981ad84360197f5122306bfa71cc6fc6bed61982a0b27dc6f4213bfd9165285137ea5975afab0bd1b230f5773635e53f84445db441f541487a6eb49894384e485ab226fe2286640431af8e11fc5f748a89c4061b83a4fd900000000000000000000003ead6d42e66905212756f1d796") ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000580)="6950ba083e3df322f10ef57332926f53c9831314def52186a3a8420aff16b90741a83730f932cef1984313c63208ed757f276a16b898e2f9af27171c905c0fe22789628dfd8dc7af4d7eab53d7d9270b14c924eed3c412bac464f42d69a9ad0839d85326d6d319c3477d47e439a65c2f246fa66a2dbe7244a5b8c42c472f8b88dd5a48821e937003098c64a443496bc3bfd8afd5b3e423a8d493806b7b7552d3d8e7db210eb08e1b5a2eda893cb21bbd44b0c95ce16f3cdaefd1dc223fe0c385cccebe12b8cb030718853bd3b6ec048fb6329826") pipe(&(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f00000000c0)='net\x00') getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000140)=0x80) [ 185.466643][ T29] audit: type=1804 audit(1593218509.837:15): pid=8263 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir469180028/syzkaller.AMj2oq/12/file0" dev="sda1" ino=15794 res=1 00:41:49 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xee00) [ 185.574284][ T29] audit: type=1804 audit(1593218509.867:16): pid=8263 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir469180028/syzkaller.AMj2oq/12/file0" dev="sda1" ino=15794 res=1 [ 185.649431][ T8277] IPVS: ftp: loaded support on port[0] = 21 [ 185.669358][ T2486] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 185.685421][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:41:50 executing program 0: r0 = socket$inet6(0x18, 0x3, 0x0) getsockopt$sock_linger(r0, 0xffff, 0x80, 0x0, 0x0) 00:41:50 executing program 2: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) [ 185.756443][ T29] audit: type=1804 audit(1593218509.927:17): pid=8269 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir975258389/syzkaller.IUnlUO/5/file0" dev="sda1" ino=15773 res=1 00:41:50 executing program 1: r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x10202, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) fcntl$setstatus(r1, 0x4, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) ftruncate(r0, 0x0) [ 185.988389][ T2486] usb 5-1: device descriptor read/64, error 18 [ 186.005348][ T29] audit: type=1804 audit(1593218509.937:18): pid=8269 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir975258389/syzkaller.IUnlUO/5/file0" dev="sda1" ino=15773 res=1 00:41:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000016c0)=[{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000040)="7fe6aff57bb6d79b88e02f9e8101a1e302fdf18f479a3b09deed737098ddc5e540e8b85dee55d2c893d3be7ca1c96914c3356304762a0bb6", 0x38}, {0x0}], 0x2}], 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000140)={0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @isdn, @generic={0x0, "a1d63abe32e61965307fd2bdad77"}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='wg0\x00'}) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) [ 186.088672][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 186.097534][ T8277] IPVS: ftp: loaded support on port[0] = 21 00:41:50 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x300, 0x0, 0xb3550aa4ba878254}, 0x9c) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) dup(r1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x6}, 0x8) socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0xd0, 0x0, 0x10, 0x70bd29, 0x0, {}, [@TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7b96}]}, @TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x26}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x48000}, 0x4044045) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 186.302168][ T8323] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 186.388048][ T2486] usb 5-1: device descriptor read/64, error 18 [ 186.658393][ T2486] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 186.698878][ T340] tipc: TX() has been purged, node left! [ 186.948220][ T2486] usb 5-1: device descriptor read/64, error 18 [ 187.222344][ T8336] syz-executor.0 (8336) used greatest stack depth: 20832 bytes left [ 187.338108][ T2486] usb 5-1: device descriptor read/64, error 18 [ 187.461594][ T2486] usb usb5-port1: attempt power cycle [ 188.178074][ T2486] usb 5-1: new high-speed USB device number 4 using dummy_hcd 00:41:52 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getitimer(0x0, &(0x7f0000000440)) 00:41:52 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0xfffffffffffffeff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000), 0x4) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000140)={0x0, 0x0, {0x0, 0x0, 0x8, 0x7e030}}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "7ee51430da3f51b3"}, 0x28) syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00') sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:41:52 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000240)=ANY=[@ANYBLOB="7400000030003b05000000000000000000000000600001005c00010009000100766c616e00000000300002800600030001000080120002"], 0x74}}, 0x0) 00:41:52 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) io_uring_setup(0x66f, &(0x7f0000000300)={0x0, 0x0, 0xa, 0x2}) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x24000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) unshare(0x40000000) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000002c0)="2e00000010008108040f35ecdb4cb92e0a480e002a000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x20040840) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000100)={0x1, 0x7}) ioctl$sock_proto_private(r1, 0x89ee, &(0x7f0000000480)="6cfc33a24d0e7ef87fffffff955b19273817817b27b7a88d28fe63d4cb297231cfff00714def1c3e87a84015bf93405321910237613b82cd5cb45cd64539d641cfe2a2342aa4c41d605d03cef0c201eb464b1915b015844d184c568074b522b9d49a246e33f2b67b8391a9f1b75b21b1d9e563f8c0af522f14ad773dc4fbe2f6e0b981ad84360197f5122306bfa71cc6fc6bed61982a0b27dc6f4213bfd9165285137ea5975afab0bd1b230f5773635e53f84445db441f541487a6eb49894384e485ab226fe2286640431af8e11fc5f748a89c4061b83a4fd900000000000000000000003ead6d42e66905212756f1d796") ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000580)="6950ba083e3df322f10ef57332926f53c9831314def52186a3a8420aff16b90741a83730f932cef1984313c63208ed757f276a16b898e2f9af27171c905c0fe22789628dfd8dc7af4d7eab53d7d9270b14c924eed3c412bac464f42d69a9ad0839d85326d6d319c3477d47e439a65c2f246fa66a2dbe7244a5b8c42c472f8b88dd5a48821e937003098c64a443496bc3bfd8afd5b3e423a8d493806b7b7552d3d8e7db210eb08e1b5a2eda893cb21bbd44b0c95ce16f3cdaefd1dc223fe0c385cccebe12b8cb030718853bd3b6ec048fb6329826") pipe(&(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f00000000c0)='net\x00') getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000140)=0x80) 00:41:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)}], 0x1, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x11e000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000080)="0f225e0f01180f01d165360f5ac91f0f5acd0fc7af0c00baf80c66b8d004398066efbafc0c66b85400000066eff2f2600f32", 0x32}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:41:52 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x3, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) [ 188.358323][ T2486] usb 5-1: device descriptor read/8, error -61 [ 188.463000][ T8367] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 188.507403][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 188.578337][ T2486] usb 5-1: device descriptor read/8, error -71 [ 188.654377][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:41:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x58}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 00:41:53 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000240)=ANY=[@ANYBLOB="7400000030003b05000000000000000000000000600001005c00010009000100766c616e00000000300002800600030001000080120002"], 0x74}}, 0x0) 00:41:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() openat$vhost_vsock(0xffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) syz_open_dev$binderN(0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(0xffffffffffffffff, 0xc4c85513, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) pipe2(&(0x7f0000000080), 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc5e]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 00:41:53 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0xfffffffffffffeff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000), 0x4) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000140)={0x0, 0x0, {0x0, 0x0, 0x8, 0x7e030}}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "7ee51430da3f51b3"}, 0x28) syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00') sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) 00:41:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x58}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 00:41:53 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), &(0x7f0000000240)=0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0), 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000140)={0x0, 0x0, {0x10000, 0x45cd44aa, 0x8, 0x7e030}}) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "7ee51430da3f51b3"}, 0x28) syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00') sendto$inet6(r1, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) [ 188.851860][ T8393] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 188.897152][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:41:53 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000240)=ANY=[@ANYBLOB="7400000030003b05000000000000000000000000600001005c00010009000100766c616e00000000300002800600030001000080120002"], 0x74}}, 0x0) 00:41:53 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x58}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 00:41:53 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0xfffffffffffffeff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, &(0x7f0000000000), 0x4) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000140)={0x0, 0x0, {0x0, 0x0, 0x8, 0x7e030}}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", '\x00', "7ee51430da3f51b3"}, 0x28) syz_genetlink_get_family_id$batadv(&(0x7f0000000400)='batadv\x00') sendto$inet6(r0, &(0x7f0000000080)="39a110", 0x3, 0x0, 0x0, 0x0) [ 189.090423][ T8405] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 189.137511][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 189.307272][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 189.515757][ T8397] ------------[ cut here ]------------ [ 189.521464][ T8397] kernel BUG at arch/x86/kvm/mmu/mmu.c:3719! [ 189.553434][ T8397] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 189.559710][ T8397] CPU: 1 PID: 8397 Comm: syz-executor.0 Not tainted 5.7.0-rc7-next-20200529-syzkaller #0 [ 189.569780][ T8397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.580111][ T8397] RIP: 0010:kvm_mmu_load+0xbfa/0xe00 [ 189.585677][ T8397] Code: ac 23 99 00 48 8b 44 24 08 e9 cf f5 ff ff e8 6d 23 99 00 e9 b7 f4 ff ff 4c 89 f7 e8 90 23 99 00 e9 78 f4 ff ff e8 56 1a 5a 00 <0f> 0b 48 89 df e8 7c 23 99 00 e9 7e f8 ff ff e8 72 23 99 00 e9 c4 [ 189.605542][ T8397] RSP: 0018:ffffc90004227b30 EFLAGS: 00010216 [ 189.611605][ T8397] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90004509000 [ 189.620007][ T8397] RDX: 000000000000e52e RSI: ffffffff8118e14a RDI: 0000000000000001 [ 189.628058][ T8397] RBP: ffff88808ba04080 R08: ffff88809f10e200 R09: ffffed1015ce719c [ 189.636020][ T8397] R10: ffff8880ae738cdb R11: ffffed1015ce719b R12: 0000000000000000 [ 189.644419][ T8397] R13: 0000000000000001 R14: ffff88808ba04498 R15: 0000000000000000 [ 189.652403][ T8397] FS: 00007f2304796700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 189.661321][ T8397] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 189.668017][ T8397] CR2: 00007fb58d6c7000 CR3: 00000000a4bf9000 CR4: 00000000001426e0 [ 189.676081][ T8397] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 189.684051][ T8397] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 189.692018][ T8397] Call Trace: [ 189.695307][ T8397] ? kvm_arch_vcpu_ioctl_run+0x18ec/0x68d0 [ 189.701119][ T8397] kvm_arch_vcpu_ioctl_run+0x4016/0x68d0 [ 189.706749][ T8397] ? __mutex_lock+0x163/0x13c0 [ 189.711533][ T8397] ? kvm_arch_vcpu_runnable+0x6c0/0x6c0 [ 189.717082][ T8397] ? lock_downgrade+0x840/0x840 [ 189.721946][ T8397] ? rcu_read_lock_held_common+0xa0/0xa0 [ 189.727575][ T8397] ? sched_clock+0x2a/0x40 [ 189.732002][ T8397] ? check_preemption_disabled+0x38/0x220 [ 189.737724][ T8397] ? kvm_vcpu_ioctl+0x467/0xe10 [ 189.742576][ T8397] kvm_vcpu_ioctl+0x467/0xe10 [ 189.747417][ T8397] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 189.753843][ T8397] ? ioctl_file_clone+0x180/0x180 [ 189.758874][ T8397] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 189.765030][ T8397] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 189.771043][ T8397] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 189.777210][ T8397] ? tomoyo_path_number_perm+0x238/0x4d0 [ 189.782841][ T8397] ? security_file_ioctl+0x6c/0xb0 [ 189.788043][ T8397] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 189.794543][ T8397] ksys_ioctl+0x11a/0x180 [ 189.798875][ T8397] __x64_sys_ioctl+0x6f/0xb0 [ 189.803465][ T8397] do_syscall_64+0x60/0xe0 [ 189.807887][ T8397] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 189.813778][ T8397] RIP: 0033:0x45cb19 [ 189.817679][ T8397] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.837289][ T8397] RSP: 002b:00007f2304795c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 189.845703][ T8397] RAX: ffffffffffffffda RBX: 00000000004e8a00 RCX: 000000000045cb19 [ 189.853673][ T8397] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 000000000000000a [ 189.861739][ T8397] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 189.869796][ T8397] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 189.877942][ T8397] R13: 00000000000003d0 R14: 00000000004c68ae R15: 00007f23047966d4 [ 189.886188][ T8397] Modules linked in: [ 189.990559][ T8397] ---[ end trace 53a37e4afe3ce790 ]--- [ 189.996402][ T8397] RIP: 0010:kvm_mmu_load+0xbfa/0xe00 [ 190.005502][ T8397] Code: ac 23 99 00 48 8b 44 24 08 e9 cf f5 ff ff e8 6d 23 99 00 e9 b7 f4 ff ff 4c 89 f7 e8 90 23 99 00 e9 78 f4 ff ff e8 56 1a 5a 00 <0f> 0b 48 89 df e8 7c 23 99 00 e9 7e f8 ff ff e8 72 23 99 00 e9 c4 [ 190.040575][ T8397] RSP: 0018:ffffc90004227b30 EFLAGS: 00010216 [ 190.046917][ T8397] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90004509000 [ 190.070667][ T8397] RDX: 000000000000e52e RSI: ffffffff8118e14a RDI: 0000000000000001 [ 190.082174][ T8397] RBP: ffff88808ba04080 R08: ffff88809f10e200 R09: ffffed1015ce719c [ 190.141516][ T8397] R10: ffff8880ae738cdb R11: ffffed1015ce719b R12: 0000000000000000 [ 190.155005][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 190.162591][ T8397] R13: 0000000000000001 R14: ffff88808ba04498 R15: 0000000000000000 [ 190.202742][ T8397] FS: 00007f2304796700(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 190.223294][ T8397] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 190.244623][ T8397] CR2: 00007fc27aada028 CR3: 00000000a4bf9000 CR4: 00000000001426e0 00:41:54 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) io_uring_setup(0x66f, &(0x7f0000000300)={0x0, 0x0, 0xa, 0x2}) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x24000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) unshare(0x40000000) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000002c0)="2e00000010008108040f35ecdb4cb92e0a480e002a000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x20040840) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000100)={0x1, 0x7}) ioctl$sock_proto_private(r1, 0x89ee, &(0x7f0000000480)="6cfc33a24d0e7ef87fffffff955b19273817817b27b7a88d28fe63d4cb297231cfff00714def1c3e87a84015bf93405321910237613b82cd5cb45cd64539d641cfe2a2342aa4c41d605d03cef0c201eb464b1915b015844d184c568074b522b9d49a246e33f2b67b8391a9f1b75b21b1d9e563f8c0af522f14ad773dc4fbe2f6e0b981ad84360197f5122306bfa71cc6fc6bed61982a0b27dc6f4213bfd9165285137ea5975afab0bd1b230f5773635e53f84445db441f541487a6eb49894384e485ab226fe2286640431af8e11fc5f748a89c4061b83a4fd900000000000000000000003ead6d42e66905212756f1d796") ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000580)="6950ba083e3df322f10ef57332926f53c9831314def52186a3a8420aff16b90741a83730f932cef1984313c63208ed757f276a16b898e2f9af27171c905c0fe22789628dfd8dc7af4d7eab53d7d9270b14c924eed3c412bac464f42d69a9ad0839d85326d6d319c3477d47e439a65c2f246fa66a2dbe7244a5b8c42c472f8b88dd5a48821e937003098c64a443496bc3bfd8afd5b3e423a8d493806b7b7552d3d8e7db210eb08e1b5a2eda893cb21bbd44b0c95ce16f3cdaefd1dc223fe0c385cccebe12b8cb030718853bd3b6ec048fb6329826") pipe(&(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f00000000c0)='net\x00') getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000140)=0x80) 00:41:54 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000240)=ANY=[@ANYBLOB="7400000030003b05000000000000000000000000600001005c00010009000100766c616e00000000300002800600030001000080120002"], 0x74}}, 0x0) 00:41:54 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x58}]}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 00:41:54 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) io_uring_setup(0x66f, &(0x7f0000000300)={0x0, 0x0, 0xa, 0x2, 0x3b}) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x24000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) unshare(0x40000000) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000002c0)="2e00000010008108040f35ecdb4cb92e0a480e002a000000e8bd6efb250309000e0001", 0x23}], 0x1}, 0x20040840) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000100)={0x1, 0x7}) ioctl$sock_proto_private(r1, 0x89ee, &(0x7f0000000480)="6cfc33a24d0e7ef87fffffff955b19273817817b27b7a88d28fe63d4cb297231cfff00714def1c3e87a84015bf93405321910237613b82cd5cb45cd64539d641cfe2a2342aa4c41d605d03cef0c201eb464b1915b015844d184c568074b522b9d49a246e33f2b67b8391a9f1b75b21b1d9e563f8c0af522f14ad773dc4fbe2f6e0b981ad84360197f5122306bfa71cc6fc6bed61982a0b27dc6f4213bfd9165285137ea5975afab0bd1b230f5773635e53f84445db441f541487a6eb49894384e485ab226fe2286640431af8e11fc5f748a89c4061b83a4fd900000000000000000000003ead6d42e66905212756f1d796") openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvme-fabrics\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000580)="6950ba083e3df322f10ef57332926f53c9831314def52186a3a8420aff16b90741a83730f932cef1984313c63208ed757f276a16b898e2f9af27171c905c0fe22789628dfd8dc7af4d7eab53d7d9270b14c924eed3c412bac464f42d69a9ad0839d85326d6d319c3477d47e439a65c2f246fa66a2dbe7244a5b8c42c472f8b88dd5a48821e937003098c64a443496bc3bfd8afd5b3e423a8d493806b7b7552d3d8e7db210eb08e1b5a2eda893cb21bbd44b0c95ce16f3cdaefd1dc223fe0c385cccebe12b8cb030718853bd3b6ec048fb6329826") pipe(&(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f00000000c0)='net\x00') getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000140)=0x80) [ 190.273322][ T8397] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 190.288693][ T8397] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 190.317067][ T8397] Kernel panic - not syncing: Fatal exception [ 190.325636][ T8397] Kernel Offset: disabled [ 190.330113][ T8397] Rebooting in 86400 seconds..