Warning: Permanently added '10.128.1.56' (ECDSA) to the list of known hosts. 2020/03/14 17:26:23 fuzzer started 2020/03/14 17:26:25 dialing manager at 10.128.0.105:34157 2020/03/14 17:26:25 syscalls: 2955 2020/03/14 17:26:25 code coverage: enabled 2020/03/14 17:26:25 comparison tracing: enabled 2020/03/14 17:26:25 extra coverage: enabled 2020/03/14 17:26:25 setuid sandbox: enabled 2020/03/14 17:26:25 namespace sandbox: enabled 2020/03/14 17:26:25 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/14 17:26:25 fault injection: enabled 2020/03/14 17:26:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/14 17:26:25 net packet injection: enabled 2020/03/14 17:26:25 net device setup: enabled 2020/03/14 17:26:25 concurrency sanitizer: enabled 2020/03/14 17:26:25 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 60.393075][ T7916] KCSAN: could not find function: 'poll_schedule_timeout' [ 63.115131][ T7916] KCSAN: could not find function: '_find_next_bit' 2020/03/14 17:26:32 adding functions to KCSAN blacklist: 'atime_needs_update' 'do_nanosleep' 'ext4_handle_inode_extension' 'tick_sched_do_timer' '__ext4_new_inode' 'do_exit' '__mark_inode_dirty' '__snd_rawmidi_transmit_ack' 'pipe_double_lock' 'ep_poll' 'snd_seq_prioq_cell_out' 'pcpu_alloc' '__add_to_page_cache_locked' 'ext4_da_write_end' 'poll_schedule_timeout' 'alloc_pid' 'ext4_free_inodes_count' 'ext4_mark_iloc_dirty' 'find_get_pages_range_tag' 'blk_mq_sched_dispatch_requests' 'blk_mq_dispatch_rq_list' 'shmem_file_read_iter' 'ktime_get_real_seconds' 'yama_ptracer_del' 'wbt_done' 'do_readlinkat' 'n_tty_receive_buf_common' 'lookup_fast' 'find_group_orlov' 'xas_find_marked' 'dd_has_work' 'ext4_has_free_clusters' 'blk_mq_get_request' 'generic_file_read_iter' 'audit_log_start' 'wbt_issue' '_find_next_bit' 'add_timer' 'run_timer_softirq' 'shmem_getpage_gfp' 'lruvec_lru_size' 'get_cpu_iowait_time_us' 'ip6_tnl_start_xmit' '__tpacket_v3_has_room' 'tick_nohz_idle_stop_tick' 'do_signal_stop' 'echo_char' 'xas_clear_mark' 'generic_fillattr' 'mod_timer' 'kauditd_thread' 'do_syslog' 'generic_write_end' 'copy_process' 'kcm_rfree' 17:28:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f0000001540)={0x14, 0x1, 0x2, 0x5}, 0x14}}, 0x0) [ 162.332482][ T7920] IPVS: ftp: loaded support on port[0] = 21 17:28:09 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000400c500000000"], 0x0, 0x26}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x48c, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x2000030b}, 0x6d) [ 162.399658][ T7920] chnl_net:caif_netlink_parms(): no params data found [ 162.470053][ T7920] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.487274][ T7920] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.505969][ T7920] device bridge_slave_0 entered promiscuous mode [ 162.529000][ T7920] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.536146][ T7920] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.558075][ T7920] device bridge_slave_1 entered promiscuous mode [ 162.576036][ T7920] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.579147][ T7927] IPVS: ftp: loaded support on port[0] = 21 [ 162.588184][ T7920] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 162.614959][ T7920] team0: Port device team_slave_0 added [ 162.623231][ T7920] team0: Port device team_slave_1 added [ 162.645970][ T7920] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 162.653314][ T7920] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 162.680165][ T7920] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 17:28:10 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f00000003c0)='/dev/snd/timer\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) pipe(&(0x7f0000000200)) socket$inet6_sctp(0xa, 0x801, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) [ 162.693297][ T7920] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 162.701234][ T7920] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 162.728045][ T7920] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 162.789781][ T7920] device hsr_slave_0 entered promiscuous mode [ 162.827906][ T7920] device hsr_slave_1 entered promiscuous mode [ 162.960632][ T7929] IPVS: ftp: loaded support on port[0] = 21 [ 162.996202][ T7927] chnl_net:caif_netlink_parms(): no params data found 17:28:10 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x0, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000140)={0xfff}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) [ 163.070610][ T7920] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 163.169843][ T7920] netdevsim netdevsim0 netdevsim1: renamed from eth1 17:28:10 executing program 4: r0 = socket(0x15, 0x5, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt(r0, 0x200000000114, 0x2711, 0x0, &(0x7f0000000000)) [ 163.326623][ T7933] IPVS: ftp: loaded support on port[0] = 21 [ 163.332728][ T7920] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 163.361019][ T7920] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 163.473760][ T7936] IPVS: ftp: loaded support on port[0] = 21 [ 163.475876][ T7920] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.486882][ T7920] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.494260][ T7920] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.501393][ T7920] bridge0: port 1(bridge_slave_0) entered forwarding state 17:28:10 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000040)={0x0, 0x0, 0x800, 0x0, 0x0, "1b05f136451efaf60921f6dc0fd05b949e2a1c"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 163.544839][ T44] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.557735][ T44] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.604409][ T7927] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.618183][ T7927] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.626080][ T7927] device bridge_slave_0 entered promiscuous mode [ 163.635401][ T7927] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.643811][ T7927] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.651907][ T7927] device bridge_slave_1 entered promiscuous mode [ 163.669501][ T7929] chnl_net:caif_netlink_parms(): no params data found [ 163.714614][ T7927] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.736220][ T7927] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.802636][ T7943] IPVS: ftp: loaded support on port[0] = 21 [ 163.811290][ T7927] team0: Port device team_slave_0 added [ 163.819615][ T7927] team0: Port device team_slave_1 added [ 163.834930][ T7933] chnl_net:caif_netlink_parms(): no params data found [ 163.881311][ T7920] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.906452][ T7927] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 163.913690][ T7927] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.940166][ T7927] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 163.955741][ T7927] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 163.962843][ T7927] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 163.988950][ T7927] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 164.001006][ T7929] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.008164][ T7929] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.015863][ T7929] device bridge_slave_0 entered promiscuous mode [ 164.024870][ T7929] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.032067][ T7929] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.039998][ T7929] device bridge_slave_1 entered promiscuous mode [ 164.047086][ T7936] chnl_net:caif_netlink_parms(): no params data found [ 164.138630][ T7927] device hsr_slave_0 entered promiscuous mode [ 164.207539][ T7927] device hsr_slave_1 entered promiscuous mode [ 164.267207][ T7927] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 164.274831][ T7927] Cannot create hsr debugfs directory [ 164.305909][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.314092][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.331365][ T7920] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.341166][ T7929] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.379722][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.388631][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.397235][ T2922] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.404346][ T2922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.415631][ T7929] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.431008][ T7933] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.438637][ T7933] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.446314][ T7933] device bridge_slave_0 entered promiscuous mode [ 164.454779][ T7933] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.462076][ T7933] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.470273][ T7933] device bridge_slave_1 entered promiscuous mode [ 164.502541][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.511712][ T2922] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.520260][ T2922] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.527391][ T2922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.545118][ T7929] team0: Port device team_slave_0 added [ 164.568712][ T2901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.579350][ T7933] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.589517][ T7929] team0: Port device team_slave_1 added [ 164.596403][ T7933] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.606240][ T7943] chnl_net:caif_netlink_parms(): no params data found [ 164.642280][ T2901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.662396][ T7929] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 164.669669][ T7929] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.695859][ T7929] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 164.711672][ T7929] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 164.718836][ T7929] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 164.744992][ T7929] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 164.762834][ T7933] team0: Port device team_slave_0 added [ 164.781145][ T7936] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.788459][ T7936] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.796074][ T7936] device bridge_slave_0 entered promiscuous mode [ 164.804445][ T7936] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.811572][ T7936] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.819570][ T7936] device bridge_slave_1 entered promiscuous mode [ 164.826382][ T7927] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 164.879708][ T7933] team0: Port device team_slave_1 added [ 164.885581][ T7927] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 164.951862][ T7927] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 165.019683][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.028514][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.061788][ T7927] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 165.129316][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.189465][ T7929] device hsr_slave_0 entered promiscuous mode [ 165.247738][ T7929] device hsr_slave_1 entered promiscuous mode [ 165.307286][ T7929] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 165.315027][ T7929] Cannot create hsr debugfs directory [ 165.321096][ T7933] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 165.328110][ T7933] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.354060][ T7933] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 165.366667][ T7933] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 165.373721][ T7933] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.400110][ T7933] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 165.418610][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.429521][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.439622][ T7936] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 165.464148][ T7943] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.471521][ T7943] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.479341][ T7943] device bridge_slave_0 entered promiscuous mode [ 165.491021][ T7943] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.498216][ T7943] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.506052][ T7943] device bridge_slave_1 entered promiscuous mode [ 165.519387][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.527765][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.537032][ T7936] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.599089][ T7933] device hsr_slave_0 entered promiscuous mode [ 165.637482][ T7933] device hsr_slave_1 entered promiscuous mode [ 165.687356][ T7933] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 165.695061][ T7933] Cannot create hsr debugfs directory [ 165.707160][ T7943] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 165.730529][ T7943] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.750024][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.758490][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.777702][ T7936] team0: Port device team_slave_0 added [ 165.796631][ T7943] team0: Port device team_slave_0 added [ 165.804300][ T7920] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.822452][ T7936] team0: Port device team_slave_1 added [ 165.833400][ T7943] team0: Port device team_slave_1 added [ 165.880566][ T7943] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 165.887650][ T7943] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.913824][ T7943] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 165.926312][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 165.935713][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 165.944029][ T7936] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 165.953117][ T7936] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 165.981140][ T7936] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 166.003554][ T7943] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 166.010696][ T7943] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.036985][ T7943] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 166.059691][ T7929] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 166.091412][ T7929] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 166.139408][ T7936] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 166.146531][ T7936] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 166.172651][ T7936] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 166.219520][ T7943] device hsr_slave_0 entered promiscuous mode [ 166.297491][ T7943] device hsr_slave_1 entered promiscuous mode [ 166.347463][ T7943] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 166.355096][ T7943] Cannot create hsr debugfs directory [ 166.363285][ T7920] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.374074][ T7929] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 166.429597][ T7929] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 166.588993][ T7936] device hsr_slave_0 entered promiscuous mode [ 166.647536][ T7936] device hsr_slave_1 entered promiscuous mode [ 166.697473][ T7936] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 166.705124][ T7936] Cannot create hsr debugfs directory [ 166.752569][ T7933] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 166.789830][ T7933] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 166.862973][ T7933] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 166.939829][ T7933] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 166.983142][ T7927] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.991834][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.001734][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.042367][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.051120][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.062770][ T7927] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.090265][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.098966][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.109796][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.116867][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.132034][ T7943] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 167.190242][ T7943] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 167.256125][ T7943] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 167.319607][ T7943] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 167.358796][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.366795][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.375670][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.384168][ T7955] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.391216][ T7955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.423059][ T2901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.432932][ T2901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.448347][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.457530][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.466959][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.494387][ T7936] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 167.519389][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 167.527882][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 167.536548][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.544997][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 167.560458][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.569307][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.579746][ T7936] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 167.629912][ T7920] device veth0_vlan entered promiscuous mode [ 167.645850][ T7927] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 167.657565][ T7927] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 167.681716][ T7936] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 167.739367][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.748426][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.756900][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.765741][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.774586][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.796570][ T7927] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.804723][ T7936] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 167.833199][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 167.846419][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 167.869833][ T7920] device veth1_vlan entered promiscuous mode [ 167.886368][ T7933] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.913801][ T7929] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.921242][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 167.930720][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 167.938974][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 167.947946][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 167.974445][ T7933] 8021q: adding VLAN 0 to HW filter on device team0 [ 167.984136][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.992570][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.013563][ T7927] device veth0_vlan entered promiscuous mode [ 168.028544][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 168.039883][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 168.048367][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 168.056522][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 168.065281][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.074344][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.083047][ T7955] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.090208][ T7955] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.098184][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 168.106037][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 168.114262][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.132345][ T7920] device veth0_macvtap entered promiscuous mode [ 168.150456][ T7943] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.159871][ T2901] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 168.170150][ T2901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.177923][ T2901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.185566][ T2901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.195055][ T2901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.203758][ T2901] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.210863][ T2901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.220009][ T7929] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.227706][ T7927] device veth1_vlan entered promiscuous mode [ 168.242858][ T7920] device veth1_macvtap entered promiscuous mode [ 168.252151][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 168.260968][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 168.269567][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.293359][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.302441][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.310967][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.318138][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.326259][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.335464][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.357364][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 168.365603][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.375619][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.384519][ T44] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.391599][ T44] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.399650][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.408853][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.426999][ T7920] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 168.445272][ T7920] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 168.454484][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.463120][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.471923][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.480737][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.489401][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 168.498104][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 168.506877][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.515116][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.522981][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 168.531772][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 168.540861][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.554511][ T7943] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.580363][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.589062][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.597570][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 168.606126][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 168.614611][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.623373][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.632272][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.640834][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.658913][ T7933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.667940][ T7927] device veth0_macvtap entered promiscuous mode [ 168.689212][ T7936] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.696450][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 168.705601][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 168.714128][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 168.722895][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 168.731724][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 168.740261][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 168.749008][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.756059][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.764187][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 168.783705][ T7927] device veth1_macvtap entered promiscuous mode [ 168.794246][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 168.802708][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 168.811621][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 168.820201][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 168.829372][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 168.838190][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.845242][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.853076][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 168.862018][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 168.873776][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 168.897449][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 168.905319][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 168.930003][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 168.938917][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 168.954322][ T7936] 8021q: adding VLAN 0 to HW filter on device team0 [ 168.969415][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 168.979971][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 168.992418][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 169.000128][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 169.014056][ T7927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 169.025415][ T7927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.036842][ T7927] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 169.057304][ T7933] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.065316][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.074290][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 169.087500][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 169.095112][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 169.107236][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 169.115895][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.124811][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.134065][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.141197][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.149787][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.158737][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.168064][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.176849][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.185464][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.192565][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.201388][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 169.231761][ T7929] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.240836][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.250331][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.258711][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.267871][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.276133][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.284672][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.293781][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.302906][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.312334][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.321614][ T7927] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 169.332143][ T7927] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 169.343331][ T7927] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 169.377301][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 169.386145][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 169.398515][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.407458][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.416317][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 169.425223][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 169.434758][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 169.479126][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.497771][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.506224][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 169.515095][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 169.524043][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 169.532553][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 169.541034][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.549644][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.561647][ T7936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 169.597225][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 169.604794][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 169.613872][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 169.624107][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 169.633942][ T7933] device veth0_vlan entered promiscuous mode [ 169.644563][ T7943] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.679106][ T7929] device veth0_vlan entered promiscuous mode [ 169.688334][ T7933] device veth1_vlan entered promiscuous mode [ 169.719347][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 169.739412][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 169.756926][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 17:28:17 executing program 0: [ 169.766773][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 169.775328][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 169.791570][ T7929] device veth1_vlan entered promiscuous mode [ 169.827608][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 169.835928][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 169.847839][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 169.855530][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 169.881581][ T7936] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 169.904213][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 169.917923][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 169.926952][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 17:28:17 executing program 0: [ 169.964535][ T7933] device veth0_macvtap entered promiscuous mode [ 169.990569][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 17:28:17 executing program 0: [ 170.016597][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 170.048115][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 170.069171][ T7933] device veth1_macvtap entered promiscuous mode [ 170.102955][ T7929] device veth0_macvtap entered promiscuous mode 17:28:17 executing program 0: [ 170.132094][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 170.154739][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 17:28:17 executing program 0: [ 170.197995][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 170.206803][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.234583][ T7929] device veth1_macvtap entered promiscuous mode [ 170.254465][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 170.276459][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.299822][ T7933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.316959][ T7933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.328095][ T7933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.339703][ T7933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:28:17 executing program 0: [ 170.352304][ T7933] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 170.387249][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.395346][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.406473][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.416057][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 17:28:17 executing program 0: [ 170.440922][ T7943] device veth0_vlan entered promiscuous mode [ 170.457415][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 170.468675][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 170.500083][ T7933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.557066][ T7933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.568505][ T7933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.579355][ T7933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.591338][ T7933] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 170.600536][ T7929] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.612780][ T7929] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.622795][ T7929] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 170.633410][ T7929] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.643707][ T7929] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 17:28:18 executing program 1: [ 170.654350][ T7929] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.665618][ T7929] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 170.685153][ T7943] device veth1_vlan entered promiscuous mode [ 170.702735][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 170.717966][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.726699][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.742760][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 170.752218][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 170.769754][ T7929] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.781808][ T7929] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.792888][ T7929] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.803698][ T7929] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.813897][ T7929] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 170.824681][ T7929] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 170.836945][ T7929] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 170.862045][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 170.871353][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 170.880547][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 170.889770][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 170.898548][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 170.922949][ T7936] device veth0_vlan entered promiscuous mode [ 170.931049][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 170.941189][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 170.965365][ T7936] device veth1_vlan entered promiscuous mode [ 170.989815][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 170.998785][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 171.008141][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 171.017480][ T7943] device veth0_macvtap entered promiscuous mode [ 171.053559][ T7943] device veth1_macvtap entered promiscuous mode [ 171.091138][ T7936] device veth0_macvtap entered promiscuous mode [ 171.098797][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 171.107006][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 171.115425][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 171.123644][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 171.132376][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 171.141421][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 171.156841][ T7943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 171.168135][ T7943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.178106][ T7943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 171.188748][ T7943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.198658][ T7943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 171.209339][ T7943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.219208][ T7943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 171.230085][ T7943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.242029][ T7943] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 171.253905][ T7936] device veth1_macvtap entered promiscuous mode [ 171.264578][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 171.282395][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 171.297346][ T7943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.311616][ T7943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.321852][ T7943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.332541][ T7943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.342397][ T7943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.353525][ T7943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.363512][ T7943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.373977][ T7943] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.385046][ T7943] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 171.409940][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 171.421684][ T44] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 171.447789][ T7936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 171.461508][ T7936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.476846][ T7936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 171.491082][ T7936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.501049][ T7936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 171.511845][ T7936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.521719][ T7936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 171.532265][ T7936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.542274][ T7936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 171.553311][ T7936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.564228][ T7936] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 171.581358][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 171.593087][ T7926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 171.605671][ T7936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.621818][ T7936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.632085][ T7936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.642728][ T7936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.652832][ T7936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.663283][ T7936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.673168][ T7936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.683939][ T7936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.694182][ T7936] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 171.704653][ T7936] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 171.716469][ T7936] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 171.742765][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 171.758035][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 172.122550][ C0] hrtimer: interrupt took 25057 ns 17:28:20 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) r1 = epoll_create1(0x0) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000009000)={0x3ff, 0x23, 0x0, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000100)={0x20002001}) socket(0x11, 0x800000003, 0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 17:28:20 executing program 0: 17:28:20 executing program 1: 17:28:20 executing program 3: 17:28:20 executing program 4: 17:28:20 executing program 5: 17:28:20 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000280)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe2(&(0x7f00000004c0), 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) 17:28:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005c40)=[{{&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000000740)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000004bc0)=[{0x0}, {&(0x7f00000048c0)=""/211, 0xd3}, {0x0}], 0x3, &(0x7f0000004c40)=""/4096, 0x1000}}], 0x6, 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) r5 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r4, r5, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000680)='./bus\x00', 0x0) 17:28:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "34972f626452469a9aa9a664d1f2983b6c43df"}) r2 = dup3(r1, r0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) 17:28:20 executing program 5: 17:28:20 executing program 0: 17:28:20 executing program 1: open(&(0x7f00000003c0)='./file0\x00', 0x9040, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="756269313add"], &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='ubifs\x00', 0x0, 0x0) 17:28:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x10, 0x2, 0x10) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000240)={'batadv_slave_0\x00', @random="01003a1e2410"}) [ 173.110564][ T26] kauditd_printk_skb: 8 callbacks suppressed [ 173.110587][ T26] audit: type=1800 audit(1584206900.506:31): pid=8161 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16549 res=0 17:28:20 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) ioctl$PPPIOCGCHAN(r0, 0x80047437, 0x0) 17:28:20 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 173.230042][ T8162] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 173.273675][ T8162] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:28:20 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) write$evdev(r0, &(0x7f0000000040), 0xfd18) 17:28:20 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:28:20 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:28:20 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:28:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005c40)=[{{&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000000740)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000004bc0)=[{0x0}, {&(0x7f00000048c0)=""/211, 0xd3}, {0x0}], 0x3, &(0x7f0000004c40)=""/4096, 0x1000}}], 0x6, 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) r5 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r4, r5, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000680)='./bus\x00', 0x0) 17:28:21 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) 17:28:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='htcp\x00', 0x5) sendto$inet(r0, 0x0, 0x0, 0x240087bd, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000000)='\f', 0xfb386d1f6a4fd57d, 0x400800a, 0x0, 0xae19fea218018fd) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffe6a, 0x0, 0x0, 0xb84608a41099d4b8) [ 173.280649][ T8168] UBIFS error (pid: 8168): cannot open "ubi1:Ý", error -19 17:28:21 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[{0x10, 0x110}], 0x10}}], 0x2, 0x0) 17:28:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x88}}, 0x0) 17:28:21 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:28:21 executing program 5: perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x964031b3e032880e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd5, 0xaef9064b20bd1b19, @perf_config_ext={0x9}, 0x0, 0x100000000, 0x0, 0x0, 0x8000001ff, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x109, 0x0, &(0x7f0000000380)="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"}, 0x40) r2 = socket$kcm(0x2b, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40000) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xfffffffffffffe64) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') [ 174.068415][ T26] audit: type=1800 audit(1584206901.466:32): pid=8212 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16550 res=0 17:28:21 executing program 1: r0 = memfd_create(&(0x7f0000000300)='\x00\xb3y\xb1\xc4\xc5)\xa3\xc6\x9cjuu\xa1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x20a81) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$P9_RLINK(r2, &(0x7f0000000280)={0x7}, 0x269) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000000)={0x100000227, @time={0x0, 0xffffffff}}) 17:28:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') getdents(r0, &(0x7f00000000c0)=""/31, 0x77c) 17:28:21 executing program 1: unshare(0x8020000) semget$private(0x0, 0x4007, 0x0) semctl$IPC_RMID(0x0, 0x4007, 0x10) 17:28:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x0, 0x0) mknod(&(0x7f0000000200)='./bus\x00', 0x1000, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x2082, 0x0) splice(r0, 0x0, r1, 0x0, 0xb6, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000380)="fd", 0x1) 17:28:21 executing program 5: perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x964031b3e032880e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd5, 0xaef9064b20bd1b19, @perf_config_ext={0x9}, 0x0, 0x100000000, 0x0, 0x0, 0x8000001ff, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x109, 0x0, &(0x7f0000000380)="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"}, 0x40) r2 = socket$kcm(0x2b, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40000) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xfffffffffffffe64) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 17:28:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005c40)=[{{&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000000740)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000004bc0)=[{0x0}, {&(0x7f00000048c0)=""/211, 0xd3}, {0x0}], 0x3, &(0x7f0000004c40)=""/4096, 0x1000}}], 0x6, 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) r5 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r4, r5, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000680)='./bus\x00', 0x0) 17:28:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='fd\x00') getdents(r0, &(0x7f00000000c0)=""/31, 0x77c) 17:28:22 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000300)) pread64(r0, 0x0, 0x0, 0x0) 17:28:22 executing program 1: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={r4, 0x1, 0x6, @remote}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'\x00', 0x3202}) close(r5) 17:28:22 executing program 5: perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x964031b3e032880e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd5, 0xaef9064b20bd1b19, @perf_config_ext={0x9}, 0x0, 0x100000000, 0x0, 0x0, 0x8000001ff, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x109, 0x0, &(0x7f0000000380)="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"}, 0x40) r2 = socket$kcm(0x2b, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40000) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xfffffffffffffe64) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 17:28:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000980)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r0, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) renameat2(r1, &(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 17:28:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x5c, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_CADT_FLAGS={0x8, 0x6}]}]}, 0x5c}}, 0x0) [ 174.883300][ T8261] device lo entered promiscuous mode [ 174.902708][ T8261] device erspan0 entered promiscuous mode [ 174.934373][ T26] audit: type=1800 audit(1584206902.326:33): pid=8265 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16535 res=0 17:28:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'gre0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x5865, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB='|\x00\x00\x00$\x00\a/\x00'/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c00020008000500000000000800050000000000380003001000000000000000007775d02500000000806dd6e6f8a5ca0a2a5b308ab1c10000"], 0x7c}}, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x4924924924926d3, 0x0) 17:28:22 executing program 5: perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x964031b3e032880e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xd5, 0xaef9064b20bd1b19, @perf_config_ext={0x9}, 0x0, 0x100000000, 0x0, 0x0, 0x8000001ff, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0), 0x10000000000000cb, 0x0, 0xffffffffffffff69, 0x20000001}, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x109, 0x0, &(0x7f0000000380)="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"}, 0x40) r2 = socket$kcm(0x2b, 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) close(r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000040)) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x40000) write$cgroup_pid(0xffffffffffffffff, 0x0, 0xfffffffffffffe64) getpid() ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 17:28:22 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000300000000000c00095000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f26fb0b71d0e6adfefc41d8f7faf75e0f226bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc16ee988e6e0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b32a83438810720a159cda9036b4e369a9e152ddcc7b1b85f3c3d44aeaccd3641110bec4e9027a0c8055bbfc3a96d2e8910c2c39e4b3449abe802f5ab3e89cf6c662ed4048d3b3e22278d00031e5388ee5c867ddd58211d6ececb0cd2b6d357b8580218ce740068725837074e468ee20a7876baf2635f8849822775985bf31b715f5888b24efa000000000000000000000000000000000000000000000000020000000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf449c3bfdbc6ec664b91ab219efdebb7b3de8f67581cf796a1d4223b9ff7ffcad3f6c962b9f292324b7ab7f7da31cf41ab11f12fb1e0a494034127de7080000000000000064d43e153b3d34899f40159e800ea2474b544035a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a74e04bde740750fa4d9aaa705989b8e673e3296e52d337c56abf112874ec309baed0495f06d058a73651d6fe048ba6866adebab53168770a71ad901ace383e41d277b10392a912ffaf6f658f3f9cd16286744f83a83f128f8f92ef992239eafce5c1b3f97a297c9e49a0c3300ef7b7fb5f09e0c8a868a353409e34d3e82279637599f35ad380a447483cac394c7bbdcd0e3b1c39b6e00916de48a4e70f03cc4146a77af02c1d4cefd4a2b94c0aed8477dfa8ceefb467f05c6977c78cdbf37704ec73755539280b064bda144910fe0ade38ec9e47de89298b7bf4d769ccc18eede00e8ca5457870eb30d211e23ccc8e06dddeb61799257ab55ff413c86ba9affb12ee757c7234c270246c878d01160e5407bf6cf8809c3a0d462357b22515567230ad1e1f4933545fc3c741374211663f6b63b1dd0409e3445c92a1ba5a82da73ed4dd0a2768e825972ea3b77641467c89fa0f82e8440105051e5510a33dcda5e143fbfff161c9cbe4c51b3fa00675cc1b66c5fd9c26a54d43fa050645bd9109b7e7131421c0f39113be7664e08bde7115c61afcb718cf3c4680b2f6c7a84a4e378a9b15bc20f49e298727340e87cdefb40e56e9cfad973347d0de7ba4754ff231a1b933d8f931ba3552b2c7c503f3d93a3b0e958adb862822eecc69995ae166deb985629358c6b38e145b39fd9cda7efb7d9617d0ab0359499a55f922f678d01403b311687aaed8361962b2d54050fa67204e26b3f494d9e0d9d3bffcafc6af6b0c73474c8b3702d43636b70995e52bb022c380b2188e8ba6e670fd60e4a7aa15d1a21fe1c33c1825c4e7cacf4c735a2f623760473f423c23c4f7518b308ab688fcc01abafc64576bddb25dc41841eaff86216e0eba88191e89b3f8ca8cf9dc9d5e5c9280444f0531cf7b33675a761b4293b95a0cea18a3c29f169f804402e4cc587a23eab8a19afd8cbb37af260cf3bffc91e2469cd4e5662d8de7ba184e64f5e6878a62a37695350288f0ba5022522edfac8991cb23b971bf132cb3656872938e01eb83bdcaa2ed71ec93ef1d74f349408bf6ec3cd36d1ea2a352dd621d373ddbd93b9aad742ed32b174782c373cf1ed5b2e0a0f3ac417fe5047f405027c50e4fdb4c3862511079e5264c8cd18b958d9f61d3dd298929193a6a80b6c343db6e5560a"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r0, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0xc0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) [ 175.042334][ T8258] device erspan0 left promiscuous mode [ 175.055843][ T8258] device lo left promiscuous mode [ 175.112276][ T8270] device lo entered promiscuous mode [ 175.136409][ T8280] device erspan0 entered promiscuous mode 17:28:22 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000300)) pread64(r0, 0x0, 0x0, 0x0) [ 175.177796][ T8258] device erspan0 left promiscuous mode [ 175.190190][ T8258] device lo left promiscuous mode 17:28:22 executing program 1: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={r4, 0x1, 0x6, @remote}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'\x00', 0x3202}) close(r5) [ 175.461554][ T8297] device lo entered promiscuous mode [ 175.470524][ T8297] device erspan0 entered promiscuous mode [ 175.552805][ T8296] device erspan0 left promiscuous mode [ 175.558465][ T8296] device lo left promiscuous mode 17:28:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005c40)=[{{&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000000740)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000004bc0)=[{0x0}, {&(0x7f00000048c0)=""/211, 0xd3}, {0x0}], 0x3, &(0x7f0000004c40)=""/4096, 0x1000}}], 0x6, 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) r5 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r4, r5, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000680)='./bus\x00', 0x0) 17:28:23 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) close(r0) socket$inet_sctp(0x2, 0x800000000000001, 0x84) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x84, 0x81, &(0x7f0000000380)={'filter\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000000400)=0x78) 17:28:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x9b) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40448d4, 0x0, 0x0) 17:28:23 executing program 2: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) poll(0x0, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) io_destroy(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100), 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x397, &(0x7f0000000180)={0x0, 0xff90}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000140012000c000100766574680000c6bfeb21e2e24ee4a8716ee40000"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4400000010008105000000000000000000200000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000b0001006970766c616e00000c000200060001000200000008000500", @ANYRES32=r3, @ANYBLOB="a07ed2028a19a14142e238e66f662038c75c315234a0c73fb0ef16072d42e50e36ca3edc8bf57d4fcf96590292f3d3233cabbae5830b1b337b39fcc990ddebb0e0477ddba97b7ceb33ace6cae9c30f84426b25f8adf33cbce84ad225b9d88e4751cdb5750da26de7c693b4c6518ab1271b37"], 0x44}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r6}}, 0x20}}, 0x0) 17:28:23 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='&'], 0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:28:23 executing program 1: r0 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @remote}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000200)={r4, 0x1, 0x6, @remote}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'\x00', 0x3202}) close(r5) [ 175.704176][ T8306] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 175.758572][ T8304] device lo entered promiscuous mode 17:28:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001540)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000017c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000001840), 0x1000) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000000)={0x10, 0x0, 0x1}, 0x10) read$FUSE(r0, &(0x7f0000003000), 0x1150) write$FUSE_ENTRY(r0, &(0x7f0000000340)={0x90, 0x0, 0x2}, 0x90) 17:28:23 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0xfffffffd, 0x3, 0x0, 0x1}, 0x0) r4 = openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x80000000a) creat(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x41, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x200a, 0xfffffffffffffffe, 0x0, 0x8, 0x100000001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x0, &(0x7f0000000500)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000000c0)) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r6, 0x0, 0x0) [ 175.886018][ T26] audit: type=1800 audit(1584206903.276:34): pid=8325 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16570 res=0 17:28:23 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3, 0x0, 0x1}, 0x0) r4 = openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x80000000a) creat(0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) io_submit(0x0, 0x0, &(0x7f0000000500)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000000c0)) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r6, 0x0, 0x0) [ 176.169673][ T8304] device erspan0 entered promiscuous mode 17:28:23 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0xfffffffd, 0x3, 0x0, 0x1}, 0x0) r4 = openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x80000000a) creat(0x0, 0x150) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x41, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x100000001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x0, &(0x7f0000000500)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000000c0)) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r6, 0x0, 0x0) [ 176.310719][ T8303] device erspan0 left promiscuous mode [ 176.354348][ T8303] device lo left promiscuous mode 17:28:23 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) getsockname(r0, 0x0, 0x0) 17:28:23 executing program 1: mknod(&(0x7f0000000000)='./file0\x00', 0x1120, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x105801, 0x0) 17:28:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005c40)=[{{&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000000740)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000004bc0)=[{0x0}, {&(0x7f00000048c0)=""/211, 0xd3}, {0x0}], 0x3, &(0x7f0000004c40)=""/4096, 0x1000}}], 0x6, 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) r5 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r4, r5, 0x0, 0x8400f7fffff8) 17:28:24 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='&'], 0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:28:24 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0xfffffffd, 0x3, 0x0, 0x1}, 0x0) r4 = openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x80000000a) creat(0x0, 0x150) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x41, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x100000001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x0, &(0x7f0000000500)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000000c0)) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r6, 0x0, 0x0) 17:28:24 executing program 2: getpid() r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) 17:28:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000340)={0xc021, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x7fffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e6661740002040100020002ed83f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x3, 0x0) r4 = open(0x0, 0x141042, 0x0) writev(r4, &(0x7f0000000180)=[{&(0x7f0000000140)}], 0x1) truncate(&(0x7f0000000100)='./bus\x00', 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x7fff) 17:28:24 executing program 5: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffefff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 17:28:24 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0xfffffffd, 0x3, 0x0, 0x1}, 0x0) r4 = openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x80000000a) creat(0x0, 0x150) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x41, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x100000001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x0, &(0x7f0000000500)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000000c0)) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r6, 0x0, 0x0) [ 176.863691][ T26] audit: type=1800 audit(1584206904.256:35): pid=8378 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16586 res=0 [ 176.981190][ T26] audit: type=1804 audit(1584206904.376:36): pid=8374 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir597715966/syzkaller.NXkzyS/13/file0/bus" dev="loop1" ino=22 res=1 17:28:24 executing program 5: clone(0x0, 0x0, 0x0, 0x0, 0x0) shmget(0x2, 0x1000, 0x0, &(0x7f0000000000/0x1000)=nil) 17:28:24 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0xfffffffd, 0x3, 0x0, 0x1}, 0x0) r4 = openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x80000000a) creat(0x0, 0x150) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x41, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x100000001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x0, &(0x7f0000000500)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000000c0)) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r6, 0x0, 0x0) 17:28:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x8040ae9f, &(0x7f00000001c0)) [ 177.288909][ T8400] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 17:28:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) 17:28:24 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0xfffffffd, 0x3, 0x0, 0x1}, 0x0) r4 = openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x80000000a) creat(0x0, 0x150) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x41, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x100000001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x0, &(0x7f0000000500)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000000c0)) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000340)) 17:28:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005c40)=[{{&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000000740)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000004bc0)=[{0x0}, {&(0x7f00000048c0)=""/211, 0xd3}, {0x0}], 0x3, &(0x7f0000004c40)=""/4096, 0x1000}}], 0x6, 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) r5 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r4, r5, 0x0, 0x8400f7fffff8) [ 177.633726][ T26] audit: type=1804 audit(1584206905.026:37): pid=8415 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir597715966/syzkaller.NXkzyS/13/file0/bus" dev="loop1" ino=22 res=1 17:28:25 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='&'], 0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:28:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) [ 177.706491][ T26] audit: type=1804 audit(1584206905.026:38): pid=8411 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir597715966/syzkaller.NXkzyS/13/file0/bus" dev="loop1" ino=22 res=1 17:28:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000340)={0xc021, 0x2}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x7fffffff, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e6661740002040100020002ed83f8", 0x16}], 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r2) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r3, 0x3, 0x0) r4 = open(0x0, 0x141042, 0x0) writev(r4, &(0x7f0000000180)=[{&(0x7f0000000140)}], 0x1) truncate(&(0x7f0000000100)='./bus\x00', 0x1) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r5, 0x0, 0x7fff) [ 177.803283][ T26] audit: type=1800 audit(1584206905.196:39): pid=8426 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16580 res=0 17:28:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) 17:28:25 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0xfffffffd, 0x3, 0x0, 0x1}, 0x0) r4 = openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x80000000a) creat(0x0, 0x150) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x41, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x100000001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x0, &(0x7f0000000500)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000000c0)) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 178.286670][ T26] audit: type=1804 audit(1584206905.676:40): pid=8439 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir597715966/syzkaller.NXkzyS/14/file0/bus" dev="loop1" ino=23 res=1 17:28:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005c40)=[{{&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000000740)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000004bc0)=[{0x0}, {&(0x7f00000048c0)=""/211, 0xd3}, {0x0}], 0x3, &(0x7f0000004c40)=""/4096, 0x1000}}], 0x6, 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) r5 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r4, r5, 0x0, 0x8400f7fffff8) 17:28:25 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0xfffffffd, 0x3, 0x0, 0x1}, 0x0) r4 = openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x80000000a) creat(0x0, 0x150) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x41, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x100000001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x0, &(0x7f0000000500)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000000c0)) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) [ 178.785953][ T26] audit: type=1800 audit(1584206906.176:41): pid=8468 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16609 res=0 17:28:26 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB='&'], 0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 17:28:26 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0xfffffffd, 0x3, 0x0, 0x1}, 0x0) r4 = openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x80000000a) creat(0x0, 0x150) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x41, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x100000001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x0, &(0x7f0000000500)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000000c0)) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) 17:28:26 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) sync() 17:28:26 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) 17:28:26 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0xfffffffd, 0x3, 0x0, 0x1}, 0x0) r4 = openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x80000000a) creat(0x0, 0x150) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x41, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x100000001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x0, &(0x7f0000000500)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000000c0)) stat(0x0, 0x0) 17:28:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005c40)=[{{&(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000000740)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000004bc0)=[{0x0}, {&(0x7f00000048c0)=""/211, 0xd3}, {0x0}], 0x3, &(0x7f0000004c40)=""/4096, 0x1000}}], 0x6, 0x0, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) sendfile(r4, 0xffffffffffffffff, 0x0, 0x8400f7fffff8) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 179.754217][ T8494] ================================================================== [ 179.762387][ T8494] BUG: KCSAN: data-race in ext4_nonda_switch / percpu_counter_add_batch [ 179.770710][ T8494] [ 179.773050][ T8494] write to 0xffff88821824b158 of 8 bytes by task 8479 on cpu 1: [ 179.780712][ T8494] percpu_counter_add_batch+0xbc/0x140 [ 179.786195][ T8494] ext4_claim_free_clusters+0x64/0x80 [ 179.791608][ T8494] ext4_da_reserve_space+0xf8/0x270 [ 179.796831][ T8494] ext4_da_get_block_prep+0x87e/0xa50 [ 179.802403][ T8494] ext4_block_write_begin+0x336/0xbd0 [ 179.807793][ T8494] ext4_da_write_begin+0x220/0x860 [ 179.812922][ T8494] generic_perform_write+0x13a/0x320 [ 179.818226][ T8494] ext4_buffered_write_iter+0x14e/0x280 [ 179.823799][ T8494] ext4_file_write_iter+0xf4/0xd30 [ 179.828928][ T8494] new_sync_write+0x303/0x400 [ 179.833628][ T8494] __vfs_write+0x9e/0xb0 [ 179.837887][ T8494] vfs_write+0x189/0x380 [ 179.842235][ T8494] ksys_write+0xc5/0x1a0 [ 179.846536][ T8494] __x64_sys_write+0x49/0x60 [ 179.851149][ T8494] do_syscall_64+0xc7/0x390 [ 179.855691][ T8494] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.861584][ T8494] [ 179.863933][ T8494] read to 0xffff88821824b158 of 8 bytes by task 8494 on cpu 0: [ 179.871500][ T8494] ext4_nonda_switch+0x58/0x130 [ 179.876448][ T8494] ext4_da_write_begin+0xcc/0x860 [ 179.881487][ T8494] generic_perform_write+0x13a/0x320 [ 179.886787][ T8494] ext4_buffered_write_iter+0x14e/0x280 [ 179.892367][ T8494] ext4_file_write_iter+0xf4/0xd30 [ 179.897492][ T8494] new_sync_write+0x303/0x400 [ 179.902181][ T8494] __vfs_write+0x9e/0xb0 [ 179.906439][ T8494] vfs_write+0x189/0x380 [ 179.910732][ T8494] ksys_write+0xc5/0x1a0 [ 179.915004][ T8494] __x64_sys_write+0x49/0x60 [ 179.919610][ T8494] do_syscall_64+0xc7/0x390 [ 179.924130][ T8494] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 179.930037][ T8494] [ 179.932370][ T8494] Reported by Kernel Concurrency Sanitizer on: [ 179.938967][ T8494] CPU: 0 PID: 8494 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 17:28:27 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0xfffffffd, 0x3, 0x0, 0x1}, 0x0) r4 = openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x80000000a) creat(0x0, 0x150) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x41, 0x8001, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0xfffffffffffffffe, 0x0, 0x8, 0x100000001, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0xe3) io_submit(0x0, 0x0, &(0x7f0000000500)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000000c0)) 17:28:27 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) write(r1, &(0x7f0000000000)="b6", 0xfffffe7e) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) 17:28:27 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) sync() 17:28:27 executing program 3: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 179.947642][ T8494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.957732][ T8494] ================================================================== [ 179.965823][ T8494] Kernel panic - not syncing: panic_on_warn set ... [ 179.972431][ T8494] CPU: 0 PID: 8494 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 179.981034][ T8494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.991154][ T8494] Call Trace: [ 179.994468][ T8494] dump_stack+0x11d/0x187 [ 179.998823][ T8494] panic+0x210/0x640 [ 180.002745][ T8494] ? vprintk_func+0x89/0x13a [ 180.007374][ T8494] kcsan_report.cold+0xc/0x14 [ 180.012080][ T8494] kcsan_setup_watchpoint+0x3e3/0x420 [ 180.017612][ T8494] ext4_nonda_switch+0x58/0x130 [ 180.022479][ T8494] ext4_da_write_begin+0xcc/0x860 [ 180.027538][ T8494] generic_perform_write+0x13a/0x320 [ 180.032887][ T8494] ext4_buffered_write_iter+0x14e/0x280 [ 180.038492][ T8494] ext4_file_write_iter+0xf4/0xd30 [ 180.043663][ T8494] new_sync_write+0x303/0x400 [ 180.048377][ T8494] __vfs_write+0x9e/0xb0 [ 180.052677][ T8494] vfs_write+0x189/0x380 [ 180.056946][ T8494] ksys_write+0xc5/0x1a0 [ 180.061219][ T8494] __x64_sys_write+0x49/0x60 [ 180.065838][ T8494] do_syscall_64+0xc7/0x390 [ 180.070371][ T8494] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 180.076290][ T8494] RIP: 0033:0x45c849 [ 180.080207][ T8494] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 180.099827][ T8494] RSP: 002b:00007ff87f54ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 180.108255][ T8494] RAX: ffffffffffffffda RBX: 00007ff87f54f6d4 RCX: 000000000045c849 [ 180.116246][ T8494] RDX: 00000000fffffe7e RSI: 0000000020000000 RDI: 0000000000000003 [ 180.124230][ T8494] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 180.132215][ T8494] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 180.140202][ T8494] R13: 0000000000000c4d R14: 00000000004ca084 R15: 000000000076bf0c [ 180.149249][ T8494] Kernel Offset: disabled [ 180.153580][ T8494] Rebooting in 86400 seconds..