[ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.22' (ECDSA) to the list of known hosts. 2020/06/07 21:12:41 fuzzer started 2020/06/07 21:12:41 dialing manager at 10.128.0.105:40519 2020/06/07 21:12:42 syscalls: 3055 2020/06/07 21:12:42 code coverage: enabled 2020/06/07 21:12:42 comparison tracing: enabled 2020/06/07 21:12:42 extra coverage: enabled 2020/06/07 21:12:42 setuid sandbox: enabled 2020/06/07 21:12:42 namespace sandbox: enabled 2020/06/07 21:12:42 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/07 21:12:42 fault injection: enabled 2020/06/07 21:12:42 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/07 21:12:42 net packet injection: enabled 2020/06/07 21:12:42 net device setup: enabled 2020/06/07 21:12:42 concurrency sanitizer: enabled 2020/06/07 21:12:42 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/07 21:12:42 USB emulation: enabled syzkaller login: [ 53.873241][ T8945] KCSAN: could not find function: '_find_next_bit' 2020/06/07 21:12:44 adding functions to KCSAN blacklist: '__ext4_new_inode' '__send_signal' 'do_nanosleep' 'generic_fillattr' 'ext4_free_inodes_count' 'find_get_pages_range_tag' 'ep_poll' '__mpage_writepage' 'run_timer_softirq' '_find_next_bit' 'tick_nohz_idle_stop_tick' 'futex_wait_queue_me' 'copy_process' 21:13:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000037000505d25a80648c63940d0224fc601000104004000400060082c137153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 71.980763][ T8948] IPVS: ftp: loaded support on port[0] = 21 [ 72.054888][ T8948] chnl_net:caif_netlink_parms(): no params data found 21:13:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x102, &(0x7f0000000200)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 72.106894][ T8948] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.114305][ T8948] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.125017][ T8948] device bridge_slave_0 entered promiscuous mode [ 72.134899][ T8948] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.141967][ T8948] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.150257][ T8948] device bridge_slave_1 entered promiscuous mode [ 72.181737][ T8948] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.204004][ T8948] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 72.254222][ T8948] team0: Port device team_slave_0 added [ 72.261827][ T8948] team0: Port device team_slave_1 added [ 72.293397][ T8948] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 72.300395][ T8948] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.327755][ T8948] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 72.340559][ T8948] batman_adv: batadv0: Adding interface: batadv_slave_1 21:13:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="340000001500b59500000000002000000a000000", @ANYRES32, @ANYBLOB="080008001f536bae140002"], 0x34}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x4000000000002bc, 0x0) [ 72.348567][ T8948] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 72.375492][ T8948] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 72.392039][ T9094] IPVS: ftp: loaded support on port[0] = 21 [ 72.436191][ T8948] device hsr_slave_0 entered promiscuous mode [ 72.492943][ T8948] device hsr_slave_1 entered promiscuous mode [ 72.577024][ T9114] IPVS: ftp: loaded support on port[0] = 21 21:13:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) [ 72.723883][ T8948] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 72.765840][ T8948] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 72.824937][ T9094] chnl_net:caif_netlink_parms(): no params data found [ 72.858516][ T8948] netdevsim netdevsim0 netdevsim2: renamed from eth2 21:13:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000010c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5800000002060100000e0000000000000800000013000300686173683a6e65742c6966616365000e05000400000000000900020073797a30000000000c000780080008400000000005000500020000000500010007"], 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000402d) [ 72.986189][ T8948] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 73.101691][ T9321] IPVS: ftp: loaded support on port[0] = 21 [ 73.119748][ T9114] chnl_net:caif_netlink_parms(): no params data found [ 73.189563][ T9323] IPVS: ftp: loaded support on port[0] = 21 [ 73.192120][ T9094] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.212725][ T9094] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.220439][ T9094] device bridge_slave_0 entered promiscuous mode 21:13:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001580)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FWMARK={0x8, 0x5}]}}}]}, 0x44}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000200), 0x4) close(r1) fchdir(r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL_INHERIT={0x5, 0xc, 0x1}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 73.284746][ T9094] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.291823][ T9094] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.302544][ T9094] device bridge_slave_1 entered promiscuous mode [ 73.375977][ T9094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.404493][ T9094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.415089][ T9114] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.422215][ T9114] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.430374][ T9114] device bridge_slave_0 entered promiscuous mode [ 73.470581][ T9114] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.478478][ T9114] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.487039][ T9114] device bridge_slave_1 entered promiscuous mode [ 73.514344][ T9464] IPVS: ftp: loaded support on port[0] = 21 [ 73.522125][ T9094] team0: Port device team_slave_0 added [ 73.545648][ T9094] team0: Port device team_slave_1 added [ 73.552370][ T9114] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.588005][ T8948] 8021q: adding VLAN 0 to HW filter on device bond0 [ 73.608543][ T9321] chnl_net:caif_netlink_parms(): no params data found [ 73.624271][ T9114] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.644501][ T9323] chnl_net:caif_netlink_parms(): no params data found [ 73.659494][ T9094] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 73.667256][ T9094] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.694218][ T9094] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 73.709036][ T9114] team0: Port device team_slave_0 added [ 73.724805][ T9094] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 73.731778][ T9094] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 73.757790][ T9094] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 73.772347][ T9114] team0: Port device team_slave_1 added [ 73.874773][ T9094] device hsr_slave_0 entered promiscuous mode [ 73.902999][ T9094] device hsr_slave_1 entered promiscuous mode [ 73.932705][ T9094] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 73.940453][ T9094] Cannot create hsr debugfs directory [ 73.957420][ T9323] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.966441][ T9323] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.974375][ T9323] device bridge_slave_0 entered promiscuous mode [ 73.981405][ T9114] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 73.989252][ T9114] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.015820][ T9114] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 74.030849][ T9114] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 74.038389][ T9114] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 74.065175][ T9114] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 74.079162][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 74.087057][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 74.095818][ T8948] 8021q: adding VLAN 0 to HW filter on device team0 [ 74.112959][ T9323] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.120004][ T9323] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.128661][ T9323] device bridge_slave_1 entered promiscuous mode [ 74.194944][ T9114] device hsr_slave_0 entered promiscuous mode [ 74.253076][ T9114] device hsr_slave_1 entered promiscuous mode [ 74.302687][ T9114] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 74.310357][ T9114] Cannot create hsr debugfs directory [ 74.331517][ T9321] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.340100][ T9321] bridge0: port 1(bridge_slave_0) entered disabled state [ 74.348244][ T9321] device bridge_slave_0 entered promiscuous mode [ 74.365631][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.374106][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.382268][ T9437] bridge0: port 1(bridge_slave_0) entered blocking state [ 74.390111][ T9437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 74.397946][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.419676][ T9321] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.427053][ T9321] bridge0: port 2(bridge_slave_1) entered disabled state [ 74.434803][ T9321] device bridge_slave_1 entered promiscuous mode [ 74.442764][ T9323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.454543][ T9323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.478893][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.493159][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.501651][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 74.508701][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 74.536436][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 74.556970][ T9094] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 74.622690][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 74.631616][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 74.641046][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 74.650011][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.658899][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.667816][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 74.676385][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 74.686082][ T9321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.696043][ T9323] team0: Port device team_slave_0 added [ 74.703150][ T9321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.712305][ T9094] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 74.755839][ T9094] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 74.816404][ T9094] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 74.879039][ T8948] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 74.890242][ T8948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 74.898758][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 74.907322][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 74.916067][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 74.925608][ T9323] team0: Port device team_slave_1 added [ 74.944603][ T9464] chnl_net:caif_netlink_parms(): no params data found [ 74.969367][ T9321] team0: Port device team_slave_0 added [ 74.984863][ T9323] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 74.991857][ T9323] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.018473][ T9323] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 75.032523][ T9323] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 75.040260][ T9323] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.067062][ T9323] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 75.086510][ T9321] team0: Port device team_slave_1 added [ 75.164670][ T9323] device hsr_slave_0 entered promiscuous mode [ 75.212919][ T9323] device hsr_slave_1 entered promiscuous mode [ 75.242707][ T9323] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 75.250519][ T9323] Cannot create hsr debugfs directory [ 75.268062][ T9114] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 75.325154][ T9114] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 75.375091][ T9114] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 75.436094][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 75.443756][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 75.467888][ T9321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 75.475417][ T9321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.502603][ T9321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 75.517517][ T9321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 75.524940][ T9321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 75.553747][ T9321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 75.565885][ T9114] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 75.654972][ T9464] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.662062][ T9464] bridge0: port 1(bridge_slave_0) entered disabled state [ 75.670546][ T9464] device bridge_slave_0 entered promiscuous mode [ 75.679639][ T9464] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.687183][ T9464] bridge0: port 2(bridge_slave_1) entered disabled state [ 75.695377][ T9464] device bridge_slave_1 entered promiscuous mode [ 75.705230][ T8948] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 75.729361][ T9464] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.741367][ T9464] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.788351][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 75.797181][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 75.864843][ T9321] device hsr_slave_0 entered promiscuous mode [ 75.922946][ T9321] device hsr_slave_1 entered promiscuous mode [ 75.962634][ T9321] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 75.970206][ T9321] Cannot create hsr debugfs directory [ 75.982283][ T9464] team0: Port device team_slave_0 added [ 75.995273][ T9464] team0: Port device team_slave_1 added [ 76.026370][ T9464] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 76.034282][ T9464] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.069199][ T9464] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 76.096121][ T9464] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 76.103206][ T9464] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 76.129908][ T9464] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 76.142083][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 76.151220][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 76.160036][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 76.176332][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 76.194941][ T8948] device veth0_vlan entered promiscuous mode [ 76.220802][ T9094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.234599][ T9323] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 76.265567][ T9323] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 76.321137][ T9323] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 76.365592][ T9323] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 76.424439][ T9464] device hsr_slave_0 entered promiscuous mode [ 76.472925][ T9464] device hsr_slave_1 entered promiscuous mode [ 76.552584][ T9464] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 76.560163][ T9464] Cannot create hsr debugfs directory [ 76.574383][ T8948] device veth1_vlan entered promiscuous mode [ 76.591892][ T9094] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.602813][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 76.611902][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.620240][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.666455][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 76.675620][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 76.684478][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.691489][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.699743][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 76.708499][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 76.717156][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.724210][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.738084][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.749132][ T9114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.779786][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 76.789873][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 76.798646][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 76.829139][ T8948] device veth0_macvtap entered promiscuous mode [ 76.836710][ T9321] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 76.865969][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 76.874097][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 76.898283][ T8948] device veth1_macvtap entered promiscuous mode [ 76.907221][ T9321] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 76.926876][ T9321] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 76.994565][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 77.010101][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.019172][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.029784][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.038563][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.047867][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.066582][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.074984][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.083584][ T9321] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 77.133104][ T9464] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 77.177562][ T9114] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.192579][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 77.200986][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.211714][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 77.220676][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.231910][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.240480][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.249179][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.256230][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.265941][ T9323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.279697][ T9464] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 77.315672][ T9464] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 77.357341][ T9094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.365982][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.380206][ T9323] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.390941][ T8948] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 77.400726][ T9464] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 77.438622][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.446398][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.454491][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.466497][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.474976][ T9437] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.482039][ T9437] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.492275][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 77.504788][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 77.517865][ T8948] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 77.540966][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.550154][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 77.559452][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 77.568376][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 77.576348][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 77.644571][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.653638][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 77.662061][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 77.671247][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.678391][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.686415][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.694937][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.704042][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 77.712992][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 77.721303][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.728712][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.736955][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.745648][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.754603][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.762946][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.787950][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 77.796791][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 77.807871][ T9094] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 77.831001][ T9114] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 77.845879][ T9114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 77.883747][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 77.894589][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 77.903494][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 77.911959][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 77.921002][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 77.929357][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 77.962996][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 77.970894][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 77.983041][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 77.991864][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 78.000468][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 78.009288][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 78.017686][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 78.108377][ T9323] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 78.138017][ T9321] 8021q: adding VLAN 0 to HW filter on device bond0 21:13:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000037000505d25a80648c63940d0224fc601000104004000400060082c137153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 78.162763][T10204] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 78.171922][ T9114] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.189752][ T9464] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.233104][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 78.240587][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 78.262825][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 78.271503][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 78.293191][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.300922][T10208] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 78.309646][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.341096][ T9321] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.365239][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 21:13:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000037000505d25a80648c63940d0224fc601000104004000400060082c137153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 78.393038][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.403273][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.411871][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.432210][T10211] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 21:13:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e48000037000505d25a80648c63940d0224fc601000104004000400060082c137153e370948018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) [ 78.442793][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.449838][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.472906][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.481046][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.495229][T10213] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 78.503179][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.511751][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.532973][ T5] bridge0: port 2(bridge_slave_1) entered blocking state 21:13:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000140)="e2ebcea69407875e", 0x8, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="2896d8bbf53a27d4fd01"], 0xa) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 78.540031][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.575396][ T9464] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.599073][ T9323] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 78.633345][ T9094] device veth0_vlan entered promiscuous mode [ 78.639757][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 78.648856][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 78.670648][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 78.692128][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 78.709197][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 78.716867][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 78.724461][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 78.733329][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 78.747426][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 78.767038][ T9094] device veth1_vlan entered promiscuous mode 21:13:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000140)="e2ebcea69407875e", 0x8, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="2896d8bbf53a27d4fd01"], 0xa) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 78.797958][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 78.810182][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 78.823915][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 78.843023][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 78.851645][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 78.873026][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 78.881243][ T3641] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.888315][ T3641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 78.922944][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 78.931509][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 78.940213][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 78.949431][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 78.959997][ T3641] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.967056][ T3641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 78.978956][ T9114] device veth0_vlan entered promiscuous mode [ 79.006323][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 21:13:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000140)="e2ebcea69407875e", 0x8, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="2896d8bbf53a27d4fd01"], 0xa) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 79.022141][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.030119][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 79.039768][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 79.050652][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 79.059966][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.071559][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.080202][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.091891][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.100610][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 79.122500][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 79.131131][ T5297] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 79.149766][ T9321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:13:09 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000140)="e2ebcea69407875e", 0x8, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="2896d8bbf53a27d4fd01"], 0xa) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 79.185688][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 79.193915][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 79.207926][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 79.238039][ T9114] device veth1_vlan entered promiscuous mode [ 79.262652][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 79.270844][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 79.282961][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.291843][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 79.304263][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.322579][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 79.329982][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 79.350926][ T9464] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 79.362804][ T9464] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 79.388723][ T9094] device veth0_macvtap entered promiscuous mode [ 79.430999][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 79.439987][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 79.473177][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 79.481569][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 79.493104][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 79.501374][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 79.525104][ T9094] device veth1_macvtap entered promiscuous mode [ 79.537396][ T9323] device veth0_vlan entered promiscuous mode [ 79.551176][ T9321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.561045][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 79.569388][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 79.577403][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 79.585838][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.602994][ T9464] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 79.626843][ T9323] device veth1_vlan entered promiscuous mode [ 79.638925][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 79.646981][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 79.654936][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 79.663036][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 79.671175][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 79.679887][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 79.695329][ T9094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 79.712958][ T9094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 79.725292][ T9094] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 79.740974][ T9114] device veth0_macvtap entered promiscuous mode [ 79.750232][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 79.760022][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 79.769192][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 79.779842][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.789128][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 79.800187][ T9114] device veth1_macvtap entered promiscuous mode [ 79.811992][ T9094] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 79.823742][ T9094] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 79.835187][ T9094] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 79.864015][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 79.873901][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 79.883653][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 79.892180][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.901678][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 79.910740][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 79.919721][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 79.928573][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 79.955878][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 79.964062][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 79.980293][ T9323] device veth0_macvtap entered promiscuous mode [ 79.989846][ T9464] device veth0_vlan entered promiscuous mode [ 80.000963][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 80.009426][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 80.017469][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 80.032669][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 80.040870][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 80.057539][ T9114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.069404][ T9114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.079595][ T9114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.090050][ T9114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.100929][ T9114] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 80.110162][ T9323] device veth1_macvtap entered promiscuous mode [ 80.195663][ T9321] device veth0_vlan entered promiscuous mode [ 80.202293][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 80.210246][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 80.219893][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 80.227737][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 80.238559][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 80.250385][ T9114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.261208][ T9114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.271378][ T9114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.281831][ T9114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.292886][ T9114] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 80.301364][ T9464] device veth1_vlan entered promiscuous mode [ 80.375529][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 80.395388][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 80.405001][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 80.421303][ T9321] device veth1_vlan entered promiscuous mode [ 80.455035][ T9323] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.468088][ T9323] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.479292][ T9323] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.490621][ T9323] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.501132][ T9323] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 80.512529][ T9323] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.524256][ T9323] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 80.581421][T10233] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 80.592405][T10233] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 80.600543][T10233] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 80.611368][T10233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 80.620411][T10233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 80.629042][T10233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 80.640217][ T9323] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.651488][ T9323] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.661342][ T9323] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.672059][ T9323] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.682162][ T9323] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 80.692700][ T9323] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 80.704248][ T9323] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 80.749146][ T9464] device veth0_macvtap entered promiscuous mode [ 80.762543][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 80.770699][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 80.778827][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 80.788373][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 80.930168][T10233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 80.939740][T10233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 80.949351][ T9464] device veth1_macvtap entered promiscuous mode [ 81.001844][ T9321] device veth0_macvtap entered promiscuous mode [ 81.076238][ T9321] device veth1_macvtap entered promiscuous mode [ 81.114153][ T9464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.152362][ T9464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.172365][ T9464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.204380][ T9464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.225015][ T9464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.233399][ T27] audit: type=1804 audit(1591564391.743:2): pid=10264 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir451623442/syzkaller.kBrObR/0/cgroup.controllers" dev="sda1" ino=15748 res=1 [ 81.246303][ T9464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.309556][ T9464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.321812][ T9464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.338446][ T9464] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 81.358728][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 81.369076][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 81.381925][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 81.397123][ T3641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 81.410109][ T9321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.424595][ T9321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.435439][ T9321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.447387][ T9321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.458866][ T9321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.470090][ T9321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.483320][ T9321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.494217][ T9321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.504796][ T9321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 81.515852][ T9321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.527899][ T9321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 81.539990][ T9464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.552618][ T9464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.563046][ T9464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.573988][ T9464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.584458][ T9464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.595049][ T9464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.604948][ T9464] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.615495][ T9464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.626975][ T9464] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 81.634996][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 81.644087][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 81.653924][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 81.662678][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 81.674500][ T9321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.688120][ T9321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.698950][ T9321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.713058][ T9321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.723797][ T9321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.734702][ T9321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.745462][ T9321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.756226][ T9321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.766468][ T9321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 81.777688][ T9321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.789872][ T9321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 81.803741][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 81.814544][ T9437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 82.215390][ C1] hrtimer: interrupt took 28298 ns [ 82.269258][ T3440] block nbd0: Attempted send on invalid socket [ 82.275619][ T3440] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 82.295193][T10289] XFS (nbd0): SB validate failed with error -5. 21:13:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x102, &(0x7f0000000200)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:13:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000140)="e2ebcea69407875e", 0x8, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="2896d8bbf53a27d4fd01"], 0xa) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 21:13:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="340000001500b59500000000002000000a000000", @ANYRES32, @ANYBLOB="080008001f536bae140002"], 0x34}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x4000000000002bc, 0x0) 21:13:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000010c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5800000002060100000e0000000000000800000013000300686173683a6e65742c6966616365000e05000400000000000900020073797a30000000000c000780080008400000000005000500020000000500010007"], 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000402d) 21:13:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001580)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FWMARK={0x8, 0x5}]}}}]}, 0x44}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000200), 0x4) close(r1) fchdir(r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL_INHERIT={0x5, 0xc, 0x1}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 21:13:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) 21:13:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000140)="e2ebcea69407875e", 0x8, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="2896d8bbf53a27d4fd01"], 0xa) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 21:13:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="340000001500b59500000000002000000a000000", @ANYRES32, @ANYBLOB="080008001f536bae140002"], 0x34}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x4000000000002bc, 0x0) [ 83.574716][ T3440] block nbd0: Attempted send on invalid socket [ 83.578332][ T27] audit: type=1804 audit(1591564394.093:3): pid=10316 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir451623442/syzkaller.kBrObR/1/cgroup.controllers" dev="sda1" ino=15775 res=1 [ 83.581045][ T3440] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 83.616639][T10313] XFS (nbd0): SB validate failed with error -5. 21:13:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) 21:13:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="340000001500b59500000000002000000a000000", @ANYRES32, @ANYBLOB="080008001f536bae140002"], 0x34}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x4000000000002bc, 0x0) 21:13:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001580)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FWMARK={0x8, 0x5}]}}}]}, 0x44}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000200), 0x4) close(r1) fchdir(r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL_INHERIT={0x5, 0xc, 0x1}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) 21:13:14 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000140)="e2ebcea69407875e", 0x8, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="2896d8bbf53a27d4fd01"], 0xa) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 83.853434][ T3440] block nbd0: Attempted send on invalid socket [ 83.859755][ T3440] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 83.872459][T10340] XFS (nbd0): SB validate failed with error -5. [ 84.022894][ T0] NOHZ: local_softirq_pending 08 21:13:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x102, &(0x7f0000000200)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:13:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) 21:13:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) 21:13:17 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000010c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5800000002060100000e0000000000000800000013000300686173683a6e65742c6966616365000e05000400000000000900020073797a30000000000c000780080008400000000005000500020000000500010007"], 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000402d) 21:13:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) 21:13:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001580)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FWMARK={0x8, 0x5}]}}}]}, 0x44}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000200), 0x4) close(r1) fchdir(r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL_INHERIT={0x5, 0xc, 0x1}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 86.728757][ T3439] block nbd0: Attempted send on invalid socket [ 86.735064][ T3439] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 86.746649][T10377] XFS (nbd0): SB validate failed with error -5. 21:13:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) 21:13:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) [ 86.804924][ T3439] block nbd0: Attempted send on invalid socket [ 86.811155][ T3439] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 86.823073][T10373] XFS (nbd0): SB validate failed with error -5. [ 86.857926][ T27] audit: type=1804 audit(1591564397.374:4): pid=10372 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir451623442/syzkaller.kBrObR/2/cgroup.controllers" dev="sda1" ino=15792 res=1 21:13:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) [ 86.969836][ T3440] block nbd0: Attempted send on invalid socket [ 86.976187][ T3440] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 86.991587][T10380] XFS (nbd0): SB validate failed with error -5. [ 87.051040][ T3440] block nbd0: Attempted send on invalid socket [ 87.057281][ T3440] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 87.076276][T10405] XFS (nbd0): SB validate failed with error -5. [ 87.139614][ T3439] block nbd0: Attempted send on invalid socket [ 87.146024][ T3439] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 87.157201][T10406] XFS (nbd0): SB validate failed with error -5. 21:13:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) [ 87.249418][ T3440] block nbd0: Attempted send on invalid socket [ 87.255652][ T3440] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 87.266884][T10421] XFS (nbd0): SB validate failed with error -5. 21:13:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) 21:13:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) [ 87.341295][ T3440] block nbd0: Attempted send on invalid socket [ 87.347505][ T3440] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 87.358791][T10435] XFS (nbd0): SB validate failed with error -5. [ 87.477743][ T3439] block nbd0: Attempted send on invalid socket [ 87.484001][ T3439] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 87.495182][T10444] XFS (nbd0): SB validate failed with error -5. [ 87.662332][ T3439] block nbd0: Attempted send on invalid socket [ 87.668534][ T3439] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 87.684586][T10453] XFS (nbd0): SB validate failed with error -5. 21:13:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102385, 0x18ff1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x102, &(0x7f0000000200)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:13:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) 21:13:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000010c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5800000002060100000e0000000000000800000013000300686173683a6e65742c6966616365000e05000400000000000900020073797a30000000000c000780080008400000000005000500020000000500010007"], 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000402d) 21:13:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) 21:13:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) 21:13:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001580)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FWMARK={0x8, 0x5}]}}}]}, 0x44}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000200), 0x4) close(r1) fchdir(r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL_INHERIT={0x5, 0xc, 0x1}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 89.772263][ T3440] block nbd0: Attempted send on invalid socket [ 89.778496][ T3440] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 89.790928][T10478] XFS (nbd0): SB validate failed with error -5. [ 89.820500][ T27] audit: type=1804 audit(1591564400.324:5): pid=10500 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir451623442/syzkaller.kBrObR/3/cgroup.controllers" dev="sda1" ino=15818 res=1 21:13:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000010c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5800000002060100000e0000000000000800000013000300686173683a6e65742c6966616365000e05000400000000000900020073797a30000000000c000780080008400000000005000500020000000500010007"], 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000402d) 21:13:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001580)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FWMARK={0x8, 0x5}]}}}]}, 0x44}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000200), 0x4) close(r1) fchdir(r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL_INHERIT={0x5, 0xc, 0x1}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 89.894955][ T3439] block nbd0: Attempted send on invalid socket [ 89.901342][ T3439] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 89.918269][T10479] XFS (nbd0): SB validate failed with error -5. 21:13:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x81, 0x0) acct(0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/dev/nbd0'], &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='xfs\x00', 0x0, 0x0) bind$netrom(0xffffffffffffffff, &(0x7f0000000280)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) syz_mount_image$iso9660(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0xc050787274, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, &(0x7f0000001540)) write$rfkill(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f00000003c0)={0x0, "388081cace604100fdf36f3deac9607a6f0a8c3fc9e1187ff4d631db467c14e1", 0x0, 0x0, 0x0, 0x1000, 0x2020000, 0x3}) [ 89.995707][ T3439] block nbd0: Attempted send on invalid socket [ 90.002065][ T3439] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 90.017474][T10482] XFS (nbd0): SB validate failed with error -5. 21:13:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000010c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5800000002060100000e0000000000000800000013000300686173683a6e65742c6966616365000e05000400000000000900020073797a30000000000c000780080008400000000005000500020000000500010007"], 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000402d) [ 90.141807][ T27] audit: type=1804 audit(1591564400.654:6): pid=10518 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir171984278/syzkaller.Gy8hHG/14/cgroup.controllers" dev="sda1" ino=15809 res=1 [ 90.241904][ T27] audit: type=1804 audit(1591564400.744:7): pid=10520 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir560324588/syzkaller.XKR0Mi/7/cgroup.controllers" dev="sda1" ino=15813 res=1 21:13:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001580)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @ip6erspan={{0xe, 0x1, 'ip6erspan\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FWMARK={0x8, 0x5}]}}}]}, 0x44}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000200), 0x4) close(r1) fchdir(r1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_TTL_INHERIT={0x5, 0xc, 0x1}]}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x44}}, 0x0) [ 90.371303][ T3440] block nbd0: Attempted send on invalid socket [ 90.377524][ T3440] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 0 [ 90.389049][T10528] XFS (nbd0): SB validate failed with error -5. 21:13:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000010c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5800000002060100000e0000000000000800000013000300686173683a6e65742c6966616365000e05000400000000000900020073797a30000000000c000780080008400000000005000500020000000500010007"], 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000402d) 21:13:21 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000010c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5800000002060100000e0000000000000800000013000300686173683a6e65742c6966616365000e05000400000000000900020073797a30000000000c000780080008400000000005000500020000000500010007"], 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000402d) [ 90.662631][ T27] audit: type=1804 audit(1591564401.174:8): pid=10546 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir171984278/syzkaller.Gy8hHG/15/cgroup.controllers" dev="sda1" ino=15807 res=1 [ 90.695208][ T27] audit: type=1804 audit(1591564401.204:9): pid=10547 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir560324588/syzkaller.XKR0Mi/8/cgroup.controllers" dev="sda1" ino=15811 res=1 21:13:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000010c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5800000002060100000e0000000000000800000013000300686173683a6e65742c6966616365000e05000400000000000900020073797a30000000000c000780080008400000000005000500020000000500010007"], 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000402d) 21:13:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000140)="e2ebcea69407875e", 0x8, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="2896d8bbf53a27d4fd01"], 0xa) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) 21:13:23 executing program 3: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e20, 0xe, @local}}}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000800)={0xb, 0x77, 0x1, 0xfffffffd}, 0xb) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x12, &(0x7f0000000080)={0x0, 0x0, 0x1}) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/208, 0xd0}, {&(0x7f0000000740)=""/137, 0x89}, {&(0x7f0000000880)=""/190, 0xbe}, {&(0x7f0000000a00)=""/196, 0xc4}, {&(0x7f0000000f00)=""/124, 0x7c}], 0x5, &(0x7f0000000e80)=[{&(0x7f0000000b00)=""/97, 0x61}, {&(0x7f0000000640)=""/19, 0x13}, {&(0x7f0000000b80)=""/79, 0x4f}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000000cc0)=""/181, 0xb5}, {&(0x7f0000000e00)=""/106, 0x6a}], 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) openat$proc_capi20(0xffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101000, 0x0) getpid() openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000680)='/dev/l_op#\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f00000010c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5800000002060100000e0000000000000800000013000300686173683a6e65742c6966616365000e05000400000000000900020073797a30000000000c000780080008400000000005000500020000000500010007"], 0x58}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r3, 0x0, 0x10000402d) 21:13:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000040)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@abort='abort'}]}) 21:13:23 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000140)="e2ebcea69407875e", 0x8, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="2896d8bbf53a27d4fd01"], 0xa) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 92.961723][ T27] audit: type=1804 audit(1591564403.475:10): pid=10576 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir560324588/syzkaller.XKR0Mi/9/cgroup.controllers" dev="sda1" ino=15837 res=1 21:13:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') recvmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0}}], 0xf, 0xa, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="03070006000000fdff001900000004000180"], 0x18}}, 0x0) 21:13:23 executing program 3: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e20, 0xe, @local}}}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000800)={0xb, 0x77, 0x1, 0xfffffffd}, 0xb) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x12, &(0x7f0000000080)={0x0, 0x0, 0x1}) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/208, 0xd0}, {&(0x7f0000000740)=""/137, 0x89}, {&(0x7f0000000880)=""/190, 0xbe}, {&(0x7f0000000a00)=""/196, 0xc4}, {&(0x7f0000000f00)=""/124, 0x7c}], 0x5, &(0x7f0000000e80)=[{&(0x7f0000000b00)=""/97, 0x61}, {&(0x7f0000000640)=""/19, 0x13}, {&(0x7f0000000b80)=""/79, 0x4f}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000000cc0)=""/181, 0xb5}, {&(0x7f0000000e00)=""/106, 0x6a}], 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) openat$proc_capi20(0xffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101000, 0x0) getpid() openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000680)='/dev/l_op#\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff, 0xffffffffffffffff}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000140)="e2ebcea69407875e", 0x8, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="2896d8bbf53a27d4fd01"], 0xa) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 93.139371][ T27] audit: type=1804 audit(1591564403.565:11): pid=10567 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir171984278/syzkaller.Gy8hHG/16/cgroup.controllers" dev="sda1" ino=15836 res=1 [ 93.179302][T10575] EXT4-fs (loop1): Can't read superblock on 2nd try 21:13:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000040)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@abort='abort'}]}) 21:13:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') recvmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0}}], 0xf, 0xa, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="03070006000000fdff001900000004000180"], 0x18}}, 0x0) 21:13:23 executing program 2: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e20, 0xe, @local}}}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000800)={0xb, 0x77, 0x1, 0xfffffffd}, 0xb) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0xa000000400000005) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x12, &(0x7f0000000080)={0x0, 0x0, 0x1}) process_vm_readv(0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/208, 0xd0}, {&(0x7f0000000740)=""/137, 0x89}, {&(0x7f0000000880)=""/190, 0xbe}, {&(0x7f0000000a00)=""/196, 0xc4}, {&(0x7f0000000f00)=""/124, 0x7c}], 0x5, &(0x7f0000000e80)=[{&(0x7f0000000b00)=""/97, 0x61}, {&(0x7f0000000640)=""/19, 0x13}, {&(0x7f0000000b80)=""/79, 0x4f}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000000cc0)=""/181, 0xb5}, {&(0x7f0000000e00)=""/106, 0x6a}], 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) openat$proc_capi20(0xffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101000, 0x0) getpid() openat$adsp1(0xffffffffffffff9c, &(0x7f0000001540)='/dev/adsp1\x00', 0x0, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000600)='(\xe0\xf5\x00', &(0x7f0000000680)='/dev/l_op#\x00', &(0x7f0000000540)='system\x02\xe8\xb0C\xc5k\xe3\x06\x00\x00z2\x89\x02\xaa\xac.0xffffffffffffffff}) close(r0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0xd3, 0x0, 0x0, 0x3}, 0x10) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x12f}]) 21:13:26 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e1) 21:13:26 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80044506, &(0x7f0000002340)=""/203) 21:13:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x1000000, &(0x7f0000000080)=[{&(0x7f0000000180)="2e0000001d008103e00f80ecdb4cb9d90163190405000f00000d01fb12000100ac14141840d819a9060015000000", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 21:13:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0xd3, 0x0, 0x0, 0x3}, 0x10) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x12f}]) 21:13:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x1000000, &(0x7f0000000080)=[{&(0x7f0000000180)="2e0000001d008103e00f80ecdb4cb9d90163190405000f00000d01fb12000100ac14141840d819a9060015000000", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 21:13:27 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000480)={[{@dots='dots'}]}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 21:13:27 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e1) 21:13:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0xd3, 0x0, 0x0, 0x3}, 0x10) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x12f}]) 21:13:27 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80044506, &(0x7f0000002340)=""/203) 21:13:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x3}, @mpls={[], @ipv6=@generic={0x0, 0x6, "99987f", 0xf98, 0x88, 0x0, @remote, @private2, {[@srh], "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"}}}}, 0xfca) 21:13:27 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e1) 21:13:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0xd3, 0x0, 0x0, 0x3}, 0x10) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x12f}]) 21:13:27 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000480)={[{@dots='dots'}]}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 21:13:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x1000000, &(0x7f0000000080)=[{&(0x7f0000000180)="2e0000001d008103e00f80ecdb4cb9d90163190405000f00000d01fb12000100ac14141840d819a9060015000000", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 21:13:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r0, &(0x7f0000000180)={@void, @val={0x3}, @mpls={[], @ipv6=@generic={0x0, 0x6, "99987f", 0xf98, 0x88, 0x0, @remote, @private2, {[@srh], "d11f4da42fbb557935f9dc2f6959797437f6800bf8ec76341403993def32f5051df3b6909656bbb5a20c790b748c732abbb5c02a5a5bbdea832a37fe51853b2dbcbd73e187f8517936ef346e2f7408b2d1488c554c9aaa0feb058ae89fee4aef057e453768dd37af54c7cb8a58d39a5cc7c8fb16c6afc4b970accca711d4fb851402dc2459a47ac0e75402b82c5c514e0b8e33c0dfa5fad92fd8cda4ad7226fc123ab01a40f20de099fc887546c6ac9e6901fcb179e456c2c7f9d6a193118e07ebc10673fb3051eac94d8113f661fe0d43007146d004fe1ce2b27d69d9b8d269221ad850f9d46100561220165c40c0867c668a25e534f14523bff85ce125ff21e57f66e09c7c1691acefbb6d50e560c3da2c9564328b44e0f82a46956642e377e51ad2ab343d994e747a63d55da456e8aa783faec7dd2229cdd8cae83d652ca1be185f5970432562ea2bb3022dae959ce7a654240e64713936f8f3bc78951c12d382d81fba831010d094eb0159db63f9704d8eec31f3f5ed651f6d6d3a185d9e068136342b951c1ac29cce3268e7b18312239c03872fc1203c379ccd91bafcf04c629236946a25e1f8bf642a5b918bf77010a7bd6dc9690906daacdbef22d205416d151ae779dbf6d0ead0271659b4f1bf18e38e1ac009951436cf96222babc5e0f9e55fd62b26cec96b41997082693bfba2138dfa9c86400993d98273d2c24a8540edb0906d874a99c9aea45d38e25d51d576922ef96b0fd95fc3bfcd2afabfc98462baf21416829281a8e915cd6060b6ea2b4126dad9e202bfc8d79ff72fc5efdae41c2caad7ef94adfec3ecee8e0c1dfd25a58c746269e9839c9933713166bb344a83df63dda63212275c16f2095408548ed10b31b725146ad2db344fe081ed27de2542eda897f9de2ae2faae431953c7ac9090e880a044f99a20b8a3156d41860524fcd9a9f71070a5cc429a6ccd39d8b7dfd13f7a10e682a80418a6809175b6470f9aa578bed1d26405ae8a7e9acd3d83dcc9ab334ca39d91e2fc12dec9f39b3c3d339581f1e917effbf37379b65414b9c504d00556a69610ef0c967e7c76abbd5380087d1f3d910820481f702b4b81f26794e62f4e446f6a41b5eb3fce1e574972c380e4355c5b73ba21cb373ec03acb33bef130f9340feb82a1e737837b8f3a251588db30f523d52418607eab2c7900c9511df0fbae8c0ae0e9eb0f748c83dec221a2060f59a5f0ec7f93340b9351997d0f2443d6d078a88e9ef96aee6edb00c30fa47f2c9f783f2f808a388bf92cd5a50265167570c3c76747274f0131b2201cd3b64b6accf8fbc8ce4d40fd1395ab14886d13dff0032d1d615ead405012f77262e14f4aa5d28401e07c9ff0df04a279028f92dedd3e409f1d0c28851c0472ae72e6c5f5e972cffacaad95f1ed909fc46df5b6bd2886e581b5ef64c618e74b4e302ab2fd160bc06b80978eee8c1d692b1ce91184f9e96df8421b25b299619bd9e070dc00391596819a69dcffe701e66332cc15f86b2bf196e5cc911838a699a15ee4bff96475a95b040a2332258e1c35c29cc8e4c3cfa548f7daaa03ec192a9036d86889c45c306718cc48604a02150cbb8db1e06e1d64be177a52fe90f50b8b9125a6d5577962bd5bff5a21d99a1c269de98781eb684fdf27af4f2766dd480150d954aa236e87b455d5346cfe5657ad91361f34ed69912f39ffb4fc315e198a77651446f2185f43106ab2b594dee303a31a0664b477aeb951c1fd8c17bd29e566ab278bbd07213b4d61257b4cc8950296f2870aef8492889ee01bd778f2b49b9e16edc62dcd52271b22bc9d9ed0c61c8dab3b9980be10d911012903a4d42d03d095a7e3565eee1b82c1b6f2ef1c3e658414bd809dcaf792937932d09b243f19f8b3beff105b27e4095e83e52cf26b9e72633b66907565b5f1828799dee3e19d3d40bb0576ccefee686706f684de80bf766627adf92f9ee653589a66b79375d88c9fc20e3be2d786894fb913385b28c97dc11fdae542fc03a59282d6b014c032ae78197ca4c08d683fa55b7ba166a79a1f41d503372e4f719f654ac1efdd19794f984578d9de5610c26e0b474dcbdc28afbb3be5bf9ba6fe3d7a59219195a1f3a72346a6dcf4a72e43894cf6b8ed622b4b7c21974f846e68629c62572e6de569b8e15d5303eb4c60d5dedd2e6c23063c09b1f6deca5bebb485c8620caf964329feddf5e06c04c0f055b1f10808474d30936373842296fd0c28ab46d2f761cab14b4a09a6f26dc5c240296b1f603ae8ac0fae71e685f5dcdcd46e249ccd77409cc82561517151e0e64d807113b7470efe864fc4b5eee3c4310a8d199f581fb76130536660c28fb0394f2f5782689df6a7a5a2982e3a2d78bc521b67f1b9d2fc87ae3cbb84508e9d000ec9c5a864cd4a82ce775ddc4b4a098442e9a84895ccf6de7287ca995f6795673de8c694c405e9d4060178b4963e9c6d8b156c9b3c58576d4e5591935e215902fe979c33bcaebc3fdc2fa4310f2cd3cede93b1b2d401efb3059f274406d738c43e970961ae861b779fd8164abc941a85608ada0e8d86ae7ea21df7e8f62a9ffb1f387ef7eb939ae6430541aa581abd11b1533d09c5322db4dbbaef308c43d24a6d4d27939b8c6461a3d255f82a84f563a25b00e31214d687c3fd759fb4d81cf8ff900cc36c9394ce4704bee10f822af2e7768316e7e44bdf932e321b13ddff46f2c08009bb96853b75edd3042bba2244b38100f3a6a8b7ef5b63a1a9896112821bd50194e324716febeaa24bf9b5448f839563a38c466a88c28a7cd3a83a3972ec49e02d26158b6d459a34c3c9fe4de9bfd84e7d2739de7674c90fb4976dc426bc4428a5f76522d42f6d3076d55b24ff95816d4c477ce06bb7f5ab49f29c9412733a0f53187c9b0ef4daa25e735548d82a8859f93fc7ff6a0fe550f02912a5dcf46bd127da69ae5d3add02b6839d29dc76795a0f8c8d8642098aab1e9eff48019bfd49f6f6285d7831fc523eb5fbab35e7d0a4550180f51c43002658e376e5cb427f8a6c061951df39b9db40fa9f8ca2c0619dbb5aafbd92ab3de42ae6d07280a3d87e8c5e3515de4306b355b110e927f13992786b8648d0867e94c671f17c626d1fa1602e8f55c79ecc4a269e663ee6f14072ce0c24c13a944d3b149cd99b9110f5a81aeb9b45f1d787406ab76d6c430006e9384ddd77bcc1acfbf7537a389d19175ab71b1ee183180df74ae2102a17422435e178f3edd010ebf18005735b32c85a29d21992ffafe214d2f794fc21d7fc1c82a41f0f5b0e95bf7402c609bc85c0f01c1dfe289b066c879ae72fc68030f261070e8031d7fdb2cb7161d7dca0277412ac16bd49cc6371aebcba4b72cd27954cb01ef8e5db631758415815edbfeaccf03252dc1cf795f4594be3edfefc45551c8e17f3b598f3fd30a2d26a999bacdb3f59884ff5960198ede73d44a4e224d3e1e244be8be9f19932373f98845b577518cd2d04cfe7eba3db77be4b67541ebe6d03b475041618c4146bfeffbb5e3d77fd04de62a0f2083e522f4b96c7cc8208930b90ff367ad8200aa25348b6b35f04800fa5cfd219eca995b027b176beec1f190a005fd30e3ce6b9b681abf49246ed43b81906e962d9bbb336eb364a03dfc72bfeb519841ac23a5ee87b32cd6e0d20dc49a8baab7da0a8ca833e0114f27c5d0f6e4456dc9f10d07b3b3154f3ec3d751a06fe73a205076be24246bcfcdb35a8e25ff4939eb484591df8ae57e0844161a49fc99a93f4cf3dbab6b5ae5ec6ea7225ea711adb87077a454a74f692daf0b126446881a112d2d100e7257094761225364fe615d637a08b430c863c8da67d221dd8d96c1c031beeeb71ec3a44b94227196eceaef9eb2becc9345b353032979e48da09cec7e44fd29f55669e8c5e1f9f14b95f8e20339e45237d151b0948705b87206ac51514bddfd35f546431dea59897f97a2b17a2a06b3d5b21182ed92b0bc07a388fb49aad0931e055e7eadb83875f12c43ec723f726f6c7d3c4d2dc13d47046e9505e76f1497ac99fe89e116e140a15968631673e4ca4c1d6b839b10b93b8c789623860b81dc7c61d427f0b2f62abfc7ff2607315f25d6348ba182ea490d2b57986924e96992b148caa78b7805ee349bfd8f5a28a8eb2bd7dbe6ae387da8f43e89ab6e2f38e152c793b76c3cd52b834c599599fc59e4261bf0210bbeb24d14c0d2fe239a94f47fe57f80ab43bcad23bd0be477f1b73304487d9fa2e8533596c4aeba68ee08538ac2159327687b32c60cdbf66bae1807472bf003a383a5ef99d08542421cb8b2d60c2bafe2d1b513ecbdef5af06adf01613f8d8bf8853be66c5fd4a1303467ce2fca6886c4d97980e75ef3da6cd5fc2752fe010462752818b3d756531d0614955415d9b9055e4a7e000451fcb3796fceccd11559cfd16ef23afe5689f1e11d3fccb734d7725d0249db9265d71754672d3497112d4c5f8721bc40368553a2ec929489992bdf7f6cf8f88cefda05588f581a7475a1986d85da78b036a55954a5411f0bf91b0e7419648d399c539c6b26fca47816d27b438e759b6a8679f600ba8e1891ebbdd4664cd84c6dfabe36693c647f656377d4c16e06a9bd663b317bdd52ae5f2e5a0e4a1ab1dcb862672ad0926cfada2b4342327aef895e26fd1398ce1679ae254774c5d70addfb3df8cc5ac0f98b39d4f607b50392a1737faf8caf49961024e3c9101b06d2d3573f6353ef00fb03d32d6bb03ebe0731843b622f69fff17dccd6c6f65c7673aebcc9598cf1684c76a5d67e301b16bc74ac65a3489166a5c403143344296ade89edafc0b40894e2e1ee3a227a231919ed649dbf81e7e775229315bed584c5785e003cb8c4c602490fc0d6b6ed0cc661578d92d73929f02bf208fe56c879ae2723e1235d294e2ef16e8a8f943bc7afa5ed235d125f2e47a35e88901795716e3e4d8a809dbb553680b294336e982d63782fd4c72f97affbedbd3a1cfeffdaaf9292974cc063da66f93a7a35dc927bf30ee06653c09663c1e5249e819770175dfe3bd2e3b0e96d8cf43269df20f62712fbdbb0e95183514f40defaca8049c452275fad67f7a133e24dde9dc496a17340ad977201a8516c328bcd297644d43b7184040d7a97103761471d6dc07a4a9c4c005423ff1b6635b43e589255c94ff52ef37a63f7561e2792d7d5419f1cb8701fc72e5e8ee0051bc6b4bd5a750efbe3b3f078e14efa857e0f4a73339778340d9d895fa45349bee95b566ee979ec05378ac665b98a5640a8f8bd0d0762ce38276be9157a7b153e367deba8a361f1e13e018b3842fa6466c64b8c4a7fa5ec671c931a8e740fe43097e7cb0a5bb002edf5165bf51fbecc782708166222eba55c75b52852d94ca625192b760523954440abe070388cb9f03bbd50665d4b710cdb0e8ce968b25cd9c193eb95861e17b387430f5f59c66f2fcacfb5bea642629f41a7cafbe4c5e899737e96909cfce7c2d0bc252d5609e93c88f3c93d65f86cb8774f1b0ad22afa8e3fee5ddaf532b5354021a72a0b922ccb66372f3f782d985d7e5387c066fa13840557bdb2fcb91aaf27cf42e31e6dc1e2df0616ca97dac6254db9eae574a45"}}}}, 0xfca) 21:13:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0xd3, 0x0, 0x0, 0x3}, 0x10) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x12f}]) 21:13:27 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e1) 21:13:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0xd3, 0x0, 0x0, 0x3}, 0x10) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x12f}]) 21:13:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x6df}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)="24000000560007031dfffd946f610500070000000000000077000013421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:13:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0xd3, 0x0, 0x0, 0x3}, 0x10) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x12f}]) 21:13:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0xd3, 0x0, 0x0, 0x3}, 0x10) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x12f}]) 21:13:29 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000480)={[{@dots='dots'}]}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 21:13:29 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e24, 0x0, @loopback={0xff00000000000000}, 0x73}, 0x1c) r2 = dup2(r0, r1) openat$cgroup_type(r2, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42800) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={r4, 0x6, 0x0, 0xb5}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000002640)={r4, @in={{0x2, 0x4e23, @empty}}, 0x2bcccf5c, 0x7, 0xcac, 0x4, 0x1}, &(0x7f0000000600)=0x98) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000025000511d25a80648c63940d0424fc6004000e000a0003000200008037153e370a000c8000000000d1bd", 0x2e}], 0x1}, 0x0) 21:13:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x6df}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)="24000000560007031dfffd946f610500070000000000000077000013421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:13:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0xd3, 0x0, 0x0, 0x3}, 0x10) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x12f}]) 21:13:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0xd3, 0x0, 0x0, 0x3}, 0x10) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x12f}]) 21:13:29 executing program 3: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000480)={[{@dots='dots'}]}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) [ 98.707055][T10858] netlink: 'syz-executor.4': attribute type 12 has an invalid length. 21:13:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x6df}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)="24000000560007031dfffd946f610500070000000000000077000013421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:13:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303107004c494e55582020202020202020a7500a8ba9ec534b20202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c13a7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x0) open_by_handle_at(r0, &(0x7f0000000100)={0xc, 0x0, "10000000"}, 0x0) 21:13:29 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000080)="8962aa5fe7dc82a0f9a72d72707c28e207d7fe4a41e9788ee27a2e9b37", 0x1d, 0x8}, {&(0x7f0000000340)="3e671f080bb2fd05ea95c92abaee346aea034dc764737ede49033d5abdceea6b71083e8f1378f24d4f8e9c9ab957631bc7f4af97a3410e4a70de2bb087ce9877bbb82a02b173b1b7fe7c895f45e0c3d852432c473feb565898e0d2f10da99d5a47f9a506edca09978aa0dd6f76829b0c504a9a7f4bc5e7bcc433ef9826b254e5737673677c10690a777a9c8f0a903ec86b3109a39e1031e879b4e3df6e62215c1f9070737e3b660bd238cca5c6f9de041005e914e4afedeb8246ad202cdc9ee66dc63d4aebdd5a", 0xfffffffffffffd13, 0x4}]) 21:13:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303107004c494e55582020202020202020a7500a8ba9ec534b20202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c13a7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x0) open_by_handle_at(r0, &(0x7f0000000100)={0xc, 0x0, "10000000"}, 0x0) 21:13:29 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303107004c494e55582020202020202020a7500a8ba9ec534b20202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c13a7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x0) open_by_handle_at(r0, &(0x7f0000000100)={0xc, 0x0, "10000000"}, 0x0) 21:13:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x6df}, 0x10) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)="24000000560007031dfffd946f610500070000000000000077000013421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 21:13:30 executing program 5: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000480)={[{@dots='dots'}]}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 21:13:30 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e24, 0x0, @loopback={0xff00000000000000}, 0x73}, 0x1c) r2 = dup2(r0, r1) openat$cgroup_type(r2, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42800) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={r4, 0x6, 0x0, 0xb5}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000002640)={r4, @in={{0x2, 0x4e23, @empty}}, 0x2bcccf5c, 0x7, 0xcac, 0x4, 0x1}, &(0x7f0000000600)=0x98) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000025000511d25a80648c63940d0424fc6004000e000a0003000200008037153e370a000c8000000000d1bd", 0x2e}], 0x1}, 0x0) 21:13:30 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303107004c494e55582020202020202020a7500a8ba9ec534b20202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c13a7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x0) open_by_handle_at(r0, &(0x7f0000000100)={0xc, 0x0, "10000000"}, 0x0) 21:13:30 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303107004c494e55582020202020202020a7500a8ba9ec534b20202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000000000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c13a7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)='y\x105%\xfa,\x1f\x99\xa2\xc9\x8e\xcd\xfc\xfa\xf6\x12\x95^\xdfT\xe2=\x0e~F\xcds', 0x0) open_by_handle_at(r0, &(0x7f0000000100)={0xc, 0x0, "10000000"}, 0x0) 21:13:30 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000080)="8962aa5fe7dc82a0f9a72d72707c28e207d7fe4a41e9788ee27a2e9b37", 0x1d, 0x8}, {&(0x7f0000000340)="3e671f080bb2fd05ea95c92abaee346aea034dc764737ede49033d5abdceea6b71083e8f1378f24d4f8e9c9ab957631bc7f4af97a3410e4a70de2bb087ce9877bbb82a02b173b1b7fe7c895f45e0c3d852432c473feb565898e0d2f10da99d5a47f9a506edca09978aa0dd6f76829b0c504a9a7f4bc5e7bcc433ef9826b254e5737673677c10690a777a9c8f0a903ec86b3109a39e1031e879b4e3df6e62215c1f9070737e3b660bd238cca5c6f9de041005e914e4afedeb8246ad202cdc9ee66dc63d4aebdd5a", 0xfffffffffffffd13, 0x4}]) [ 99.905895][T10907] netlink: 'syz-executor.4': attribute type 12 has an invalid length. [ 100.269732][ T9114] ================================================================== [ 100.269778][ T9114] BUG: KCSAN: data-race in exit_signals / kthread_unpark [ 100.269781][ T9114] [ 100.269797][ T9114] write to 0xffff88810e7ac024 of 4 bytes by task 10910 on cpu 1: [ 100.269813][ T9114] exit_signals+0x135/0x4c0 [ 100.269826][ T9114] do_exit+0x17b/0x11e0 [ 100.269837][ T9114] kthread+0x1aa/0x230 [ 100.269850][ T9114] ret_from_fork+0x1f/0x30 [ 100.269852][ T9114] [ 100.269864][ T9114] read to 0xffff88810e7ac024 of 4 bytes by task 9114 on cpu 0: [ 100.269878][ T9114] kthread_unpark+0x1f/0xd0 [ 100.269894][ T9114] kthread_stop+0xd5/0x370 [ 100.269909][ T9114] __loop_clr_fd+0x39f/0x710 [ 100.269922][ T9114] lo_release+0x140/0x150 [ 100.269938][ T9114] __blkdev_put+0x29c/0x3e0 [ 100.269953][ T9114] blkdev_put+0x84/0x2b0 [ 100.269970][ T9114] kill_block_super+0x85/0xa0 [ 100.269986][ T9114] deactivate_locked_super+0x5d/0xb0 [ 100.270002][ T9114] deactivate_super+0xca/0xe0 [ 100.270017][ T9114] cleanup_mnt+0x27a/0x330 [ 100.270031][ T9114] __cleanup_mnt+0x1c/0x30 [ 100.270045][ T9114] task_work_run+0xba/0x120 [ 100.270063][ T9114] exit_to_usermode_loop+0x2ae/0x2c0 [ 100.270078][ T9114] do_syscall_64+0x38b/0x3b0 [ 100.270092][ T9114] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 100.270094][ T9114] [ 100.270098][ T9114] Reported by Kernel Concurrency Sanitizer on: [ 100.270116][ T9114] CPU: 0 PID: 9114 Comm: syz-executor.2 Not tainted 5.7.0-rc1-syzkaller #0 [ 100.270126][ T9114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.270132][ T9114] ================================================================== [ 100.270140][ T9114] Kernel panic - not syncing: panic_on_warn set ... [ 100.270157][ T9114] CPU: 0 PID: 9114 Comm: syz-executor.2 Not tainted 5.7.0-rc1-syzkaller #0 [ 100.270166][ T9114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.270170][ T9114] Call Trace: [ 100.270191][ T9114] dump_stack+0x11d/0x187 [ 100.270209][ T9114] panic+0x210/0x640 [ 100.270227][ T9114] ? vprintk_func+0x89/0x13a [ 100.270242][ T9114] kcsan_report.cold+0xc/0x1a [ 100.270264][ T9114] kcsan_setup_watchpoint+0x3fb/0x440 [ 100.270281][ T9114] kthread_unpark+0x1f/0xd0 [ 100.270296][ T9114] kthread_stop+0xd5/0x370 [ 100.270314][ T9114] __loop_clr_fd+0x39f/0x710 [ 100.270333][ T9114] lo_release+0x140/0x150 [ 100.270350][ T9114] ? __loop_clr_fd+0x710/0x710 [ 100.270366][ T9114] __blkdev_put+0x29c/0x3e0 [ 100.270390][ T9114] ? constant_test_bit+0xd/0x30 [ 100.270410][ T9114] blkdev_put+0x84/0x2b0 [ 100.270430][ T9114] kill_block_super+0x85/0xa0 [ 100.270447][ T9114] deactivate_locked_super+0x5d/0xb0 [ 100.270466][ T9114] deactivate_super+0xca/0xe0 [ 100.270484][ T9114] cleanup_mnt+0x27a/0x330 [ 100.270504][ T9114] __cleanup_mnt+0x1c/0x30 [ 100.270518][ T9114] task_work_run+0xba/0x120 [ 100.270542][ T9114] exit_to_usermode_loop+0x2ae/0x2c0 [ 100.270566][ T9114] do_syscall_64+0x38b/0x3b0 [ 100.270587][ T9114] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 100.270598][ T9114] RIP: 0033:0x45f497 [ 100.270620][ T9114] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 8f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 100.270629][ T9114] RSP: 002b:00007ffd1fba1d78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 100.270642][ T9114] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045f497 [ 100.270650][ T9114] RDX: 00000000004031d8 RSI: 0000000000000002 RDI: 00007ffd1fba1e20 [ 100.270665][ T9114] RBP: 000000000000004b R08: 0000000000000000 R09: 000000000000000a [ 100.270675][ T9114] R10: 0000000000000005 R11: 0000000000000246 R12: 00007ffd1fba2eb0 [ 100.270686][ T9114] R13: 0000000001ec3940 R14: 0000000000000000 R15: 00007ffd1fba2eb0 [ 100.272223][ T9114] Kernel Offset: disabled [ 100.637331][ T9114] Rebooting in 86400 seconds..