Warning: Permanently added '10.128.0.120' (ECDSA) to the list of known hosts. 2019/11/05 08:02:23 fuzzer started 2019/11/05 08:02:25 dialing manager at 10.128.0.26:42879 2019/11/05 08:02:25 syscalls: 2566 2019/11/05 08:02:25 code coverage: enabled 2019/11/05 08:02:25 comparison tracing: enabled 2019/11/05 08:02:25 extra coverage: extra coverage is not supported by the kernel 2019/11/05 08:02:25 setuid sandbox: enabled 2019/11/05 08:02:25 namespace sandbox: enabled 2019/11/05 08:02:25 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/05 08:02:25 fault injection: enabled 2019/11/05 08:02:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/05 08:02:25 net packet injection: enabled 2019/11/05 08:02:25 net device setup: enabled 2019/11/05 08:02:25 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/05 08:02:25 devlink PCI setup: PCI device 0000:00:10.0 is not available 08:04:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x53, 0x0, &(0x7f0000000080)=0x2e2) 08:04:30 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x46f, 0x0) read$FUSE(r0, &(0x7f0000000280), 0x1000) syzkaller login: [ 192.094630][ T8914] IPVS: ftp: loaded support on port[0] = 21 [ 192.263306][ T8914] chnl_net:caif_netlink_parms(): no params data found [ 192.450166][ T8914] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.458141][ T8914] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.468711][ T8914] device bridge_slave_0 entered promiscuous mode [ 192.489884][ T8914] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.497661][ T8914] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.507432][ T8914] device bridge_slave_1 entered promiscuous mode [ 192.524496][ T8917] IPVS: ftp: loaded support on port[0] = 21 [ 192.575771][ T8914] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.605814][ T8914] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.667638][ T8914] team0: Port device team_slave_0 added [ 192.694371][ T8914] team0: Port device team_slave_1 added [ 192.717348][ T8917] chnl_net:caif_netlink_parms(): no params data found 08:04:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e63a111fde54fe080004832c8ff6fde2", 0x11) [ 192.825148][ T8914] device hsr_slave_0 entered promiscuous mode [ 192.890545][ T8914] device hsr_slave_1 entered promiscuous mode [ 192.955607][ T8920] IPVS: ftp: loaded support on port[0] = 21 [ 192.962568][ T8917] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.970528][ T8917] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.001693][ T8917] device bridge_slave_0 entered promiscuous mode [ 193.011034][ T8917] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.019304][ T8917] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.028026][ T8917] device bridge_slave_1 entered promiscuous mode [ 193.081351][ T8917] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.112997][ T8917] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 08:04:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_names\x00') preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000140)=""/13, 0x1}], 0x1f6, 0x10) [ 193.167995][ T8917] team0: Port device team_slave_0 added [ 193.177540][ T8917] team0: Port device team_slave_1 added [ 193.186646][ T8914] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.193865][ T8914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.201786][ T8914] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.208831][ T8914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.281077][ T3053] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.302105][ T3053] bridge0: port 2(bridge_slave_1) entered disabled state 08:04:31 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x2) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) r2 = socket$unix(0x1, 0x2, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x70, 0xff, 0x2, 0x2, 0x80, 0x0, 0x2, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x1, 0x7f5, 0x9, 0x0, 0xff, 0x3}, 0xffffffffffffffff, 0x5, r4, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000780)={{{@in=@initdev, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000180)=0xffffffffffffff5b) fstat(0xffffffffffffffff, &(0x7f0000000700)) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000280)=""/161) r5 = socket$unix(0x1, 0x2, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r6, 0x0, r5) r7 = inotify_init1(0x0) fcntl$setown(r7, 0x8, 0xffffffffffffffff) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000002480), &(0x7f00000024c0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r8 = socket$inet_udp(0x2, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0x0, 0xffffffffffffffff) perf_event_open$cgroup(&(0x7f00000001c0)={0x5, 0x70, 0xff, 0x2, 0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000100), 0x8}, 0x1, 0x7f5, 0x9, 0x0, 0xff, 0x3}, 0xffffffffffffffff, 0x5, r9, 0x9) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r9, 0xc0502100, &(0x7f0000002500)) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r10, 0x0) r11 = getgid() setresgid(r10, r11, 0x0) getresuid(&(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)) setregid(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r12 = socket(0x10, 0x80002, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r13) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) tkill(r14, 0x3a) ptrace$setregset(0x1b, r14, 0x20000004, 0x0) r15 = socket(0x10, 0x80002, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r16) lstat(&(0x7f00000000c0)='.\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r17, 0x0) r18 = getgid() setresgid(r17, r18, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) socket(0x10, 0x80002, 0x0) setreuid(0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000002e80)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r19 = inotify_init1(0x0) fcntl$getownex(r19, 0x10, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f00000034c0)='/dev/rtc0\x00', 0x111000, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000003500)='syz0\x00', 0x200002, 0x0) r20 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r20, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @local}}) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000003540), &(0x7f0000003580)=0xc) socket(0x10, 0x0, 0x0) stat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) r21 = inotify_init1(0x0) fcntl$setown(r21, 0x8, 0xffffffffffffffff) fcntl$getownex(r21, 0x10, &(0x7f0000000080)) r22 = inotify_init1(0x0) fcntl$setown(r22, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) tkill(r23, 0x3a) ptrace$setregset(0x1b, r23, 0x20000004, 0x0) getpgid(r23) r24 = inotify_init1(0x0) fcntl$setown(r24, 0x8, 0xffffffffffffffff) fcntl$getownex(r24, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r25, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r26 = inotify_init1(0x0) fcntl$setown(r26, 0x8, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r27 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r27, 0x10, &(0x7f0000000080)) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r28 = inotify_init1(0x0) fcntl$setown(r28, 0x8, 0xffffffffffffffff) socket(0x5, 0x1, 0x1) r29 = inotify_init1(0x0) fcntl$getownex(r29, 0x10, &(0x7f0000000080)) r30 = inotify_init1(0x0) fcntl$setown(r30, 0x8, 0xffffffffffffffff) fcntl$getownex(r30, 0x10, &(0x7f0000000040)={0x0, 0x0}) tkill(r31, 0x3a) ptrace$setregset(0x1b, r31, 0x20000004, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r32 = inotify_init1(0x0) fcntl$setown(r32, 0x8, 0xffffffffffffffff) fcntl$getownex(r32, 0x10, &(0x7f0000000080)) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) sendmmsg$unix(r5, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) socket(0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=0x31, 0x4) [ 193.515685][ T8917] device hsr_slave_0 entered promiscuous mode [ 193.571078][ T8917] device hsr_slave_1 entered promiscuous mode [ 193.622263][ T8917] debugfs: Directory 'hsr0' with parent '/' already present! [ 193.646104][ T8920] chnl_net:caif_netlink_parms(): no params data found 08:04:31 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) [ 193.703551][ T8926] IPVS: ftp: loaded support on port[0] = 21 [ 193.734937][ T8914] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.736600][ T8928] IPVS: ftp: loaded support on port[0] = 21 [ 193.799452][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.811982][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.839133][ T8914] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.862684][ T8920] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.869753][ T8920] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.879753][ T8920] device bridge_slave_0 entered promiscuous mode [ 193.910680][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.923834][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.932980][ T8925] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.940015][ T8925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.947676][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.957111][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.965564][ T8925] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.972660][ T8925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.980967][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.994784][ T8920] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.003377][ T8920] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.011566][ T8920] device bridge_slave_1 entered promiscuous mode [ 194.036005][ T8930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.054922][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.063927][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.078853][ T8930] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.097270][ T8931] IPVS: ftp: loaded support on port[0] = 21 [ 194.117256][ T8920] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.129765][ T8920] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.204804][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.213692][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.222505][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.230819][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.271188][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.279849][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.292297][ T8926] chnl_net:caif_netlink_parms(): no params data found [ 194.316539][ T8914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.327052][ T8920] team0: Port device team_slave_0 added [ 194.335281][ T8920] team0: Port device team_slave_1 added [ 194.361811][ T8928] chnl_net:caif_netlink_parms(): no params data found [ 194.422732][ T8920] device hsr_slave_0 entered promiscuous mode [ 194.470601][ T8920] device hsr_slave_1 entered promiscuous mode [ 194.510221][ T8920] debugfs: Directory 'hsr0' with parent '/' already present! [ 194.564052][ T8928] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.573565][ T8928] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.582235][ T8928] device bridge_slave_0 entered promiscuous mode [ 194.599843][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 194.607389][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 194.620711][ T8914] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.652187][ T8926] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.659281][ T8926] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.668516][ T8926] device bridge_slave_0 entered promiscuous mode [ 194.677267][ T8928] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.684537][ T8928] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.692603][ T8928] device bridge_slave_1 entered promiscuous mode [ 194.733466][ T8926] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.740726][ T8926] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.748392][ T8926] device bridge_slave_1 entered promiscuous mode [ 194.817791][ T8928] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.845629][ T8917] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.863706][ T8926] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.877764][ T8926] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.890328][ T8928] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.899651][ T8931] chnl_net:caif_netlink_parms(): no params data found [ 194.947487][ T8926] team0: Port device team_slave_0 added [ 195.014347][ T8917] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.025117][ T8926] team0: Port device team_slave_1 added [ 195.034678][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.043143][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.056943][ T8928] team0: Port device team_slave_0 added 08:04:33 executing program 0: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write$P9_RLOPEN(r2, &(0x7f0000000240)={0x18, 0xd, 0x1, {{0x80, 0x1, 0x5}}}, 0x18) write(r3, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000280)={0x0, {{0xa, 0x4e24, 0x0, @rand_addr="ac44b16705526e3c5e1cbeeadf43418e", 0x3}}}, 0x88) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_open_dev$loop(0x0, 0x0, 0xa05c1b6bacdd8913) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3ee9dc82f2b6435a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0)='syz', 0xfffffffffffffffd) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) [ 195.067647][ T8928] team0: Port device team_slave_1 added [ 195.110712][ T8920] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.122769][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.141877][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.150609][ T47] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.157660][ T47] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.165898][ T8931] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.173156][ T8931] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.181463][ T8931] device bridge_slave_0 entered promiscuous mode [ 195.189209][ T8931] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.196584][ T8931] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.204522][ T8931] device bridge_slave_1 entered promiscuous mode [ 195.223640][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.233586][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.244632][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.253735][ T47] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.260852][ T47] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.268843][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.277753][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.286054][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.308593][ T8931] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 195.353350][ T8920] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.361951][ T8931] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.381742][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.391536][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.400731][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.404041][ C0] hrtimer: interrupt took 44819 ns [ 195.409213][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.423328][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.432595][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.441396][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.450734][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.459200][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.494064][ T8917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.521008][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.528960][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.544910][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.556232][ T3053] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.563379][ T3053] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.578484][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.587356][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.602301][ T3053] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.613609][ T3053] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.622136][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.631852][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.692211][ T8928] device hsr_slave_0 entered promiscuous mode [ 195.730469][ T8928] device hsr_slave_1 entered promiscuous mode [ 195.770385][ T8928] debugfs: Directory 'hsr0' with parent '/' already present! [ 195.813365][ T8926] device hsr_slave_0 entered promiscuous mode [ 195.850717][ T8926] device hsr_slave_1 entered promiscuous mode 08:04:34 executing program 0: r0 = socket$inet(0x10, 0x2, 0xc) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000030607051dfffd946fa2830020200a0009000100101d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 195.910246][ T8926] debugfs: Directory 'hsr0' with parent '/' already present! [ 195.938156][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.949858][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.981235][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.998026][ T47] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.006981][ T8957] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 196.019287][ T8931] team0: Port device team_slave_0 added [ 196.067153][ T8920] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 196.083666][ T8920] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.101708][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.114583][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.123113][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.132545][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.141250][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 196.148640][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 196.156501][ T8958] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 196.156527][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.173658][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.183931][ T8931] team0: Port device team_slave_1 added [ 196.194765][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.206185][ T8917] 8021q: adding VLAN 0 to HW filter on device batadv0 08:04:34 executing program 0: r0 = socket$inet(0x10, 0x2, 0xc) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000080)="24000000030607051dfffd946fa2830020200a0009000100101d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 196.283994][ T8931] device hsr_slave_0 entered promiscuous mode [ 196.335975][ T8963] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 196.348045][ T8931] device hsr_slave_1 entered promiscuous mode 08:04:34 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000c88000)={r0, &(0x7f0000847f95), &(0x7f000089b000)}, 0x18) [ 196.390312][ T8931] debugfs: Directory 'hsr0' with parent '/' already present! 08:04:34 executing program 0: lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x406, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000580)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x10, 0xfb, 0x65dc, 0x0, 0x7, 0x0, "23ba75293a854048e58bae5cb4cf866c"}, 0x128) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x100) poll(0x0, 0x0, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 196.501025][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 196.508823][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 196.519898][ T8920] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.670818][ T5] hid (null): unknown global tag 0xe [ 196.705419][ T5] hid-generic 00FB:65DC:0000.0001: unknown main item tag 0x2 08:04:34 executing program 1: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) [ 196.760572][ T5] hid-generic 00FB:65DC:0000.0001: unknown global tag 0xe [ 196.767840][ T8926] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.774779][ T5] hid-generic 00FB:65DC:0000.0001: item 0 1 1 14 parsing failed [ 196.782315][ T8928] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.786268][ T5] hid-generic: probe of 00FB:65DC:0000.0001 failed with error -22 08:04:34 executing program 0: lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x406, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000580)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x10, 0xfb, 0x65dc, 0x0, 0x7, 0x0, "23ba75293a854048e58bae5cb4cf866c"}, 0x128) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x100) poll(0x0, 0x0, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 08:04:34 executing program 1: lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uhid\x00', 0x406, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000580)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x10, 0xfb, 0x65dc, 0x0, 0x7, 0x0, "23ba75293a854048e58bae5cb4cf866c"}, 0x128) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x100) poll(0x0, 0x0, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) [ 196.856951][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.866479][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.913748][ T8926] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.920976][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 08:04:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e63a111fde54fe080004832c8ff6fde2", 0x11) [ 196.969170][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.007920][ T5] hid (null): unknown global tag 0xe [ 197.039144][ T8931] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.058217][ T5] hid-generic 00FB:65DC:0000.0002: unknown main item tag 0x2 [ 197.076035][ T17] hid (null): unknown global tag 0xe [ 197.082180][ T5] hid-generic 00FB:65DC:0000.0002: unknown global tag 0xe [ 197.100625][ T17] hid-generic 00FB:65DC:0000.0003: unknown main item tag 0x2 [ 197.103769][ T5] hid-generic 00FB:65DC:0000.0002: item 0 1 1 14 parsing failed [ 197.108393][ T17] hid-generic 00FB:65DC:0000.0003: unknown global tag 0xe [ 197.108410][ T17] hid-generic 00FB:65DC:0000.0003: item 0 1 1 14 parsing failed [ 197.108596][ T17] hid-generic: probe of 00FB:65DC:0000.0003 failed with error -22 [ 197.135154][ T5] hid-generic: probe of 00FB:65DC:0000.0002 failed with error -22 [ 197.159262][ T8928] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.217293][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.236711][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.259758][ T8925] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.266916][ T8925] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.276282][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.285239][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.294136][ T8925] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.301337][ T8925] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.316881][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.328829][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.362937][ T8931] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.370655][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.379171][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.389829][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.398581][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.407793][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.416256][ T3613] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.423344][ T3613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.431054][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.439546][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.448201][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.456968][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.465440][ T3613] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.472610][ T3613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.481441][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.489702][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.498217][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.507357][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.515728][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.524136][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.532059][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.542923][ T8926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.561570][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.569319][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.580898][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.589321][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.603542][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.612594][ T3613] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.619716][ T3613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.627738][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.639112][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.647951][ T3613] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.655220][ T3613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.683345][ T8926] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.706158][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.716779][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.724788][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.732614][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.741643][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.749897][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.758437][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.766712][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.775755][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.784020][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.795221][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.803771][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.812652][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.821222][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.829587][ T8925] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.839068][ T8928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.857445][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.865616][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.875520][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.884668][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.896151][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.904492][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.923754][ T8931] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 197.936106][ T8931] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.945872][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.956686][ T3053] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.975313][ T8928] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.997279][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.005312][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.013720][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.030825][ T3613] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.044717][ T8931] 8021q: adding VLAN 0 to HW filter on device batadv0 08:04:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_names\x00') preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000140)=""/13, 0x1}], 0x1f6, 0x10) [ 198.474923][ T9027] blk_update_request: I/O error, dev loop0, sector 1024 op 0x0:(READ) flags 0x80700 phys_seg 2 prio class 0 [ 198.586746][ T9033] ptrace attach of "/root/syz-executor.4"[8928] was attempted by "/root/syz-executor.4"[9033] [ 198.980432][ T9027] ptrace attach of "/root/syz-executor.4"[8928] was attempted by "/root/syz-executor.4"[9027] 08:04:37 executing program 4: socket$inet(0x10, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'batadv0\x00'}) prctl$PR_SET_UNALIGN(0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f0000000580)=0x44) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') semget(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f00000024c0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000003700)={0x77359400}) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000380)) 08:04:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e63a111fde54fe080004832c8ff6fde2", 0x11) 08:04:37 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x0) 08:04:37 executing program 0: get_thread_area(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/hwrng\x00', 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) read(r0, &(0x7f0000000180)=""/15, 0xf) shutdown(r0, 0x0) 08:04:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e63a111fde54fe080004832c8ff6fde2", 0x11) 08:04:37 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x23) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x8}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 199.407736][ T9076] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 08:04:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000140)=""/13, 0x1}], 0x1f6, 0x10) 08:04:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e63a111fde54fe080004832c8ff6fde2", 0x11) 08:04:37 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a000097d3d34473"], 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 08:04:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000140)=""/13, 0x1}], 0x1f6, 0x10) 08:04:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e63a111fde54fe080004832c8ff6fde2", 0x11) 08:04:37 executing program 1: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000180)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write$P9_RLOPEN(r2, &(0x7f0000000240)={0x18, 0xd, 0x1, {{0x80, 0x1, 0x5}}}, 0x18) write(r3, &(0x7f0000000340), 0x41395527) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000280)={0x2, {{0xa, 0x4e24, 0x0, @rand_addr="ac44b16705526e3c5e1cbeeadf43418e", 0x3}}}, 0x88) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_open_dev$loop(0x0, 0x0, 0xa05c1b6bacdd8913) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x3ee9dc82f2b6435a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000001c0)='syz', 0xfffffffffffffffd) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) 08:04:38 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e63a111fde54fe080004832c8ff6fde2", 0x11) 08:04:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000680)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000640)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r2 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x4001000000000014) 08:04:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000140)=""/13, 0x1}], 0x1f6, 0x10) 08:04:38 executing program 5: ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) socket$inet(0x10, 0x2, 0x0) semctl$GETZCNT(0x0, 0x0, 0xf, 0x0) mkdir(0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'batadv0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = syz_open_procfs$namespace(0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0\x00', 0x0) semget(0x0, 0x3, 0x102) openat$full(0xffffffffffffff9c, 0x0, 0x240080, 0x0) creat(&(0x7f0000000680)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x0, &(0x7f0000003700)={0x77359400}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f00000007c0)=""/236) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000380)) 08:04:38 executing program 0: socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000680)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000640)={0x28, 0x0, 0x0, @my=0x0}, 0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 08:04:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_names\x00') preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000140)=""/13, 0x1}], 0x1f6, 0x10) 08:04:38 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e63a111fde54fe080004832c8ff6fde2", 0x11) 08:04:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_names\x00') preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000140)=""/13, 0x1}], 0x1f6, 0x10) 08:04:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) mkdirat(0xffffffffffffffff, 0x0, 0x0) 08:04:38 executing program 2: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e63a111fde54fe080004832c8ff6fde2", 0x11) 08:04:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_names\x00') preadv(r2, &(0x7f0000001540)=[{&(0x7f0000000140)=""/13, 0x1}], 0x1f6, 0x10) 08:04:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000680)={@my=0x0}) socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(0xffffffffffffffff, 0x0, 0x0) 08:04:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e63a111fde54fe080004832c8ff6fde2", 0x11) 08:04:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_names\x00') preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000140)=""/13, 0x1}], 0x1f6, 0x10) 08:04:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @broadcast, 0x0, 0x0, 'lblc\x00', 0x0, 0x0, 0xffffffff}, 0x2c) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000100)={0x84, @local, 0x0, 0x0, 'sh\x00', 0x4, 0x2, 0x69}, 0x2c) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5d4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4890}, 0x4000) 08:04:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e63a111fde54fe080004832c8ff6fde2", 0x11) 08:04:39 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffb, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video35\x00', 0x2, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="fefbffff35c8d19a02bc27"], 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0xffffffff, 0x2, {0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058560f, &(0x7f0000000300)={0x0, 0x2, 0x0, {0x0, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20000000}}, [0x0, 0x0, 0x0, 0x4000000000000000]}) 08:04:39 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) open(&(0x7f0000000100)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x12428b0, &(0x7f0000000000)) 08:04:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_names\x00') preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000140)=""/13, 0x1}], 0x1f6, 0x10) 08:04:39 executing program 4: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f410005a90f57f07703aeff0f64ebbee0796b622772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0xd0}, {&(0x7f0000000040)="53006000c659ca807737f40000002bc0550017080000000000000d20000000", 0x1f}], 0x2) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffa) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x6, 0x1) ioctl$LOOP_CLR_FD(r1, 0x4c01) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000080)=0x200, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 08:04:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e63a111fde54fe080004832c8ff6fde2", 0x11) 08:04:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2000000000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2f0000001d0005c5ffffff000d0000000200001f01000000000002c9130001000000000050800000d18e1092e0c875", 0x2f}], 0x1}, 0x0) [ 201.249937][ T9181] IPVS: lblc: UDP 255.255.255.255:0 - no destination available [ 201.269041][ T9181] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:3072 08:04:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e63a111fde54fe080004832c8ff6fde2", 0x11) 08:04:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_names\x00') preadv(r1, &(0x7f0000001540)=[{&(0x7f0000000140)=""/13, 0x1}], 0x1f6, 0x10) 08:04:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_setup(0x2, &(0x7f0000000240)=0x0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) io_submit(r1, 0x2, &(0x7f00000001c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x23, 0x0, 0x0, r2, 0x0}]) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) 08:04:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f0000008440), 0x400000000000358, 0x600040de) [ 201.567861][ T9197] sg_write: data in/out 1111040/162 bytes for SCSI command 0x2a-- guessing data in; [ 201.567861][ T9197] program syz-executor.4 not setting count and/or reply_len properly [ 201.660436][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 201.660449][ T26] audit: type=1800 audit(1572941079.733:31): pid=9221 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16580 res=0 08:04:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e63a111fde54fe080004832c8ff6fde2", 0x11) 08:04:39 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_names\x00') preadv(r0, &(0x7f0000001540)=[{&(0x7f0000000140)=""/13, 0x1}], 0x1f6, 0x10) 08:04:39 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) read(r0, &(0x7f00000000c0)=""/11, 0x3ef) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_pts(r0, 0x0) dup2(r0, r2) [ 201.913685][ T26] audit: type=1804 audit(1572941079.743:32): pid=9221 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir696626610/syzkaller.XF7DF9/6/file0" dev="sda1" ino=16580 res=1 [ 215.550336][ T1080] INFO: task khugepaged:1087 blocked for more than 143 seconds. [ 215.558081][ T1080] Not tainted 5.4.0-rc5-next-20191031 #0 [ 215.564400][ T1080] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 215.573102][ T1080] khugepaged D26848 1087 2 0x80004000 [ 215.579562][ T1080] Call Trace: [ 215.582955][ T1080] __schedule+0x94a/0x1e70 [ 215.587390][ T1080] ? __sched_text_start+0x8/0x8 [ 215.592321][ T1080] ? blk_insert_cloned_request+0x530/0x530 [ 215.598138][ T1080] ? _raw_spin_unlock_irq+0x23/0x80 [ 215.603403][ T1080] ? __lock_page+0x3d9/0xab0 [ 215.608179][ T1080] ? _raw_spin_unlock_irq+0x23/0x80 [ 215.613558][ T1080] schedule+0xdc/0x2b0 [ 215.617651][ T1080] io_schedule+0x1c/0x70 [ 215.621984][ T1080] __lock_page+0x422/0xab0 [ 215.626506][ T1080] ? wait_on_page_bit+0xa60/0xa60 [ 215.631798][ T1080] ? page_cache_next_miss+0x340/0x340 [ 215.637172][ T1080] ? ___might_sleep+0x163/0x2c0 [ 215.642186][ T1080] ? __might_sleep+0x95/0x190 [ 215.646865][ T1080] mpage_prepare_extent_to_map+0xb3f/0xf90 [ 215.652730][ T1080] ? mpage_process_page_bufs+0x780/0x780 [ 215.658363][ T1080] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 215.663991][ T1080] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 215.670018][ T1080] ? __kmalloc_node+0xf/0x70 [ 215.674680][ T1080] ext4_writepages+0x954/0x2e70 [ 215.679533][ T1080] ? find_held_lock+0x35/0x130 [ 215.684372][ T1080] ? lock_downgrade+0x880/0x920 [ 215.689235][ T1080] ? ext4_mark_inode_dirty+0x9b0/0x9b0 [ 215.694730][ T1080] ? 0xffffffff81000000 [ 215.698883][ T1080] ? mark_lock+0xc2/0x1220 [ 215.703362][ T1080] ? __lock_acquire+0x16f2/0x4a00 [ 215.708402][ T1080] ? _raw_spin_unlock_irq+0x59/0x80 [ 215.713673][ T1080] ? wbc_attach_and_unlock_inode+0x514/0x920 [ 215.719652][ T1080] ? find_held_lock+0x35/0x130 [ 215.724572][ T1080] ? wbc_attach_and_unlock_inode+0x515/0x920 [ 215.730625][ T1080] ? ext4_mark_inode_dirty+0x9b0/0x9b0 [ 215.736079][ T1080] do_writepages+0xfa/0x2a0 [ 215.740652][ T1080] ? do_writepages+0xfa/0x2a0 [ 215.745336][ T1080] ? lock_downgrade+0x920/0x920 [ 215.750239][ T1080] ? page_writeback_cpu_online+0x20/0x20 [ 215.756047][ T1080] ? __kasan_check_read+0x11/0x20 [ 215.761133][ T1080] ? do_raw_spin_unlock+0x57/0x270 [ 215.766339][ T1080] ? _raw_spin_unlock+0x28/0x40 [ 215.771245][ T1080] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 215.777500][ T1080] ? wbc_attach_and_unlock_inode+0x5bf/0x920 [ 215.783539][ T1080] __filemap_fdatawrite_range+0x2bc/0x3b0 [ 215.789249][ T1080] ? delete_from_page_cache_batch+0xfe0/0xfe0 [ 215.795411][ T1080] ? lockdep_hardirqs_on+0x421/0x5e0 [ 215.800765][ T1080] filemap_flush+0x24/0x30 [ 215.805180][ T1080] collapse_file+0x36b1/0x41a0 [ 215.809929][ T1080] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 215.816152][ T1080] ? khugepaged+0x21c0/0x4360 [ 215.820894][ T1080] ? trace_event_raw_event_mm_collapse_huge_page_isolate+0x370/0x370 [ 215.830871][ T1080] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 215.836585][ T1080] ? khugepaged_find_target_node+0x142/0x180 [ 215.842619][ T1080] khugepaged+0x2da9/0x4360 [ 215.847120][ T1080] ? __kasan_check_read+0x11/0x20 [ 215.852195][ T1080] ? __lock_acquire+0x16f2/0x4a00 [ 215.857219][ T1080] ? _raw_spin_unlock_irq+0x23/0x80 [ 215.862486][ T1080] ? finish_task_switch+0x147/0x750 [ 215.867681][ T1080] ? _raw_spin_unlock_irq+0x23/0x80 [ 215.872993][ T1080] ? lockdep_hardirqs_on+0x421/0x5e0 [ 215.878281][ T1080] ? collapse_pte_mapped_thp+0xbe0/0xbe0 [ 215.883972][ T1080] ? lock_downgrade+0x920/0x920 [ 215.888817][ T1080] ? finish_wait+0x260/0x260 [ 215.893465][ T1080] ? lockdep_hardirqs_on+0x421/0x5e0 [ 215.898843][ T1080] ? trace_hardirqs_on+0x67/0x240 [ 215.903923][ T1080] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 215.910202][ T1080] ? __kthread_parkme+0x108/0x1c0 [ 215.915217][ T1080] ? __kasan_check_read+0x11/0x20 [ 215.920314][ T1080] kthread+0x361/0x430 [ 215.924380][ T1080] ? collapse_pte_mapped_thp+0xbe0/0xbe0 [ 215.929991][ T1080] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 215.935748][ T1080] ret_from_fork+0x24/0x30 [ 215.940493][ T1080] [ 215.940493][ T1080] Showing all locks held in the system: [ 215.948206][ T1080] 4 locks held by kworker/u4:0/7: [ 215.953323][ T1080] #0: ffff8880a8682128 ((wq_completion)writeback){+.+.}, at: process_one_work+0x88b/0x1740 [ 215.963457][ T1080] #1: ffff8880a988fdc0 ((work_completion)(&(&wb->dwork)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 215.974794][ T1080] #2: ffff88809ac500d8 (&type->s_umount_key#32){++++}, at: trylock_super+0x22/0x110 [ 215.984334][ T1080] #3: ffff88809ac52990 (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0xfa/0x2a0 [ 215.994333][ T1080] 1 lock held by khungtaskd/1080: [ 215.999338][ T1080] #0: ffffffff88faba40 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x279 [ 216.008700][ T1080] 1 lock held by khugepaged/1087: [ 216.013742][ T1080] #0: ffff88809ac52990 (&sbi->s_journal_flag_rwsem){.+.+}, at: do_writepages+0xfa/0x2a0 [ 216.023643][ T1080] 2 locks held by getty/8873: [ 216.028302][ T1080] #0: ffff88809d1e4090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 216.037506][ T1080] #1: ffffc90005f372e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 216.047108][ T1080] 2 locks held by getty/8874: [ 216.051940][ T1080] #0: ffff8880984e6090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 216.061403][ T1080] #1: ffffc90005f472e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 216.071017][ T1080] 2 locks held by getty/8875: [ 216.075666][ T1080] #0: ffff888096ee2090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 216.084662][ T1080] #1: ffffc90005f3b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 216.094260][ T1080] 2 locks held by getty/8876: [ 216.098908][ T1080] #0: ffff8880a137f090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 216.107902][ T1080] #1: ffffc90005f532e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 216.117515][ T1080] 2 locks held by getty/8877: [ 216.122254][ T1080] #0: ffff88809bc0f090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 216.131232][ T1080] #1: ffffc90005f432e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 216.140878][ T1080] 2 locks held by getty/8878: [ 216.145547][ T1080] #0: ffff88809fdd1090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 216.154560][ T1080] #1: ffffc90005f4b2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 216.164292][ T1080] 2 locks held by getty/8879: [ 216.169842][ T1080] #0: ffff8880a0b49090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 216.178850][ T1080] #1: ffffc90005f212e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x220/0x1bf0 [ 216.188475][ T1080] 1 lock held by syz-executor.1/9216: [ 216.193892][ T1080] #0: ffff88809ac500d8 (&type->s_umount_key#32){++++}, at: do_mount+0xec2/0x1b50 [ 216.204041][ T1080] [ 216.206360][ T1080] ============================================= [ 216.206360][ T1080] [ 216.214819][ T1080] NMI backtrace for cpu 1 [ 216.219262][ T1080] CPU: 1 PID: 1080 Comm: khungtaskd Not tainted 5.4.0-rc5-next-20191031 #0 [ 216.227827][ T1080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.237908][ T1080] Call Trace: [ 216.241279][ T1080] dump_stack+0x172/0x1f0 [ 216.245637][ T1080] nmi_cpu_backtrace.cold+0x70/0xb2 [ 216.251995][ T1080] ? vprintk_func+0x86/0x189 [ 216.256570][ T1080] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 216.262195][ T1080] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 216.268159][ T1080] arch_trigger_cpumask_backtrace+0x14/0x20 [ 216.274030][ T1080] watchdog+0xc8f/0x1350 [ 216.278774][ T1080] kthread+0x361/0x430 [ 216.282818][ T1080] ? reset_hung_task_detector+0x30/0x30 [ 216.288341][ T1080] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 216.294044][ T1080] ret_from_fork+0x24/0x30 [ 216.298635][ T1080] Sending NMI from CPU 1 to CPUs 0: [ 216.304147][ C0] NMI backtrace for cpu 0 [ 216.304153][ C0] CPU: 0 PID: 170 Comm: kworker/u4:3 Not tainted 5.4.0-rc5-next-20191031 #0 [ 216.304158][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.304162][ C0] Workqueue: bat_events batadv_nc_worker [ 216.304168][ C0] RIP: 0010:lock_acquire+0x20b/0x410 [ 216.304178][ C0] Code: 9c 08 00 00 00 00 00 00 48 c1 e8 03 80 3c 10 00 0f 85 d3 01 00 00 48 83 3d e1 8f 99 07 00 0f 84 53 01 00 00 48 8b 7d c8 57 9d <0f> 1f 44 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 65 8b [ 216.304181][ C0] RSP: 0018:ffff8880a9527c80 EFLAGS: 00000286 [ 216.304188][ C0] RAX: 1ffffffff11e643c RBX: ffff8880a94d2140 RCX: ffffffff81593710 [ 216.304193][ C0] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: 0000000000000286 [ 216.304197][ C0] RBP: ffff8880a9527cc8 R08: 1ffffffff14f3d34 R09: fffffbfff14f3d35 [ 216.304201][ C0] R10: ffff8880a94d2a30 R11: ffff8880a94d2140 R12: ffffffff88faba40 [ 216.304206][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000002 [ 216.304210][ C0] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 216.304214][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 216.304219][ C0] CR2: 000000c420443a28 CR3: 0000000095197000 CR4: 00000000001406f0 [ 216.304223][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 216.304228][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 216.304230][ C0] Call Trace: [ 216.304233][ C0] batadv_nc_worker+0x117/0x760 [ 216.304236][ C0] ? batadv_nc_worker+0xe3/0x760 [ 216.304239][ C0] process_one_work+0x9af/0x1740 [ 216.304243][ C0] ? pwq_dec_nr_in_flight+0x320/0x320 [ 216.304246][ C0] ? lock_acquire+0x190/0x410 [ 216.304249][ C0] worker_thread+0x98/0xe40 [ 216.304252][ C0] kthread+0x361/0x430 [ 216.304255][ C0] ? process_one_work+0x1740/0x1740 [ 216.304258][ C0] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 216.304261][ C0] ret_from_fork+0x24/0x30 [ 216.304986][ T1080] Kernel panic - not syncing: hung_task: blocked tasks [ 216.502611][ T1080] CPU: 1 PID: 1080 Comm: khungtaskd Not tainted 5.4.0-rc5-next-20191031 #0 [ 216.511366][ T1080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.521415][ T1080] Call Trace: [ 216.524700][ T1080] dump_stack+0x172/0x1f0 [ 216.529005][ T1080] panic+0x2e3/0x75c [ 216.532889][ T1080] ? add_taint.cold+0x16/0x16 [ 216.538256][ T1080] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 216.543962][ T1080] ? ___preempt_schedule+0x16/0x18 [ 216.549061][ T1080] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 216.555200][ T1080] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 216.561338][ T1080] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 216.567486][ T1080] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 216.573684][ T1080] watchdog+0xca0/0x1350 [ 216.577920][ T1080] kthread+0x361/0x430 [ 216.581977][ T1080] ? reset_hung_task_detector+0x30/0x30 [ 216.587504][ T1080] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 216.593206][ T1080] ret_from_fork+0x24/0x30 [ 216.599192][ T1080] Kernel Offset: disabled [ 216.603616][ T1080] Rebooting in 86400 seconds..