[ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.50' (ECDSA) to the list of known hosts. 2020/12/21 05:37:42 fuzzer started 2020/12/21 05:37:43 dialing manager at 10.128.0.26:45709 2020/12/21 05:37:43 syscalls: 3465 2020/12/21 05:37:43 code coverage: enabled 2020/12/21 05:37:43 comparison tracing: enabled 2020/12/21 05:37:43 extra coverage: enabled 2020/12/21 05:37:43 setuid sandbox: enabled 2020/12/21 05:37:43 namespace sandbox: enabled 2020/12/21 05:37:43 Android sandbox: enabled 2020/12/21 05:37:43 fault injection: enabled 2020/12/21 05:37:43 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/12/21 05:37:43 net packet injection: enabled 2020/12/21 05:37:43 net device setup: enabled 2020/12/21 05:37:43 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/12/21 05:37:43 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/12/21 05:37:43 USB emulation: enabled 2020/12/21 05:37:43 hci packet injection: enabled 2020/12/21 05:37:43 wifi device emulation: enabled 05:42:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, 0x0, 0x0) syzkaller login: [ 353.701241][ T35] audit: type=1400 audit(1608529335.144:8): avc: denied { execmem } for pid=8502 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 05:42:15 executing program 1: shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0xffffffffffffffff}}) 05:42:15 executing program 2: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0xfffffffffffffdaf) 05:42:15 executing program 3: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) accept4$unix(r0, 0x0, 0x0, 0x0) 05:42:16 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) sendto(r0, 0x0, 0x0, 0x3, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 05:42:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) bind(r1, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) [ 355.037539][ T8503] IPVS: ftp: loaded support on port[0] = 21 [ 355.307038][ T8505] IPVS: ftp: loaded support on port[0] = 21 [ 355.468393][ T8503] chnl_net:caif_netlink_parms(): no params data found [ 355.557052][ T8507] IPVS: ftp: loaded support on port[0] = 21 [ 355.827026][ T8509] IPVS: ftp: loaded support on port[0] = 21 [ 355.979501][ T8503] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.991165][ T8503] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.026705][ T8503] device bridge_slave_0 entered promiscuous mode [ 356.108850][ T8511] IPVS: ftp: loaded support on port[0] = 21 [ 356.148994][ T8503] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.159647][ T8503] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.171159][ T8503] device bridge_slave_1 entered promiscuous mode [ 356.311134][ T8505] chnl_net:caif_netlink_parms(): no params data found [ 356.356602][ T8503] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 356.379196][ T8503] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 356.437172][ T8507] chnl_net:caif_netlink_parms(): no params data found [ 356.527221][ T8503] team0: Port device team_slave_0 added [ 356.559478][ T8503] team0: Port device team_slave_1 added [ 356.609919][ T8503] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 356.617481][ T8503] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 356.643933][ T8503] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 356.682126][ T8505] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.694072][ T8505] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.701811][ T8505] device bridge_slave_0 entered promiscuous mode [ 356.710607][ T8503] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 356.718119][ T8503] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 356.744428][ T8503] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 356.756985][ T8507] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.766668][ T8507] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.782787][ T8507] device bridge_slave_0 entered promiscuous mode [ 356.817700][ T8505] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.828686][ T8505] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.840589][ T8505] device bridge_slave_1 entered promiscuous mode [ 356.901124][ T8507] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.909388][ T8507] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.937947][ T8507] device bridge_slave_1 entered promiscuous mode [ 357.012348][ T2998] Bluetooth: hci0: command 0x0409 tx timeout [ 357.091619][ T8503] device hsr_slave_0 entered promiscuous mode [ 357.099697][ T8503] device hsr_slave_1 entered promiscuous mode [ 357.121185][ T8662] IPVS: ftp: loaded support on port[0] = 21 [ 357.149021][ T8507] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 357.161294][ T8505] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 357.177812][ T8505] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 357.196196][ T8509] chnl_net:caif_netlink_parms(): no params data found [ 357.245250][ T8507] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 357.252311][ T2998] Bluetooth: hci1: command 0x0409 tx timeout [ 357.312686][ T8505] team0: Port device team_slave_0 added [ 357.358119][ T8505] team0: Port device team_slave_1 added [ 357.376784][ T8511] chnl_net:caif_netlink_parms(): no params data found [ 357.408887][ T8507] team0: Port device team_slave_0 added [ 357.462030][ T8507] team0: Port device team_slave_1 added [ 357.482813][ T8711] Bluetooth: hci2: command 0x0409 tx timeout [ 357.487069][ T8505] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 357.501077][ T8505] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 357.527932][ T8505] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 357.562669][ T8505] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 357.569645][ T8505] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 357.596948][ T8505] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 357.676015][ T8509] bridge0: port 1(bridge_slave_0) entered blocking state [ 357.683801][ T8509] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.691694][ T8509] device bridge_slave_0 entered promiscuous mode [ 357.708354][ T8507] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 357.715606][ T8507] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 357.741958][ T8711] Bluetooth: hci3: command 0x0409 tx timeout [ 357.748556][ T8507] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 357.777969][ T8509] bridge0: port 2(bridge_slave_1) entered blocking state [ 357.785402][ T8509] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.793875][ T8509] device bridge_slave_1 entered promiscuous mode [ 357.806250][ T8507] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 357.820014][ T8507] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 357.846015][ T8507] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 357.910237][ T8505] device hsr_slave_0 entered promiscuous mode [ 357.921664][ T8505] device hsr_slave_1 entered promiscuous mode [ 357.936911][ T8505] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 357.946628][ T8505] Cannot create hsr debugfs directory [ 357.962403][ T8711] Bluetooth: hci4: command 0x0409 tx timeout [ 358.043917][ T8507] device hsr_slave_0 entered promiscuous mode [ 358.050955][ T8507] device hsr_slave_1 entered promiscuous mode [ 358.059862][ T8507] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 358.068521][ T8507] Cannot create hsr debugfs directory [ 358.106862][ T8662] chnl_net:caif_netlink_parms(): no params data found [ 358.141742][ T8509] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 358.189727][ T8511] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.197086][ T8511] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.206709][ T8511] device bridge_slave_0 entered promiscuous mode [ 358.218184][ T8509] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 358.274556][ T8511] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.281735][ T8511] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.295676][ T8511] device bridge_slave_1 entered promiscuous mode [ 358.381410][ T8511] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 358.395659][ T8511] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 358.407457][ T8509] team0: Port device team_slave_0 added [ 358.459383][ T8509] team0: Port device team_slave_1 added [ 358.559826][ T8511] team0: Port device team_slave_0 added [ 358.581624][ T8662] bridge0: port 1(bridge_slave_0) entered blocking state [ 358.589130][ T8662] bridge0: port 1(bridge_slave_0) entered disabled state [ 358.599171][ T8662] device bridge_slave_0 entered promiscuous mode [ 358.612035][ T8662] bridge0: port 2(bridge_slave_1) entered blocking state [ 358.620408][ T8662] bridge0: port 2(bridge_slave_1) entered disabled state [ 358.629597][ T8662] device bridge_slave_1 entered promiscuous mode [ 358.637531][ T8509] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 358.644714][ T8509] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 358.670712][ T8509] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 358.684673][ T8511] team0: Port device team_slave_1 added [ 358.691056][ T8509] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 358.699275][ T8509] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 358.725381][ T8509] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 358.846640][ T8511] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 358.853738][ T8923] Bluetooth: hci5: command 0x0409 tx timeout [ 358.854885][ T8511] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 358.886148][ T8511] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 358.911873][ T8662] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 358.923988][ T8503] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 358.951765][ T8511] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 358.959381][ T8511] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 358.985716][ T8511] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 359.001678][ T8509] device hsr_slave_0 entered promiscuous mode [ 359.009387][ T8509] device hsr_slave_1 entered promiscuous mode [ 359.019157][ T8509] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 359.026821][ T8509] Cannot create hsr debugfs directory [ 359.034460][ T8662] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 359.045016][ T8503] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 359.065696][ T8503] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 359.082517][ T8923] Bluetooth: hci0: command 0x041b tx timeout [ 359.120054][ T8503] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 359.201816][ T8511] device hsr_slave_0 entered promiscuous mode [ 359.209034][ T8511] device hsr_slave_1 entered promiscuous mode [ 359.217332][ T8511] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 359.225222][ T8511] Cannot create hsr debugfs directory [ 359.240105][ T8662] team0: Port device team_slave_0 added [ 359.251097][ T8662] team0: Port device team_slave_1 added [ 359.323310][ T8923] Bluetooth: hci1: command 0x041b tx timeout [ 359.354655][ T8662] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 359.361607][ T8662] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 359.387763][ T8662] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 359.431983][ T8662] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 359.447692][ T8662] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 359.474605][ T8662] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 359.493195][ T8505] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 359.517330][ T8505] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 359.562480][ T8593] Bluetooth: hci2: command 0x041b tx timeout [ 359.577214][ T8505] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 359.589451][ T8505] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 359.630715][ T8662] device hsr_slave_0 entered promiscuous mode [ 359.640201][ T8662] device hsr_slave_1 entered promiscuous mode [ 359.649325][ T8662] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 359.657830][ T8662] Cannot create hsr debugfs directory [ 359.805949][ T8507] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 359.808168][ T8593] Bluetooth: hci3: command 0x041b tx timeout [ 359.867408][ T8507] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 359.880486][ T8507] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 359.915195][ T8507] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 360.012094][ T8509] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 360.034453][ T8509] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 360.051916][ T17] Bluetooth: hci4: command 0x041b tx timeout [ 360.093957][ T8509] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 360.114335][ T8509] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 360.251636][ T8511] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 360.288178][ T8505] 8021q: adding VLAN 0 to HW filter on device bond0 [ 360.305965][ T8503] 8021q: adding VLAN 0 to HW filter on device bond0 [ 360.333584][ T8511] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 360.345105][ T8511] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 360.356230][ T8511] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 360.410161][ T8503] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.434208][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 360.450382][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.497699][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 360.507974][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.516672][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 360.526116][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 360.535439][ T8711] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.542968][ T8711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.551136][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 360.560300][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.569030][ T8711] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.576189][ T8711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.590091][ T8505] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.606623][ T8507] 8021q: adding VLAN 0 to HW filter on device bond0 [ 360.629939][ T8662] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 360.639863][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 360.648641][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 360.694005][ T8662] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 360.705424][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 360.720557][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 360.729549][ T8780] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.736684][ T8780] bridge0: port 1(bridge_slave_0) entered forwarding state [ 360.744848][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 360.754166][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 360.763055][ T8780] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.770109][ T8780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 360.795298][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 360.812149][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 360.821218][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 360.836223][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 360.846433][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 360.857174][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 360.866528][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 360.875016][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 360.883429][ T8662] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 360.910378][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 360.925476][ T8507] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.934462][ T8593] Bluetooth: hci5: command 0x041b tx timeout [ 360.946432][ T8662] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 360.973274][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 360.989932][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 360.998623][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 361.008371][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.061347][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.069287][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.078944][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.089139][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 361.098420][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.112787][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.124989][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.133854][ T8711] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.140929][ T8711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.169233][ T8503] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 361.181005][ T8923] Bluetooth: hci0: command 0x040f tx timeout [ 361.188702][ T8503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 361.199214][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 361.208165][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 361.217229][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.226207][ T8780] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.233361][ T8780] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.243394][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 361.251731][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.260627][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 361.299808][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.313657][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.321886][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 361.341012][ T8505] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 361.353186][ T8505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 361.395576][ T8509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 361.402544][ T8923] Bluetooth: hci1: command 0x040f tx timeout [ 361.410618][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 361.421026][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.430058][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 361.439273][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.448170][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 361.457369][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.486882][ T8511] 8021q: adding VLAN 0 to HW filter on device bond0 [ 361.516523][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.559015][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 361.569959][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.579341][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 361.588308][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.597201][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 361.604936][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 361.612905][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 361.620594][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.628829][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 361.636949][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.642959][ T8923] Bluetooth: hci2: command 0x040f tx timeout [ 361.654818][ T8511] 8021q: adding VLAN 0 to HW filter on device team0 [ 361.664166][ T8509] 8021q: adding VLAN 0 to HW filter on device team0 [ 361.687390][ T8507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 361.701230][ T8503] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 361.713239][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 361.720726][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 361.738549][ T8505] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 361.770589][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.779233][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.788823][ T8711] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.795957][ T8711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.806122][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.815763][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.824939][ T8711] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.831991][ T8711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.840670][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 361.849509][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.858119][ T8711] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.865300][ T8711] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.873808][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 361.886070][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 361.887797][ T8923] Bluetooth: hci3: command 0x040f tx timeout [ 361.894538][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 361.955122][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 361.973139][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.981651][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.988834][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.026461][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 362.106884][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 362.118118][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 362.127869][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 362.141103][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 362.150371][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 362.160004][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 362.169360][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 362.178473][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 362.187615][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 362.195362][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 362.209520][ T8662] 8021q: adding VLAN 0 to HW filter on device bond0 [ 362.216667][ T9816] Bluetooth: hci4: command 0x040f tx timeout [ 362.241166][ T8507] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 362.295905][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 362.304766][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 362.313211][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.321746][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.330705][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 362.340126][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 362.349193][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 362.358222][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 362.367185][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 362.376449][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 362.388229][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.397018][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.405643][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 362.414417][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.428430][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 362.446265][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.456248][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.471005][ T8662] 8021q: adding VLAN 0 to HW filter on device team0 [ 362.533683][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.541957][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.551209][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 362.561351][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.570263][ T8711] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.577393][ T8711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.587482][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 362.613665][ T8509] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 362.633018][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 362.645270][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 362.656132][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 362.665044][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 362.673832][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 362.682818][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 362.691347][ T2998] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.698468][ T2998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.713506][ T8505] device veth0_vlan entered promiscuous mode [ 362.755791][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 362.764774][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 362.772162][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 362.781656][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 362.790893][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 362.799808][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 362.808931][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 362.820540][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 362.828772][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 362.845938][ T8505] device veth1_vlan entered promiscuous mode [ 362.885640][ T8503] device veth0_vlan entered promiscuous mode [ 362.906638][ T8511] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 362.921379][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 362.932100][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 362.959617][ T8503] device veth1_vlan entered promiscuous mode [ 362.987468][ T8509] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 362.999193][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 363.003087][ T8593] Bluetooth: hci5: command 0x040f tx timeout [ 363.016477][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 363.026546][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 363.035429][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 363.044991][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 363.054130][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 363.063166][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.130726][ T8507] device veth0_vlan entered promiscuous mode [ 363.147090][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 363.156182][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 363.166346][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.174736][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 363.184147][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 363.193120][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 363.201394][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 363.210283][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 363.219244][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 363.229911][ T8505] device veth0_macvtap entered promiscuous mode [ 363.242865][ T8593] Bluetooth: hci0: command 0x0419 tx timeout [ 363.252995][ T8662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 363.273136][ T8507] device veth1_vlan entered promiscuous mode [ 363.308291][ T8505] device veth1_macvtap entered promiscuous mode [ 363.326632][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 363.341744][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 363.352601][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 363.360865][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 363.370426][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 363.415051][ T8503] device veth0_macvtap entered promiscuous mode [ 363.425864][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 363.435008][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 363.444888][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 363.455137][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 363.481760][ T8505] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 363.490114][ T9816] Bluetooth: hci1: command 0x0419 tx timeout [ 363.501993][ T8503] device veth1_macvtap entered promiscuous mode [ 363.517118][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 363.525380][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 363.534609][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 363.568093][ T8505] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 363.586285][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 363.594296][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 363.601740][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 363.615787][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 363.626156][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 363.635133][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 363.679921][ T8503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 363.690826][ T8503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 363.703492][ T8503] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 363.715287][ T8662] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 363.722930][ T3189] Bluetooth: hci2: command 0x0419 tx timeout [ 363.757188][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 363.774546][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 363.784036][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 363.795140][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 363.809216][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 363.818184][ T8780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.829267][ T8505] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 363.846316][ T8505] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 363.855718][ T8505] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 363.868593][ T8505] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 363.887282][ T8507] device veth0_macvtap entered promiscuous mode [ 363.898987][ T8511] device veth0_vlan entered promiscuous mode [ 363.909470][ T8503] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 363.921985][ T8503] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 363.934468][ T8503] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 363.945030][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 363.961078][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 363.962763][ T3189] Bluetooth: hci3: command 0x0419 tx timeout [ 363.978351][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.987029][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 363.995955][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 364.004994][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 364.014004][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 364.026530][ T8509] device veth0_vlan entered promiscuous mode [ 364.036917][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 364.046916][ T2998] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 364.060188][ T8507] device veth1_macvtap entered promiscuous mode [ 364.076760][ T8503] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 364.086640][ T8503] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 364.095897][ T8503] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 364.104822][ T8503] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 364.218655][ T8509] device veth1_vlan entered promiscuous mode [ 364.234744][ T8507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 364.245377][ T8507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 364.256630][ T8507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 364.267994][ T8507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 364.279704][ T8507] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 364.282724][ T3189] Bluetooth: hci4: command 0x0419 tx timeout [ 364.291153][ T8511] device veth1_vlan entered promiscuous mode [ 364.328209][ T9814] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 364.337774][ T9814] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 364.347342][ T9814] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 364.357162][ T9814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 364.403914][ T8507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 364.423533][ T8507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 364.436193][ T8507] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 364.457911][ T8507] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 364.469648][ T8507] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 364.479653][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 364.489266][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 364.498293][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 364.507203][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 364.555116][ T8507] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 364.572651][ T8507] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 364.581367][ T8507] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 364.591099][ T8507] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 364.732962][ T8648] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 364.741012][ T8648] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 364.789508][ T8509] device veth0_macvtap entered promiscuous mode [ 364.846983][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 364.864391][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 364.883453][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 364.926960][ T8819] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 364.927470][ T8509] device veth1_macvtap entered promiscuous mode [ 364.944045][ T8819] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 364.981127][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 364.993147][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 365.006135][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 365.033451][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 365.042167][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 365.060433][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 365.076964][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 365.092646][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 365.101606][ T8511] device veth0_macvtap entered promiscuous mode [ 365.108425][ T3189] Bluetooth: hci5: command 0x0419 tx timeout [ 365.176338][ T8662] device veth0_vlan entered promiscuous mode [ 365.196289][ T8511] device veth1_macvtap entered promiscuous mode [ 365.246529][ T499] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 365.261920][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 365.274461][ T499] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 365.280859][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.298613][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 365.321563][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.333128][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 365.344420][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.357488][ T8511] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 365.367320][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 365.379437][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.389378][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 365.399900][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.410595][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 365.426519][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.436415][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 365.446984][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.458690][ T8509] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 365.488381][ T8662] device veth1_vlan entered promiscuous mode [ 365.518825][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 365.528332][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 365.538322][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 365.547041][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 365.555628][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 365.565010][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 365.574704][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 365.583934][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 365.605597][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 365.617940][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.630184][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 365.640679][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.650872][ T8511] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 365.661399][ T8511] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.674841][ T8511] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 365.703927][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 365.713592][ T231] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 365.725459][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 365.725971][ T231] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 05:42:27 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xc000, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1) [ 365.762976][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 365.781360][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 365.806819][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 365.832381][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.852602][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 365.889670][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.908554][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 365.920738][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 365.949769][ T8509] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 365.961813][ T8509] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 05:42:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000400)={&(0x7f0000000340), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, 0x1, 0x3, 0x201, 0x0, 0x0, {}, [@NFQA_MARK={0x8}]}, 0x1c}}, 0x0) [ 366.010042][ T8509] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 366.041508][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 366.054435][ T3189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 366.070614][ T8511] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.094186][ T8511] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.112659][ T8511] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.121373][ T8511] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.167255][ T499] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 366.179275][ T8509] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.197253][ T499] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 366.208079][ T8509] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 05:42:27 executing program 0: futimesat(0xffffffffffffffff, 0x0, &(0x7f0000003240)={{}, {0x0, 0x2710}}) [ 366.226953][ T8509] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.244899][ T8509] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.284178][ T9814] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 05:42:27 executing program 1: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$clear(0x7, r0) 05:42:27 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000340)=""/100) [ 366.429273][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 366.440396][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 366.468951][ T8662] device veth0_macvtap entered promiscuous mode [ 366.523222][ T8648] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 366.526667][ T8662] device veth1_macvtap entered promiscuous mode [ 366.545321][ T8648] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 05:42:28 executing program 1: syz_emit_ethernet(0xe, &(0x7f0000000000)={@multicast, @link_local, @void, {@generic={0x88ca}}}, 0x0) [ 366.621518][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 366.637430][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 05:42:28 executing program 0: add_key$fscrypt_v1(&(0x7f00000000c0)='logon\x00', &(0x7f0000000080)={'fscrypt:', @auto=[0x0, 0x0, 0x37]}, &(0x7f00000001c0)={0x0, "c73945b31ad69f637cec99eeddb1d1dea3ad9d87bb403b3232493d9cd404798e20f333317a9a29a27d25c44fab9ce249fb99633735d2451b045aace390634b44"}, 0x48, 0xfffffffffffffffb) [ 366.686704][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:42:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, 0x0, &(0x7f0000000000)) [ 366.853840][ T8662] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 366.867092][ T8662] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.878676][ T8662] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 366.891905][ T8662] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 05:42:28 executing program 2: openat$pidfd(0xffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x1a1101, 0x0) [ 366.912026][ T8662] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 366.942299][ T8662] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.963429][ T8662] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 366.993377][ T8662] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 367.016973][ T8662] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 367.028497][ T8662] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 367.057210][ T8662] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 367.085382][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 367.096727][ T8923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 367.130245][ T8739] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 367.154287][ T8739] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 367.169504][ T8662] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 367.222421][ T8662] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 367.244042][ T8662] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 367.272044][ T8662] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 367.282413][ T8662] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 367.293317][ T8662] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 367.303580][ T8662] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 367.314530][ T8662] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 367.327993][ T8662] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 367.338823][ T8662] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 367.351972][ T8662] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 367.389416][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 367.404930][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 367.425142][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 367.455900][ T8662] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 367.479768][ T8662] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 367.503493][ T8662] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 367.515243][ T8662] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 367.543373][ T231] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 367.551401][ T231] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 367.625065][ T9909] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 367.625334][ T8711] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 367.665001][ T9909] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 367.714016][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 367.721693][ T9909] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 367.757193][ T9909] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 367.817364][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 367.884885][ T8819] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 367.900484][ T8819] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 367.999796][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 368.039121][ T231] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 05:42:29 executing program 3: symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') 05:42:29 executing program 0: syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x801) [ 368.069323][ T231] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 368.104581][ T8593] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 05:42:29 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000000)=""/17) 05:42:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x14, 0x3, 0x1, 0x301}, 0x14}}, 0x0) 05:42:29 executing program 1: timer_create(0x7, &(0x7f00000001c0)={0x0, 0x0, 0x1}, &(0x7f00000002c0)) timer_gettime(0x0, &(0x7f0000000180)) 05:42:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000100)={'veth0_vlan\x00', @ifru_mtu}) 05:42:29 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x3, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x68a2}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @fccp}]}, 0x28}}, 0x0) 05:42:29 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x3, 0x8, 0x5, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x24}}, 0x0) 05:42:30 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 05:42:30 executing program 0: perf_event_open$cgroup(&(0x7f00000011c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9a01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x84c9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:42:30 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, 0x0) 05:42:30 executing program 1: pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000015, 0xffffffffffffffff) 05:42:30 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000540)=[0x0, 0xffffffff]) 05:42:30 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000001c0)='./file0\x00', 0x4000142) openat$dir(0xffffff9c, &(0x7f0000000080)='./file0\x00', 0x201, 0x0) openat$dir(0xffffff9c, &(0x7f0000000140)='./file0\x00', 0x240, 0x0) 05:42:30 executing program 0: perf_event_open(&(0x7f0000002480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:42:30 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0xc0000211) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0xc0000211) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0xc0000211) 05:42:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000280)=""/58) 05:42:30 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 05:42:30 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, 0x0) [ 368.900909][ T35] audit: type=1804 audit(1608529350.344:9): pid=10017 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir811112006/syzkaller.o3exPJ/4/file0" dev="sda1" ino=15770 res=1 errno=0 05:42:30 executing program 3: r0 = socket(0x26, 0x5, 0x0) bind(r0, &(0x7f0000000000)=@ax25={{0x3, @null}, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x80) [ 369.007486][ T35] audit: type=1804 audit(1608529350.424:10): pid=10018 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir811112006/syzkaller.o3exPJ/4/file0" dev="sda1" ino=15770 res=1 errno=0 05:42:30 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x1000, 0x0) openat$dir(0xffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x102, 0x0) 05:42:30 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000140)=""/148) 05:42:30 executing program 5: syz_emit_ethernet(0x3e, &(0x7f00000002c0)={@multicast, @link_local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @broadcast, @broadcast}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @private}}}}}}, 0x0) 05:42:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001400)={&(0x7f0000001300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x4}]}}, &(0x7f0000001340)=""/170, 0x26, 0xaa, 0x2}, 0x20) 05:42:30 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000007c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000780)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000800)={0xb, 0x10, 0xfa00, {0x0, r1}}, 0x18) 05:42:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x9, &(0x7f0000000100)=0x2, 0x4) sendmsg$inet_sctp(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x14}, 0x0) 05:42:30 executing program 4: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) listen(r0, 0x4) write$binfmt_script(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="84e00c00044df32ca4b673c25fb2f4808051ad040000000000000046b5ddff2474a526b6948df3", @ANYRES64, @ANYBLOB="2ad64e75dc862951c4dd7470be9bd8005bbc69a3d5a377db24a22c4cf63d40b5ce62e441dd1ebf03d4ef13f853cb2c86118852bfbe3e52dbed9b004da81e33b71113f5a3a517d9fb1bd8f86a658f334995cde9ec6f38d2204ad34799a76fb973de02a4671e43186fcaae4eb8f0db8c2c55162c08574fdb9d6d632096a31299d0", @ANYRESHEX], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040), 0xb) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000000c0), 0x4) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) 05:42:30 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000d00)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0}}, 0x20) 05:42:30 executing program 5: syz_usb_connect$printer(0x1, 0x2d, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x0, "", {{{0x9, 0x5, 0x1, 0x2, 0x10}}}}}]}}]}}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x3, [{0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}]}) 05:42:30 executing program 0: syz_emit_ethernet(0x182, &(0x7f0000000380)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd602e15d701"], 0x0) 05:42:30 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xa4) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 05:42:31 executing program 3: r0 = add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:', @desc3='e8dab99234bb312e'}, &(0x7f0000000080)={0x0, "7621e0271574fd094c0a6b93bf98bcaf06e541bd1140e781039c3c75864f6c7a19399d976070be5b9f51486e1373725cf67930da4000b59ef58a73de2161d927"}, 0x48, 0xfffffffffffffffb) keyctl$describe(0x6, r0, 0x0, 0x0) 05:42:31 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@flushsa={0x20, 0x1c, 0x1, 0x0, 0x0, {}, [@lastused={0xc}]}, 0x20}}, 0x0) 05:42:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r1, 0x401, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_KEY={0x14, 0x50, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_SEQ={0x4}, @NL80211_KEY_DEFAULT={0x4}]}]}, 0x30}}, 0x0) [ 369.681961][ T35] audit: type=1804 audit(1608529351.124:11): pid=10065 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir725547433/syzkaller.5mi0Kp/5/bus" dev="sda1" ino=15785 res=1 errno=0 05:42:31 executing program 4: syz_open_dev$binderN(&(0x7f0000000d00)='/dev/binder#\x00', 0x0, 0x0) syz_open_dev$binderN(&(0x7f0000001380)='/dev/binder#\x00', 0x0, 0x0) [ 369.727102][T10065] Module has invalid ELF header [ 369.748837][T10067] Module has invalid ELF header 05:42:31 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xa4) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 369.822987][ T35] audit: type=1400 audit(1608529351.174:12): avc: denied { module_load } for pid=10057 comm="syz-executor.2" path="/root/syzkaller-testdir725547433/syzkaller.5mi0Kp/5/bus" dev="sda1" ino=15785 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=system permissive=1 [ 369.853462][ T8593] usb 6-1: new low-speed USB device number 2 using dummy_hcd 05:42:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x841}, 0x40) [ 369.866594][T10072] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 05:42:31 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:42:31 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, 0x0) 05:42:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000200)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, r1, 0x401, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY_CIPHER={0x8}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x4}]}, 0x3c}}, 0x0) [ 370.026344][T10078] Module has invalid ELF header [ 370.041057][ T35] audit: type=1804 audit(1608529351.184:13): pid=10065 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir725547433/syzkaller.5mi0Kp/5/bus" dev="sda1" ino=15785 res=1 errno=0 [ 370.184700][ T35] audit: type=1804 audit(1608529351.464:14): pid=10078 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir725547433/syzkaller.5mi0Kp/6/bus" dev="sda1" ino=15772 res=1 errno=0 [ 370.232441][ T8593] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 370.513034][ T8593] usb 6-1: string descriptor 0 read error: -22 [ 370.519645][ T8593] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 370.531329][ T8593] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 370.564551][T10055] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 370.790936][ T8593] usb 6-1: USB disconnect, device number 2 [ 371.572350][ T8711] usb 6-1: new low-speed USB device number 3 using dummy_hcd [ 371.965319][ T8711] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 372.222598][ T8711] usb 6-1: string descriptor 0 read error: -22 [ 372.228843][ T8711] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 372.239087][ T8711] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 372.283991][T10055] raw-gadget gadget: fail, usb_ep_enable returned -22 05:42:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000004c0)) 05:42:34 executing program 3: openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xf1) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000003c0)=@nfc_llcp, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000940)='\xfc|\xf5\x13\xd4\xf6P\xc5DF\xc1Z\x87\xf0\x9b1\xaa\x8d\x7f\xfb;\xca\x8b\xc5s\xda\xde\xf1~\x9e\xe0$\x8d\x95\x80=l\x1d\x1db\xfb8MI\xd1\x140xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchdir(r0) r3 = memfd_create(&(0x7f0000000140)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0Y\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xfa\xbf\xf3x\x86\xc2\xa3\t\x008\xb6XA]\xdc\xad\xbb!1\x85\x96P\x1b\x92\x01\xe6\xae\xb1\xecB)\xe5\xaa7\xfe\xdd,R\x96X\x1ae', 0x0) write(r3, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0xd011, r3, 0x0) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0xc40001e1) creat(&(0x7f0000000040)='./file0\x00', 0x0) 05:42:34 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000440)={0x7fffffff, 0x0, {0xfffffffffffffffe, 0x0, 0x7ff, 0x2, 0x1000}, 0x3ff}) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x803, 0x46061, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80, 0x0, 0x4000000000, 0xfffffffd}, 0x0, 0xd, r0, 0x9) r1 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = dup(0xffffffffffffffff) getpeername$packet(r2, 0x0, &(0x7f0000000040)) sendmsg$TIPC_NL_LINK_SET(r2, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') sendfile(r1, r3, 0x0, 0xedc0) 05:42:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r2, &(0x7f0000004540)={0x0, 0x0, &(0x7f0000004500)={&(0x7f0000000000)={0x14, 0x3, 0x1, 0x101, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 05:42:34 executing program 5: r0 = creat(&(0x7f0000002440)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x40000002}) fallocate(r0, 0x8, 0x0, 0x8000) 05:42:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) madvise(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x11) 05:42:34 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xa4) finit_module(r1, 0x0, 0x0) 05:42:35 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/diskstats\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchdir(r0) r3 = memfd_create(&(0x7f0000000140)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0Y\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xfa\xbf\xf3x\x86\xc2\xa3\t\x008\xb6XA]\xdc\xad\xbb!1\x85\x96P\x1b\x92\x01\xe6\xae\xb1\xecB)\xe5\xaa7\xfe\xdd,R\x96X\x1ae', 0x0) write(r3, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0xd011, r3, 0x0) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0xc40001e1) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 373.701422][ T35] audit: type=1804 audit(1608529355.144:17): pid=10191 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir523315623/syzkaller.HISHAV/11/bus" dev="sda1" ino=15814 res=1 errno=0 05:42:35 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x14b942, 0x0) 05:42:35 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xa4) finit_module(r1, 0x0, 0x0) 05:42:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003c00)=[{{0x0, 0x0, &(0x7f00000015c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x0, 0x4}, 0x14}}, 0x0) [ 373.819183][ T35] audit: type=1804 audit(1608529355.194:18): pid=10192 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir725547433/syzkaller.5mi0Kp/9/bus" dev="sda1" ino=15815 res=1 errno=0 [ 373.989616][ T35] audit: type=1804 audit(1608529355.434:19): pid=10202 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir725547433/syzkaller.5mi0Kp/10/bus" dev="sda1" ino=15810 res=1 errno=0 05:42:35 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed", 0x81, 0xe000}], 0x0, &(0x7f0000000080)) 05:42:35 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/diskstats\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchdir(r0) r3 = memfd_create(&(0x7f0000000140)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0Y\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xfa\xbf\xf3x\x86\xc2\xa3\t\x008\xb6XA]\xdc\xad\xbb!1\x85\x96P\x1b\x92\x01\xe6\xae\xb1\xecB)\xe5\xaa7\xfe\xdd,R\x96X\x1ae', 0x0) write(r3, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0xd011, r3, 0x0) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0xc40001e1) creat(&(0x7f0000000040)='./file0\x00', 0x0) 05:42:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x10) syz_emit_ethernet(0x107, &(0x7f0000000480)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x4e22, 0x9c, 0x0, @opaque="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"}}}}}, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f00000047c0)=[{&(0x7f0000000200)=""/70, 0x46}, {&(0x7f00000000c0)=""/69, 0x45}, {&(0x7f00000001c0)=""/50, 0x32}], 0x3}}], 0x3, 0x0, 0x0) 05:42:35 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xa4) finit_module(r1, 0x0, 0x0) [ 374.308425][ T35] audit: type=1804 audit(1608529355.754:20): pid=10214 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir725547433/syzkaller.5mi0Kp/11/bus" dev="sda1" ino=15788 res=1 errno=0 [ 374.391445][T10218] loop3: detected capacity change from 224 to 0 05:42:35 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 05:42:35 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/diskstats\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchdir(r0) r3 = memfd_create(&(0x7f0000000140)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0Y\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xfa\xbf\xf3x\x86\xc2\xa3\t\x008\xb6XA]\xdc\xad\xbb!1\x85\x96P\x1b\x92\x01\xe6\xae\xb1\xecB)\xe5\xaa7\xfe\xdd,R\x96X\x1ae', 0x0) write(r3, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0xd011, r3, 0x0) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0xc40001e1) creat(&(0x7f0000000040)='./file0\x00', 0x0) 05:42:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0xe, 0x2812, r0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) 05:42:36 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=@getqdisc={0x24, 0x26, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0x0, 0xe}}}, 0x24}}, 0x0) [ 374.571909][ T35] audit: type=1804 audit(1608529356.014:21): pid=10228 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir725547433/syzkaller.5mi0Kp/12/bus" dev="sda1" ino=15816 res=1 errno=0 05:42:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 05:42:36 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000800)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 05:42:36 executing program 5: syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x4, 0x0) 05:42:36 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 05:42:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_CHANNEL(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, 0x0, 0x0, 0x70bd2b, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x24}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xced1}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r3, 0x7, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r4}, @val={0xc}}}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'wlan1\x00'}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xa}]}, 0x44}}, 0x0) 05:42:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000400)=""/162, 0x29, 0xa2, 0x1}, 0xf6) [ 374.917313][ T35] audit: type=1804 audit(1608529356.364:22): pid=10245 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir725547433/syzkaller.5mi0Kp/13/bus" dev="sda1" ino=15810 res=1 errno=0 05:42:36 executing program 1: r0 = epoll_create1(0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000f80)='/dev/vcsa#\x00', 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)={0x20002004}) 05:42:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}], 0x0, &(0x7f0000000080)) [ 375.022079][T10248] debugfs: Directory 'netdev:wlan1' with parent 'phy11' already present! 05:42:36 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 05:42:36 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000200)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000080)="c0694f4eb3394e48b7db5636044aebf8f3038f56b410ff634675ab5cfa80ede417a2c02563e831324314034d0cf01a6024fe6bb613a32ccd7bf81cdfb39db4400fbe6b8ecac493ed7b717794242f16e88f1c1935905fce0358bd0f1520dd7f2103cd44ed9b9cf8e8058d98da581c81e88cb074fe2680e73389b8fba683131309799e89", 0x83}, {&(0x7f0000000140)="04ca3fa1a78a643a78f96ebf92b7ced06fa557", 0x13}, {&(0x7f00000003c0)="9141e52d74064f4791700dcf883fcca368130a516ce18c78e81f9a69b9c3667fb539768e0dd261ee3141499201c63d2bd7dfcd0cc868364438644ce64e185ba6f4e1d86ff2b7d9b83de6d82d6bbde7464d37d522982cb3df4e43167bdac5e04e8b965c4fcc53997cf0075ae7f3a87195526ae7dcc4ec78f5aa95df013639d83be7639e6353ec4bef2a0f2ef32a0bfc2c19e21f6214c88037be4215407c1bdd6f133613f447f90d2bd438f72c74f463d646d281fd609ba484ab432d9bfca538f314e4287c68bbf037b42b991f689d8adffe3d29aae453afa5bf57d312987f165549b4b1c21713c711b0fbcb70ff0db04ed92ed41d9bb4d4a37e8528be895063584e2b8c64a295d08d0c561b99e75e39252c4995cf020422bd6e9873801e5a8623485feeba6d5905d121b9f9f623a3c44b0e0e5ae007b51f77ad227ac74f12524dfcd0719e8982aef409d59256a9f7c84b1a384bf8fe601d45f985353a1d15a354febfeb795df08db36815c9dd80455f599f26c06db27f4a0082ebe1ea5b3b974268ed3f7c8f052f1a8d4ea6c2f0467cbf225b75786d8df43d8c9350366536f7302411542ca1ec55e980d3bb98cae7c3f5bb981d38763837265c312cdd6c4ce9898ab5564267afe957befa8ce57753db3d3effdc1c7ff811a448b38edf9514fa8460ec21414ca578138ef08917279bcc23466314d6c083c9dab5dcc846691bed64ec8e6fe4db07429e681273a32f00e4888865131b81bccb60ecda597456f6745a02ac6b989d47f2bd5a6781790db735df3fca477b6ae2572c5208ec83ae1f4a475e2118d47f9112a68ab1ecba68f79cb78874c9df5e1b3a7dc5797aea2d40cc598dff65c0ff4da8afb50755bd7aeab80b680811585bea6975d2027e82a1e6c4159315b5cd3f146e7c42cb7de3b199666e2135f907e5c54a677ed935f5da4bed71a0fbcb682f4745312465c1bbf44d7d4568f934ed5855cba32c974e955dab364f8c17e7e98b0fb5282eb6191f86dee13cf471921a2ee0a494ec9dfbc21e508ec3a0dc633009cbe73bb476a7b9ea91401366804f360acddc3655a3310633040bdf5959585cd0ceae9d13ac093d3accf233366d8bcf7f808beee295ae704868f4f96cb1e17cd771f37f8c85fac212e1d672982c564feb4dedb1152d791af8240c7e93f18c5e8e31f408271e79ec905f6d2376333fb4885334912cb26f760bcc4febe214d96c742fa846d3e01361496766f8a322cf68c4220b174829877418000d016b57c37eb261bb8a2eccf9a2266531d323edf5bc835e8b1b9ebd92ccf504e7633e92d4828993ba533c112fdfeca39708aaecf4c9c84d8c3fb659a0dfd197a17b05537392dee60933b9f574cedbbd05d5764c859969d610371310a1745b1d20492933ee21205dfa32e29360ec099b0fb11e1654d1befd0874cf04ad0defe2c26525bbacf0225fb65d0a113cfcedf6fac6777791ce9507f50bcf3f8a768924567ce98db0f37e69d749e86e7a25c324a632f949cd6174e8163c331a6590d60c66375eba6ea3f464607ba29e44a1b6c44752e1a7c74ce1580ca9e4f064e2077ec459b1e6181bbccbf29da39f569f76f054d851f5305a283f8f95212d556a57bdc269a40eba6cb0b6e0657ec9a2952b4ddf4dcbb2d22d60098d0e931b4fa8c170ad90f43cc1744d960516cd8b77fbc392bb6fd70872339ec4107fcdb6fc5c1fb9fd24070facf31771fd41460b171ac98aa30a8416accf7c475bdb36387815b4a0d298ea2b1ac5add852520391f3530ec18b427f233ad3e76ac4790b17883b38f60db0ace97e8418042e2cda90c0a15a6d282a5f59a80546ee03e3f458a699a8234686de5f611dde4a3023c2e85f10546a604aee7ba7ded423fdc4e7e331997651e7460e5c7ad72c5c23cbb3dad34f221720cdb7adf17870d09bb61fd4a577a6c2a4a1ac3904981b90f61f55ee2d9faffab1fac73db5979b47b9d43251109f086ae9c189337107cc1cbf1b1a1cef674b2e2f5a95fb5da6b99e68f593f8e49aba37cc733f5811615f5412b52c0c07e0082e9424c334f149c7822831c83c0183c7137e9d84b174e762470ae460e01845c485b1a046d77871152288456bce7f301bd68b0e6147955e3038d289a730da9f7be673f685dfe89e2339f3f110965ee957f524c9d553a6c467a1be018b3af675decfffb79da1b247d1a443e5867a6f9139fbe82d7ed3eb86eb4f22bdd968268256adf9bcd364f8cbf3ee824433635dba2d75b48a7ddc9dc83bcf55e05747d03a348603065c622d38d435d0f3cf60e8c332e47c4588639e13d8272da5c75bd1936ea0881b183e0899a0109cc55fe064b6c405779b88773134017291a143ad77d3c3ae9ce30b5794e6f0e258f23680acc674b2658d14049e510a1a1a0b94d8999a5f028aae1a07a4f3b96bfef6a591ef0f5ecc88460bdb4fad14ba1fcbd11fdc78731ceccf93b40b9d26f2dc2c11b54b6f0286ee56ae01432928f588060f0d63ab7efa2457c03374f668be4666a5f7d99b102976683246533634294fc17d8891227c1264fcd24887458878218cb88797162edbf306c74994c9b8cee68af19e95381bdc066d442aa267ce462b58f5517edb222946e3e8ed29a6a3464185d527b66b7cb9b833aeb8b08533004860f8e08208314136b0efdbe6463c0362aa838f0242315a0fdc9f3168e501dc0a22fd6ef579b7b527677a795ce6e4d0335eaebef1b821244f65172f560557fe3778857547ed25abf5ab40852ec14314ae0bcd0acfcedd957f1c3b057d0f22a5d03ae0394f3f5c03a337e81f9fbf84af8a54e4d2319e0a0fc74f83c073eaf4ce8f521de1bee4e35dde750305bcd7b9e50ef748011d969e31e084520ca7fdc790ea1bfff3a81de34a6d63afd295d44b7a737372add7e1caa44e3a9c23901bb85c5a18fd7e0b5936fab0e8ad462fe98c935c816dd0cd5b9ce07c3ade3fbaaaec4114515870ceb00fa7eb67b4d988d39fa1d0d389d0f1fac1951fcbc2d18c4ddf9738511c34110e60a1838e87547c1726f201d49bef5561d730f9d351a222b8ea80e9e825f3213b3e1a888daf8ab854352399e38a24f04c27b071fbcb734450d5661467c20b791f2ed5afcd42b4f891d4addf8fbf55af7c7328b1510e6ebe03f614077d6cb5ce02b35ada0880da195536504a9796b1ccbee0e51fbb75f0b83fcf2075e9344988f5a381ab4fc7b4f4745d856fd20095b482928040e9cd98ebadba12d84477f4c7914903bff589f05eb117e19c7ef3988e071f6df8886b54c54e3f4971180461bd36ad52ea5916ebd0a5d5d8282b37d9f67e7622ca449db9e456dc68bf6e37b840cfe28b372a3b2168e29f7548235ebc1c4cab34ffac9b29cff191e60776ca626b012438fd51121607c0762e58b5d9ad568d21c59d55d60e990590487eba5b3205843ccb37c01de66cda87d00ada87ba2c3c184487ccb851f2879a607c8f3509ff12756e935ae9f41ae79716ecea8f7977f6d8e6095d85f3392b921c0ed76f425de1beaad9a12cf5b4fa0759bf8b0d6ff7ff5cc3367a3ae8bf1b32417248058b2b8373074d9a35d1d79d10037f23a82601aa1af3e7c27f1dba4c7395fdf4484783da2e872b816efc592fc1681ea54f47c3a527c820fbfb06ff8057e71b7cb843d7eb0ac3a5e0a80a1449fec99d56eb3600c74675a26e1a89d6c573642b460df6bed9db5598cd495a919d3bea5f076f554fde01c20f8936e31f30738a91471606d9ff971898af7e30fd1b6b045a7923a24335a572739a75a332c01dd0465534e4078d87d2ae4b9b05f72598edc9eb8a288ea165b90615ffd790581b9b21634b556a3be404ab3ca6402492286b34065f2704c1a8953a562b7542", 0xab3}], 0x3}, 0x0) 05:42:36 executing program 4: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x1ff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='oom_adj\x00') write$P9_RREAD(r0, &(0x7f00000001c0)={0x30, 0x75, 0x0, {0x25, "10c2ef2673b76cb5a5ec106978957ad821c1208f25a78fa66e895506fe2bcdfabb92b8dba5"}}, 0x30) [ 375.217059][ T35] audit: type=1400 audit(1608529356.664:23): avc: denied { block_suspend } for pid=10253 comm="syz-executor.1" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 05:42:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000140)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0Y\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xfa\xbf\xf3x\x86\xc2\xa3\t\x008\xb6XA]\xdc\xad\xbb!1\x85\x96P\x1b\x92\x01\xe6\xae\xb1\xecB)\xe5\xaa7\xfe\xdd,R\x96X\x1ae', 0x0) write(r2, &(0x7f00000000c0)='i', 0x1) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0xd011, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_int(r3, 0x1, 0x9, 0x0, &(0x7f0000000240)) [ 375.288539][T10258] loop5: detected capacity change from 224 to 0 05:42:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r0, 0x3dba221f1f800767, 0x0, 0x0, {{0x11}, {@val={0x8}, @val={0x8, 0x3, r2}, @void}}}, 0x24}}, 0x0) 05:42:36 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xa4) dup3(0xffffffffffffffff, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) [ 375.378380][T10279] syz-executor.4 (10279): /proc/10279/oom_adj is deprecated, please use /proc/10279/oom_score_adj instead. [ 375.378420][ T35] audit: type=1804 audit(1608529356.714:24): pid=10259 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir725547433/syzkaller.5mi0Kp/14/bus" dev="sda1" ino=15807 res=1 errno=0 05:42:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000000)=[{r0, 0x224}], 0x1, 0x0, 0x0, 0x0) 05:42:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=@getqdisc={0x24, 0x26, 0x1}, 0x24}}, 0x0) 05:42:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000140)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0Y\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xfa\xbf\xf3x\x86\xc2\xa3\t\x008\xb6XA]\xdc\xad\xbb!1\x85\x96P\x1b\x92\x01\xe6\xae\xb1\xecB)\xe5\xaa7\xfe\xdd,R\x96X\x1ae', 0x0) write(r2, &(0x7f00000000c0)='i', 0x1) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0xd011, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_int(r3, 0x1, 0x9, 0x0, &(0x7f0000000240)) 05:42:37 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xa4) dup3(0xffffffffffffffff, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) 05:42:37 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0/file0\x00'}, 0x6e) 05:42:37 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="0213000008"], 0x40}}, 0x0) 05:42:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01eb290000000000000002"], 0x14}}, 0x0) 05:42:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000140)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0Y\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xfa\xbf\xf3x\x86\xc2\xa3\t\x008\xb6XA]\xdc\xad\xbb!1\x85\x96P\x1b\x92\x01\xe6\xae\xb1\xecB)\xe5\xaa7\xfe\xdd,R\x96X\x1ae', 0x0) write(r2, &(0x7f00000000c0)='i', 0x1) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0xd011, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_int(r3, 0x1, 0x9, 0x0, &(0x7f0000000240)) 05:42:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=@RTM_GETMDB={0x18, 0x56, 0x328a1429cbc91dbb}, 0x18}}, 0x0) 05:42:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x0, 0x80, 0x1, 0x20}, {0x1, 0x0, 0x7}]}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f00000001c0)=""/150}, 0x20) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000080), 0x4) r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xfa0f, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) 05:42:37 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xa4) dup3(0xffffffffffffffff, r0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) 05:42:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000140)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0Y\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xfa\xbf\xf3x\x86\xc2\xa3\t\x008\xb6XA]\xdc\xad\xbb!1\x85\x96P\x1b\x92\x01\xe6\xae\xb1\xecB)\xe5\xaa7\xfe\xdd,R\x96X\x1ae', 0x0) write(r2, &(0x7f00000000c0)='i', 0x1) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, 0xd011, r2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_int(r3, 0x1, 0x9, 0x0, &(0x7f0000000240)) 05:42:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0)='nl80211\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r0, 0x3dba221f1f800767, 0x0, 0x0, {{0x11}, {@val={0x8}, @val={0x8, 0x3, r2}, @void}}}, 0x24}}, 0x0) 05:42:37 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) dup2(r0, r1) 05:42:37 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) io_setup(0x0, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x5c75cec, 0x3, 0x0) 05:42:37 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f00000000c0)={0x3, 0xffffffff}) 05:42:37 executing program 0: r0 = epoll_create1(0x0) r1 = inotify_init() epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)={0x20002000}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)) 05:42:37 executing program 4: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x1ff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='oom_adj\x00') write$P9_RREAD(r0, &(0x7f00000001c0)={0x30, 0x75, 0x0, {0x25, "10c2ef2673b76cb5a5ec106978957ad821c1208f25a78fa66e895506fe2bcdfabb92b8dba5"}}, 0x30) 05:42:37 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xa4) dup3(r0, 0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) 05:42:37 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x3) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000640)={'syztnl1\x00', &(0x7f00000003c0)={'sit0\x00', 0x0, 0x4, 0x5, 0x3, 0x4, 0x2, @private1, @dev={0xfe, 0x80, [], 0x1f}, 0x10, 0x8, 0x703a, 0x8}}) r3 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) splice(r3, &(0x7f00000002c0)=0x9, 0xffffffffffffffff, &(0x7f0000000340)=0x2314, 0x1, 0xb) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000900)={&(0x7f0000000680)={0x1f8, 0x0, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) semctl$SETVAL(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)=0xf72) sendto$inet6(r0, &(0x7f0000000080)="03042a015c0060004003002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000908d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) 05:42:38 executing program 5: r0 = syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a080200", 0x1b, 0xe000}], 0x0, &(0x7f0000000080)) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 376.499066][T10338] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:42:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) 05:42:38 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xa4) dup3(r0, 0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) [ 376.599102][T10354] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:42:38 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) io_setup(0x0, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x5c75cec, 0x3, 0x0) [ 376.718685][T10359] loop5: detected capacity change from 224 to 0 [ 376.740794][T10363] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:42:38 executing program 1: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) io_setup(0x0, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x5c75cec, 0x3, 0x0) 05:42:38 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xa4) dup3(r0, 0xffffffffffffffff, 0x0) finit_module(r0, 0x0, 0x0) 05:42:38 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120000000000000200000000000000000ed00", 0x82, 0xe000}], 0x0, &(0x7f0000000080)) 05:42:38 executing program 4: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x1ff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='oom_adj\x00') write$P9_RREAD(r0, &(0x7f00000001c0)={0x30, 0x75, 0x0, {0x25, "10c2ef2673b76cb5a5ec106978957ad821c1208f25a78fa66e895506fe2bcdfabb92b8dba5"}}, 0x30) [ 377.131672][T10372] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:42:38 executing program 2: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xa4) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 05:42:38 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) io_setup(0x0, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x5c75cec, 0x3, 0x0) [ 377.205591][T10376] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:42:38 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x3) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000640)={'syztnl1\x00', &(0x7f00000003c0)={'sit0\x00', 0x0, 0x4, 0x5, 0x3, 0x4, 0x2, @private1, @dev={0xfe, 0x80, [], 0x1f}, 0x10, 0x8, 0x703a, 0x8}}) r3 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) splice(r3, &(0x7f00000002c0)=0x9, 0xffffffffffffffff, &(0x7f0000000340)=0x2314, 0x1, 0xb) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000900)={&(0x7f0000000680)={0x1f8, 0x0, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) semctl$SETVAL(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)=0xf72) sendto$inet6(r0, &(0x7f0000000080)="03042a015c0060004003002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000908d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) 05:42:38 executing program 1: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) io_setup(0x0, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x5c75cec, 0x3, 0x0) [ 377.353994][T10382] loop5: detected capacity change from 224 to 0 [ 377.424720][T10384] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:42:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x4005904, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="6873717307000000911d675f001000000000000003000c00d000020004", 0x1d}], 0x0, &(0x7f0000010200)) 05:42:39 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) io_setup(0x0, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x5c75cec, 0x3, 0x0) 05:42:39 executing program 2: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xa4) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) [ 377.657785][T10400] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:42:39 executing program 1: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) io_setup(0x0, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x5c75cec, 0x3, 0x0) 05:42:39 executing program 4: clone(0x20002044dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x1ff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='oom_adj\x00') write$P9_RREAD(r0, &(0x7f00000001c0)={0x30, 0x75, 0x0, {0x25, "10c2ef2673b76cb5a5ec106978957ad821c1208f25a78fa66e895506fe2bcdfabb92b8dba5"}}, 0x30) [ 377.981749][T10410] loop5: detected capacity change from 131116 to 0 [ 377.997312][T10408] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:42:39 executing program 2: r0 = creat(0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xa4) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 05:42:39 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x3) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000640)={'syztnl1\x00', &(0x7f00000003c0)={'sit0\x00', 0x0, 0x4, 0x5, 0x3, 0x4, 0x2, @private1, @dev={0xfe, 0x80, [], 0x1f}, 0x10, 0x8, 0x703a, 0x8}}) r3 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) splice(r3, &(0x7f00000002c0)=0x9, 0xffffffffffffffff, &(0x7f0000000340)=0x2314, 0x1, 0xb) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000900)={&(0x7f0000000680)={0x1f8, 0x0, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) semctl$SETVAL(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)=0xf72) sendto$inet6(r0, &(0x7f0000000080)="03042a015c0060004003002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000908d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) [ 378.077860][T10410] unable to read xattr id index table 05:42:39 executing program 5: syz_emit_ethernet(0x86, &(0x7f0000000080)={@multicast, @local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x29, 0x0, @remote, @multicast1}, {0x0, 0x0, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "d0bd3bc5885fd28cae3c3cf8f2dc2f07e418c3289099a44d6a46ebbae4b01b62", "19d2b65e537fe9b4ffc512b37905b877", {"ae4faa1de056db86a23fe74199b82b54", "0921fbcc4d47d2d0c0d2ec160c6299a3"}}}}}}}, 0x0) 05:42:39 executing program 3: r0 = semget$private(0x0, 0x3, 0x0) semtimedop(r0, &(0x7f0000000140)=[{0x0, 0x7}, {0x0, 0xfff7, 0x1800}], 0x2, 0x0) 05:42:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000100)='./file0\x00', 0x4005904, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x1f7}], 0x0, &(0x7f0000010200)) 05:42:40 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xa4) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 05:42:40 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) io_submit(0x0, 0x1, &(0x7f0000000840)=[0x0]) pwritev2(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x5c75cec, 0x3, 0x6) 05:42:40 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xa4) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 05:42:40 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x3) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000640)={'syztnl1\x00', &(0x7f00000003c0)={'sit0\x00', 0x0, 0x4, 0x5, 0x3, 0x4, 0x2, @private1, @dev={0xfe, 0x80, [], 0x1f}, 0x10, 0x8, 0x703a, 0x8}}) r3 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) socket(0x10, 0x3, 0x0) splice(r3, &(0x7f00000002c0)=0x9, 0xffffffffffffffff, &(0x7f0000000340)=0x2314, 0x1, 0xb) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000900)={&(0x7f0000000680)={0x1f8, 0x0, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}]}, @HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) semctl$SETVAL(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)=0xf72) sendto$inet6(r0, &(0x7f0000000080)="03042a015c0060004003002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000908d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) [ 378.636164][T10438] loop1: detected capacity change from 131116 to 0 05:42:40 executing program 5: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="020b000605"], 0x28}}, 0x0) [ 378.751367][T10438] ================================================================== [ 378.759726][T10438] BUG: KASAN: use-after-free in squashfs_get_id+0x1bc/0x1f0 [ 378.767132][T10438] Read of size 8 at addr ffff88801e83b748 by task syz-executor.1/10438 [ 378.775384][T10438] [ 378.777716][T10438] CPU: 1 PID: 10438 Comm: syz-executor.1 Not tainted 5.10.0-syzkaller #0 [ 378.786150][T10438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.796218][T10438] Call Trace: [ 378.799510][T10438] dump_stack+0x107/0x163 [ 378.803880][T10438] ? squashfs_get_id+0x1bc/0x1f0 [ 378.808840][T10438] ? squashfs_get_id+0x1bc/0x1f0 [ 378.813799][T10438] print_address_description.constprop.0.cold+0xae/0x497 [ 378.820854][T10438] ? _raw_spin_lock_irqsave+0x4e/0x50 [ 378.826262][T10438] ? vprintk_func+0x95/0x1e0 [ 378.830934][T10438] ? squashfs_get_id+0x1bc/0x1f0 [ 378.835902][T10438] ? squashfs_get_id+0x1bc/0x1f0 [ 378.840870][T10438] kasan_report.cold+0x1f/0x37 [ 378.845673][T10438] ? squashfs_get_id+0x1bc/0x1f0 [ 378.850641][T10438] squashfs_get_id+0x1bc/0x1f0 [ 378.855443][T10438] ? squashfs_read_fragment_index_table+0xf0/0xf0 [ 378.861882][T10438] ? squashfs_read_metadata+0x2f9/0x460 [ 378.867486][T10438] squashfs_read_inode+0x1b4/0x1b40 [ 378.872716][T10438] ? find_held_lock+0x2d/0x110 [ 378.877547][T10438] ? squashfs_read_id_index_table+0x120/0x120 [ 378.883641][T10438] ? new_inode+0x23b/0x2f0 [ 378.888092][T10438] ? lock_downgrade+0x6d0/0x6d0 [ 378.892961][T10438] ? do_raw_spin_lock+0x120/0x2b0 [ 378.898016][T10438] ? rwlock_bug.part.0+0x90/0x90 [ 378.902995][T10438] ? do_raw_spin_unlock+0x171/0x230 [ 378.908220][T10438] ? _raw_spin_unlock+0x24/0x40 [ 378.913090][T10438] ? new_inode+0x240/0x2f0 [ 378.917533][T10438] squashfs_fill_super+0x1140/0x23b0 [ 378.922883][T10438] get_tree_bdev+0x440/0x760 [ 378.927579][T10438] ? init_once+0x20/0x20 [ 378.931843][T10438] vfs_get_tree+0x89/0x2f0 [ 378.936280][T10438] path_mount+0x13ad/0x20c0 [ 378.940854][T10438] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 378.947191][T10438] ? strncpy_from_user+0x2a0/0x3e0 [ 378.952363][T10438] ? finish_automount+0xb20/0xb20 [ 378.957409][T10438] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 378.963668][T10438] ? getname_flags.part.0+0x1dd/0x4f0 [ 378.969067][T10438] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 378.975341][T10438] __x64_sys_mount+0x27f/0x300 [ 378.980126][T10438] ? copy_mnt_ns+0xae0/0xae0 [ 378.984740][T10438] ? syscall_enter_from_user_mode+0x1d/0x50 [ 378.990661][T10438] do_syscall_64+0x2d/0x70 [ 378.995093][T10438] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 379.001007][T10438] RIP: 0033:0x460b9a [ 379.004923][T10438] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 379.024544][T10438] RSP: 002b:00007f1f90f41a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 379.032977][T10438] RAX: ffffffffffffffda RBX: 00007f1f90f41b10 RCX: 0000000000460b9a [ 379.040962][T10438] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1f90f41ad0 [ 379.048943][T10438] RBP: 00007f1f90f41ad0 R08: 00007f1f90f41b10 R09: 0000000020000000 [ 379.056927][T10438] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 379.064911][T10438] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020010200 [ 379.072916][T10438] [ 379.075245][T10438] Allocated by task 8819: [ 379.079605][T10438] kasan_save_stack+0x1b/0x40 [ 379.084363][T10438] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 379.090006][T10438] kmem_cache_alloc_trace+0x15f/0x300 [ 379.095401][T10438] batadv_mcast_mla_update+0x1673/0x2d10 [ 379.101061][T10438] process_one_work+0x98d/0x1630 [ 379.106091][T10438] worker_thread+0x64c/0x1120 [ 379.110788][T10438] kthread+0x3b1/0x4a0 [ 379.114870][T10438] ret_from_fork+0x1f/0x30 [ 379.119320][T10438] [ 379.121644][T10438] Freed by task 8819: [ 379.125630][T10438] kasan_save_stack+0x1b/0x40 [ 379.130322][T10438] kasan_set_track+0x1c/0x30 [ 379.134923][T10438] kasan_set_free_info+0x1b/0x30 [ 379.139916][T10438] __kasan_slab_free+0xd8/0x120 [ 379.144785][T10438] kfree+0xed/0x280 [ 379.148633][T10438] batadv_mcast_mla_update+0x1227/0x2d10 [ 379.154287][T10438] process_one_work+0x98d/0x1630 [ 379.159237][T10438] worker_thread+0x64c/0x1120 [ 379.163924][T10438] kthread+0x3b1/0x4a0 [ 379.168003][T10438] ret_from_fork+0x1f/0x30 [ 379.172440][T10438] [ 379.174765][T10438] The buggy address belongs to the object at ffff88801e83b740 [ 379.174765][T10438] which belongs to the cache kmalloc-32 of size 32 [ 379.188649][T10438] The buggy address is located 8 bytes inside of [ 379.188649][T10438] 32-byte region [ffff88801e83b740, ffff88801e83b760) [ 379.201690][T10438] The buggy address belongs to the page: [ 379.207339][T10438] page:000000007c5e9779 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88801e83bfc1 pfn:0x1e83b [ 379.218807][T10438] flags: 0xfff00000000200(slab) [ 379.223681][T10438] raw: 00fff00000000200 ffffea00008e7bc8 ffffea0000571008 ffff888010840100 [ 379.232282][T10438] raw: ffff88801e83bfc1 ffff88801e83b000 000000010000003f 0000000000000000 [ 379.240872][T10438] page dumped because: kasan: bad access detected [ 379.247283][T10438] [ 379.249608][T10438] Memory state around the buggy address: [ 379.255243][T10438] ffff88801e83b600: fa fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 379.263314][T10438] ffff88801e83b680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 379.271384][T10438] >ffff88801e83b700: 00 fc fc fc fc fc fc fc fa fb fb fb fc fc fc fc [ 379.279449][T10438] ^ [ 379.285870][T10438] ffff88801e83b780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 379.293941][T10438] ffff88801e83b800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 379.302005][T10438] ================================================================== [ 379.310072][T10438] Disabling lock debugging due to kernel taint 05:42:40 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x24000000, 0x0, 0x0) 05:42:40 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r1 = open(0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xa4) dup3(r1, r0, 0x0) finit_module(r1, 0x0, 0x0) 05:42:40 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x7, 0x1, 0x100}) [ 379.475325][T10458] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:42:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002840)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='lock_acquire\x00', r0}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00001dcf48)={0x2, 0x400000000000003, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote}}]}, 0x78}}, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 379.521302][T10438] Kernel panic - not syncing: panic_on_warn set ... [ 379.527913][T10438] CPU: 0 PID: 10438 Comm: syz-executor.1 Tainted: G B 5.10.0-syzkaller #0 [ 379.537724][T10438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.547811][T10438] Call Trace: [ 379.551093][T10438] dump_stack+0x107/0x163 [ 379.555457][T10438] panic+0x343/0x77f [ 379.559368][T10438] ? __warn_printk+0xf3/0xf3 [ 379.563973][T10438] ? preempt_schedule_common+0x59/0xc0 [ 379.569486][T10438] ? squashfs_get_id+0x1bc/0x1f0 [ 379.574438][T10438] ? preempt_schedule_thunk+0x16/0x18 [ 379.579826][T10438] ? trace_hardirqs_on+0x38/0x1c0 [ 379.584969][T10438] ? trace_hardirqs_on+0x51/0x1c0 [ 379.590011][T10438] ? squashfs_get_id+0x1bc/0x1f0 [ 379.594961][T10438] ? squashfs_get_id+0x1bc/0x1f0 [ 379.599909][T10438] end_report+0x58/0x5e [ 379.604082][T10438] kasan_report.cold+0xd/0x37 [ 379.608769][T10438] ? squashfs_get_id+0x1bc/0x1f0 [ 379.613719][T10438] squashfs_get_id+0x1bc/0x1f0 [ 379.618494][T10438] ? squashfs_read_fragment_index_table+0xf0/0xf0 [ 379.624927][T10438] ? squashfs_read_metadata+0x2f9/0x460 [ 379.630491][T10438] squashfs_read_inode+0x1b4/0x1b40 [ 379.635707][T10438] ? find_held_lock+0x2d/0x110 [ 379.640479][T10438] ? squashfs_read_id_index_table+0x120/0x120 [ 379.646562][T10438] ? new_inode+0x23b/0x2f0 [ 379.650997][T10438] ? lock_downgrade+0x6d0/0x6d0 [ 379.655860][T10438] ? do_raw_spin_lock+0x120/0x2b0 [ 379.660897][T10438] ? rwlock_bug.part.0+0x90/0x90 [ 379.665847][T10438] ? do_raw_spin_unlock+0x171/0x230 [ 379.671060][T10438] ? _raw_spin_unlock+0x24/0x40 [ 379.675925][T10438] ? new_inode+0x240/0x2f0 [ 379.680382][T10438] squashfs_fill_super+0x1140/0x23b0 [ 379.685694][T10438] get_tree_bdev+0x440/0x760 [ 379.690301][T10438] ? init_once+0x20/0x20 [ 379.694554][T10438] vfs_get_tree+0x89/0x2f0 [ 379.698980][T10438] path_mount+0x13ad/0x20c0 [ 379.703501][T10438] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 379.709758][T10438] ? strncpy_from_user+0x2a0/0x3e0 [ 379.714882][T10438] ? finish_automount+0xb20/0xb20 [ 379.719919][T10438] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 379.726174][T10438] ? getname_flags.part.0+0x1dd/0x4f0 [ 379.731560][T10438] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 379.737821][T10438] __x64_sys_mount+0x27f/0x300 [ 379.742597][T10438] ? copy_mnt_ns+0xae0/0xae0 [ 379.747202][T10438] ? syscall_enter_from_user_mode+0x1d/0x50 [ 379.753111][T10438] do_syscall_64+0x2d/0x70 [ 379.757539][T10438] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 379.763450][T10438] RIP: 0033:0x460b9a [ 379.767350][T10438] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 379.786969][T10438] RSP: 002b:00007f1f90f41a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 379.795392][T10438] RAX: ffffffffffffffda RBX: 00007f1f90f41b10 RCX: 0000000000460b9a [ 379.803372][T10438] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f1f90f41ad0 [ 379.811355][T10438] RBP: 00007f1f90f41ad0 R08: 00007f1f90f41b10 R09: 0000000020000000 [ 379.819332][T10438] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 379.827307][T10438] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020010200 [ 379.835686][T10438] Kernel Offset: disabled [ 379.840036][T10438] Rebooting in 86400 seconds..