[ 33.548619] kauditd_printk_skb: 9 callbacks suppressed [ 33.548626] audit: type=1800 audit(1585627785.566:33): pid=7143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 33.575714] audit: type=1800 audit(1585627785.576:34): pid=7143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 36.573519] random: sshd: uninitialized urandom read (32 bytes read) [ 36.818062] audit: type=1400 audit(1585627788.836:35): avc: denied { map } for pid=7316 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 36.865190] random: sshd: uninitialized urandom read (32 bytes read) [ 37.720624] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.246' (ECDSA) to the list of known hosts. [ 43.262645] random: sshd: uninitialized urandom read (32 bytes read) 2020/03/31 04:09:55 fuzzer started [ 43.484960] audit: type=1400 audit(1585627795.506:36): avc: denied { map } for pid=7325 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 44.128244] random: cc1: uninitialized urandom read (8 bytes read) 2020/03/31 04:09:56 dialing manager at 10.128.0.105:38919 2020/03/31 04:09:57 syscalls: 2937 2020/03/31 04:09:57 code coverage: enabled 2020/03/31 04:09:57 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2020/03/31 04:09:57 extra coverage: extra coverage is not supported by the kernel 2020/03/31 04:09:57 setuid sandbox: enabled 2020/03/31 04:09:57 namespace sandbox: enabled 2020/03/31 04:09:57 Android sandbox: /sys/fs/selinux/policy does not exist 2020/03/31 04:09:57 fault injection: enabled 2020/03/31 04:09:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/31 04:09:57 net packet injection: enabled 2020/03/31 04:09:57 net device setup: enabled 2020/03/31 04:09:57 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/31 04:09:57 devlink PCI setup: PCI device 0000:00:10.0 is not available [ 45.923761] random: crng init done 04:13:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000dc0)=ANY=[@ANYBLOB="61128c000000000061138c0000000000bf2000000000000015000000080000002d0301000000000095000000000000006916000000000000bf67000000000000350600000fff07006706000002000000070300000ee60060bf050000000000004f650000000000006507f9ff01000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000000000000032ed3c5be9525db67754bb12feffffff8ecf264e0f84f9f17d3c30e3c7bdd2d17f2f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703d6c4f6f3be4b369289aa6812b8e007e733a9a4f16d0a3e1282ee45a010fb94fe9de56c9d8a814261cb2e73b8f775bdb94a0b438083c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5af65727546e7c955cfa1f6ab689fde4de4e63ede20271a51445dc8da39e5b0ab70100010000000000d04acd6002d4519af619e3cca4d69e0dee5eb106774a8f3e6916df85aaf34c4756ad3a6d75ec88158f0200000000c8fb735fd552bdc206004aeb0743eb2dc819b6cf5c8ac86d8a297dff0445a13d0045fb3cda32a673a6bb55d8c85f21dce431e56723888fb126a163f16fb2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67a993716dbf580469f0f53acbb40b401e3738270b315d362ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000000000bc00f674629709e7e78f4ddc211bc3ebf0bd9d42ca019dd5d022cf74686e9fbe2562671cd47840a7afaab43176e65ec1118d46d1e827f3472f4445d253887a5ad103649afa17690884f8d2001e03a651bb96589a7eab04871bc47287cd313f00000000000000407d000000000000000000000000005f37d83f84e98a523d80bd0d0d703f37ca363f601ae899a53f6715a0a62a34b0c94cce699452050000000000000026a0f6a5480a55c22fe394ac000000000000000000000000000000437d57defb79ea6a58bc3eeed729a2f95e1d6a1fc3857ff51b1e3ee01522041f5205c82f05e340ce4ede5d24dec65179c633c8dbd749a9376e3321815d08dfaf0c029f04e9faba51ba8c2930331dbd66e586e1edaefd6da3e85c722520a471dff4339cec1c8e34684ed8b98a55cc44db6962b329ecce17f603fccdd825e644beb662c2679fa96077af737c174add5484d64ffb5ece27a435b5160880567266c69e32cab404592869e65826d6da4ee1f22f9e9e7fb06b87d48195981c95b9c29a2f25e73ebfc1a45a08d90f861b522302726a"], &(0x7f0000000100)='GPL\x00'}, 0x48) ppoll(0x0, 0x0, 0x0, 0x0, 0x1ffc3c0000000000) 04:13:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100002800270e00"/20, @ANYRES32, @ANYBLOB="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"], 0x1ec}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 04:13:19 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'syzkaller1\x00', 0x1}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:13:19 executing program 1: syz_emit_ethernet(0xa2, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa81001500080040ae00900064000040219078ac14142dac1414bb070c320f424aba2b1d5d523851088a20000000818632000000030510fc59d34756cc2fa7317eaac0e2f5020a4c3ec75e137d5d420712cc2dedb66487f4ffc1e769fac3ee8f75440f42a185ffffff0000000407179c001632f86f00000000000000ffffffff000000000000050000004e220451907828cbed0c062362f8000000"], &(0x7f00000001c0)) 04:13:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001500add427323b470945b45608067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac71008000000ffffffffffffffffffe7ee0000280d0000000002000000f0", 0x58}], 0x1) 04:13:19 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)=ANY=[@ANYBLOB="090000000000000000300000aa219d5207"]) [ 247.697024] audit: type=1400 audit(1585627999.716:37): avc: denied { map } for pid=7325 comm="syz-fuzzer" path="/root/syzkaller-shm825616749" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 247.754013] audit: type=1400 audit(1585627999.736:38): avc: denied { map } for pid=7344 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=3053 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 248.121085] IPVS: ftp: loaded support on port[0] = 21 [ 248.901420] IPVS: ftp: loaded support on port[0] = 21 [ 248.938093] chnl_net:caif_netlink_parms(): no params data found [ 248.993109] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.999756] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.007595] device bridge_slave_0 entered promiscuous mode [ 249.017499] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.023984] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.031222] device bridge_slave_1 entered promiscuous mode [ 249.056175] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 249.067610] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.089951] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.097371] team0: Port device team_slave_0 added [ 249.106152] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.113392] team0: Port device team_slave_1 added [ 249.125329] IPVS: ftp: loaded support on port[0] = 21 [ 249.138278] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 249.144622] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.169852] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 249.181971] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 249.188215] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 249.214151] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 249.229782] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 249.239338] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 249.292196] device hsr_slave_0 entered promiscuous mode [ 249.350330] device hsr_slave_1 entered promiscuous mode [ 249.449899] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 249.470823] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 249.487623] chnl_net:caif_netlink_parms(): no params data found [ 249.519081] IPVS: ftp: loaded support on port[0] = 21 [ 249.630214] chnl_net:caif_netlink_parms(): no params data found [ 249.693148] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.699559] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.707149] device bridge_slave_0 entered promiscuous mode [ 249.718898] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.725569] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.732645] device bridge_slave_1 entered promiscuous mode [ 249.745828] audit: type=1400 audit(1585628001.766:39): avc: denied { create } for pid=7350 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 249.760118] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 249.779470] IPVS: ftp: loaded support on port[0] = 21 [ 249.796528] audit: type=1400 audit(1585628001.766:40): avc: denied { write } for pid=7350 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 249.797188] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 249.822257] audit: type=1400 audit(1585628001.806:41): avc: denied { read } for pid=7350 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 249.839933] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.858133] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.865042] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.871419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.904114] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 249.912637] team0: Port device team_slave_0 added [ 249.918719] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 249.926218] team0: Port device team_slave_1 added [ 249.985112] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.992197] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.999132] device bridge_slave_0 entered promiscuous mode [ 250.009756] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 250.016177] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 250.041459] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 250.057056] IPVS: ftp: loaded support on port[0] = 21 [ 250.063117] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.070787] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.079795] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.086329] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.093940] device bridge_slave_1 entered promiscuous mode [ 250.121946] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 250.128195] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 250.154197] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 250.165130] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 250.178634] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.237680] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 250.247187] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 250.293070] device hsr_slave_0 entered promiscuous mode [ 250.340315] device hsr_slave_1 entered promiscuous mode [ 250.380410] chnl_net:caif_netlink_parms(): no params data found [ 250.389402] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 250.416202] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 250.423484] team0: Port device team_slave_0 added [ 250.433816] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 250.441323] team0: Port device team_slave_1 added [ 250.446487] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 250.517235] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 250.523878] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 250.550812] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 250.566423] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.590229] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 250.596488] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 250.622832] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 250.635173] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 250.661773] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 250.669717] chnl_net:caif_netlink_parms(): no params data found [ 250.680254] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 250.688301] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 250.722089] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.729621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.739142] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 250.745688] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.863982] device hsr_slave_0 entered promiscuous mode [ 250.900424] device hsr_slave_1 entered promiscuous mode [ 250.947488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 250.963228] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 250.975502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.983353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.991472] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.997820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.009148] chnl_net:caif_netlink_parms(): no params data found [ 251.027747] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 251.043418] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 251.061475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 251.069186] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.077005] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.083381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.124229] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 251.149185] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.156146] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.163278] device bridge_slave_0 entered promiscuous mode [ 251.169525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 251.200790] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.207209] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.215308] device bridge_slave_1 entered promiscuous mode [ 251.234968] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.247937] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.256829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 251.285908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 251.308206] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 251.323061] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 251.330702] team0: Port device team_slave_0 added [ 251.337643] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 251.345531] team0: Port device team_slave_1 added [ 251.353694] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.360361] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.367398] device bridge_slave_0 entered promiscuous mode [ 251.374114] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.382433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.392547] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 251.402716] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 251.434258] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.440887] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.447946] device bridge_slave_1 entered promiscuous mode [ 251.454656] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.463277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.471290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.481341] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 251.489885] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 251.510964] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 251.517214] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 251.543993] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 251.560375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.567883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.576454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.583905] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.594825] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 251.601540] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.617008] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.623469] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.624360] device bridge_slave_0 entered promiscuous mode [ 251.637340] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.643806] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.651192] device bridge_slave_1 entered promiscuous mode [ 251.657769] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 251.664220] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 251.689793] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 251.706056] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 251.728200] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 251.737278] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.776329] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.804618] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 251.812968] team0: Port device team_slave_0 added [ 251.852495] device hsr_slave_0 entered promiscuous mode [ 251.890323] device hsr_slave_1 entered promiscuous mode [ 251.951008] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 251.958342] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 251.968797] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.979342] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.987986] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 251.996956] team0: Port device team_slave_1 added [ 252.023087] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 252.042587] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 252.048842] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 252.075902] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 252.107251] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 252.116964] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 252.123640] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 252.149267] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 252.160899] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 252.168566] team0: Port device team_slave_0 added [ 252.179785] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 252.186822] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 252.195272] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 252.206953] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 252.214681] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 252.222091] team0: Port device team_slave_1 added [ 252.242804] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.249056] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 252.297280] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 252.303671] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 252.329076] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 252.340773] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 252.347012] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 252.372328] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 252.391054] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.408551] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 252.416073] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 252.424062] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 252.472740] device hsr_slave_0 entered promiscuous mode [ 252.511060] device hsr_slave_1 entered promiscuous mode [ 252.552560] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 252.565435] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 252.573284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.592225] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 252.608385] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 252.618813] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.673814] device hsr_slave_0 entered promiscuous mode [ 252.710406] device hsr_slave_1 entered promiscuous mode [ 252.752499] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 252.760309] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 252.776266] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 252.784648] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 252.806696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 252.814798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.822962] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.829319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.836629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 252.847470] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 252.860854] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 252.876265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 252.885544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.895032] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.901413] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.908553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 252.927641] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 252.936560] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 252.961574] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 252.971042] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 252.983479] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 253.001076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.008737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.017204] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.025165] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 253.035763] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 253.047054] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 253.071743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.079573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 253.087431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 253.095329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 253.103722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 253.111644] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.122260] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 253.133041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 253.141017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 253.158160] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.180622] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 253.186647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 253.221399] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 253.236571] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 253.243890] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 253.251317] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 253.277376] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 253.293971] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 253.307588] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 253.324777] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 253.331255] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.338526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.346341] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 253.354268] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 253.364042] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 253.370473] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.377466] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 253.387160] device veth0_vlan entered promiscuous mode [ 253.400618] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.410909] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 253.418217] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.427431] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.434839] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.446317] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 253.463488] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 253.474900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.482892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.492039] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.498366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.507709] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 253.519240] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 253.528329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.535861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 253.543495] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 253.553372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 253.563455] device veth1_vlan entered promiscuous mode [ 253.569404] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 253.577357] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 253.585418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.593881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.601742] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.608073] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.625257] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 253.631998] 8021q: adding VLAN 0 to HW filter on device team0 [ 253.639726] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 253.654918] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 253.663733] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 253.677852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 253.686047] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 253.694298] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.702269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 253.710679] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 253.718480] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.724901] bridge0: port 1(bridge_slave_0) entered forwarding state [ 253.732416] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 253.743541] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 253.755692] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 253.764742] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 253.781414] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 253.794386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 253.802328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 253.810918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.818646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 253.826749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 253.835326] bridge0: port 2(bridge_slave_1) entered blocking state [ 253.841761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 253.857019] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 253.865571] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 253.882781] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 253.894652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 253.903154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 253.912615] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 253.923803] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 253.938239] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 253.959634] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 253.973792] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 253.981219] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 253.988892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 253.997874] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.005463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.013121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.023358] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 254.033939] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.043706] device veth0_macvtap entered promiscuous mode [ 254.049964] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 254.059962] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 254.067746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 254.076298] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 254.084596] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 254.094738] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 254.104315] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 254.113118] device veth1_macvtap entered promiscuous mode [ 254.119230] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 254.126793] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 254.134034] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 254.141904] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 254.152423] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.159633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 254.168687] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 254.176532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.184480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.194219] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.202180] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 254.213048] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 254.224449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 254.232999] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 254.241293] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 254.249084] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 254.257274] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.266383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.274014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 254.281542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 254.289970] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 254.298551] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 254.307103] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 254.313415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.322519] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.331744] device veth0_vlan entered promiscuous mode [ 254.343353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 254.352850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.360223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.376112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.386891] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 254.397597] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 254.408946] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 254.418899] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 254.425105] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.434047] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 254.441789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 254.449344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 254.457416] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 254.465757] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 254.474439] device veth1_vlan entered promiscuous mode [ 254.481559] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 254.491783] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 254.499882] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 254.508999] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 254.518713] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 254.527763] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 254.535496] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 254.544523] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 254.552482] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.561104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 254.569511] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.576401] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.584203] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 254.592270] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 254.598292] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 254.616048] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.626866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.635568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.643714] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.650136] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.661097] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 254.673652] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 254.686426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.695512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 254.707381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 254.716533] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 254.728218] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 254.734581] 8021q: adding VLAN 0 to HW filter on device team0 [ 254.745923] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 254.753811] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 254.766178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 254.775734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 254.783891] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.790640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 254.797587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.805929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.816934] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 254.829081] device veth0_macvtap entered promiscuous mode [ 254.836436] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 254.848228] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 254.855636] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 254.863148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 254.873438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 254.881493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 254.889120] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.895655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 254.902849] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 254.910565] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 254.918653] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 254.935532] device veth1_macvtap entered promiscuous mode [ 254.942419] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 254.948858] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 254.956480] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 254.963344] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 254.970792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 254.983206] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 254.991662] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 255.002724] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 255.014763] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 255.028402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 255.037496] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 255.049494] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.056683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.064048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 255.071718] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.079256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 255.087024] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.094749] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 255.104456] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 255.114506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 255.132362] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 255.149262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 255.157947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 255.169914] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 255.177940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 255.189520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 255.199829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 255.209773] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 255.219831] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 255.231276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 255.238829] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 255.256890] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 255.265472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 255.273466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 255.282918] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 255.293863] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.304261] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 255.311611] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 255.321170] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 255.344701] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.357326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.405988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 255.413910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 255.422768] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 255.428817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 255.438944] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 255.460565] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 255.467502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 255.479770] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 255.496684] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.507397] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.518810] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 255.525861] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 255.535866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 255.543294] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 255.552869] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 255.559773] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 255.567340] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 255.575060] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.583800] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.593748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 255.601870] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 255.615201] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 255.624286] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 255.634920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 255.647534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 04:13:27 executing program 5: socket$packet(0x11, 0x2, 0x300) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) syz_open_dev$vivid(0x0, 0x2, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) [ 255.661074] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 255.667174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 255.678408] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 255.686259] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 255.696435] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 255.705103] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 255.717327] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.729732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 255.741723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.749262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 255.767501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 255.786232] device veth0_vlan entered promiscuous mode [ 255.797840] 8021q: adding VLAN 0 to HW filter on device batadv0 04:13:27 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000180)={0x0, 0x6, 0x0, 0xffffffffffffffff, 0x0, 0x0}) [ 255.818712] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.826790] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.849093] device veth1_vlan entered promiscuous mode [ 255.862365] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready 04:13:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x402c5839, &(0x7f0000000580)={0x0, 0x0, 0x5}) [ 255.873040] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 255.907975] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 255.945330] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 255.956618] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 255.966448] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 255.975273] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 255.982602] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 255.992300] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 256.007029] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 256.015452] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 256.022578] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 256.033200] 8021q: adding VLAN 0 to HW filter on device batadv0 04:13:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$FS_IOC_FIEMAP(r0, 0x401c5820, &(0x7f0000000580)={0x0, 0x0, 0x5}) [ 256.045092] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 256.060637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 256.069026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 256.084977] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 256.101465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 256.108894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.124655] device veth0_macvtap entered promiscuous mode [ 256.131791] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 256.139210] device veth0_vlan entered promiscuous mode [ 256.154817] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 256.164219] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.181251] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.190578] device veth1_macvtap entered promiscuous mode 04:13:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000003, 0x10, r0, 0x30edb000) openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, 0x0) [ 256.201674] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 256.213179] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 256.227584] device veth1_vlan entered promiscuous mode [ 256.237322] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 256.270760] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 256.282345] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.299107] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.308586] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.319114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.332590] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 256.344235] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 256.354476] audit: type=1400 audit(1585628008.376:42): avc: denied { map } for pid=7564 comm="syz-executor.5" path="/dev/dsp" dev="devtmpfs" ino=15881 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 [ 256.380361] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 256.388385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 256.397484] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 256.405812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 256.423793] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.438229] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.448718] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 256.459358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.477333] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 256.486334] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 256.494636] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 256.505006] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 256.514811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 256.536666] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 256.547588] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 256.556403] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 256.566711] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 256.579601] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 256.586703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 256.595643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 256.604006] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 256.611936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 256.619927] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 256.627651] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 256.638084] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 256.649795] device veth0_vlan entered promiscuous mode [ 256.658794] device veth0_macvtap entered promiscuous mode [ 256.665756] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 256.675606] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 256.688525] device veth1_vlan entered promiscuous mode [ 256.697454] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 256.704892] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 256.714557] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 256.722275] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 256.730776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 256.747674] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 256.755691] device veth1_macvtap entered promiscuous mode [ 256.763766] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 256.779343] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 256.791060] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 256.805204] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 256.813165] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 256.821016] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 256.828340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 256.836681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 256.845910] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 256.855870] device veth0_macvtap entered promiscuous mode [ 256.863699] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 256.876090] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.890484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.899613] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.910681] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.919841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 256.929582] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 256.940345] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 256.947469] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 256.965157] device veth1_macvtap entered promiscuous mode [ 256.972318] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 256.981614] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 256.988853] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.000657] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 257.008720] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.019753] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.029756] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.040434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.050871] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.060131] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.070258] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.080576] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 257.087551] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 257.099472] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 257.107413] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 257.115566] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 257.123364] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 257.133010] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 257.142115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 257.163479] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 257.176781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 257.186876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.197857] device veth0_vlan entered promiscuous mode [ 257.205483] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 257.216851] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.224891] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.238569] device veth1_vlan entered promiscuous mode [ 257.244887] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 257.252774] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.262734] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.272778] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.282546] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.293068] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.303021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.312170] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.321935] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.334192] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 257.341586] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 257.352096] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready 04:13:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x7ffff000) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 257.387053] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 257.396223] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 257.427966] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 257.444313] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.466286] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 04:13:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x17, 0x0, 0x0) [ 257.476309] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.494033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.508127] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.521157] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.531673] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.541033] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.550937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.564142] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 257.571875] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 257.593837] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 257.605847] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 257.614402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 257.644422] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 257.662559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.676180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 257.687145] device veth0_macvtap entered promiscuous mode [ 257.694414] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 257.713460] device veth1_macvtap entered promiscuous mode [ 257.719831] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 257.731749] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 257.743301] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 257.762136] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.772713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.782498] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.792778] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.802219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.812263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.821693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.832029] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.841916] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 257.851826] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.862658] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 257.870598] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 257.881551] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 257.888875] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.896840] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 257.905336] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.916277] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.927418] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.936693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.946561] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.955736] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.965853] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.975057] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 257.984839] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 257.994664] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 258.005817] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 258.015917] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 258.022998] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 258.032804] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 258.041108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 04:13:31 executing program 0: openat$rfkill(0xffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 04:13:31 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000219", 0x7}], 0x1) 04:13:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000003, 0x4012, r0, 0x30edb000) openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) socket(0x10, 0x800000000080002, 0x10) poll(&(0x7f0000000040)=[{}, {}, {}, {}, {}], 0x5, 0x2e) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000000)={0x0, 0x5}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) dup2(r1, r0) creat(0x0, 0x0) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000000)=@v3, 0x18, 0x0) 04:13:31 executing program 2: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000708f07a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000034c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0x8, 0xfff1}}, [@filter_kind_options=@f_u32={{0x8, 0x1, 'u32\x00'}, {0x18, 0x2, [@TCA_U32_SEL={0x14}]}}]}, 0x44}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x4924924924926d3, 0x0) 04:13:31 executing program 4: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x2, r1}) ioctl$TIOCL_SELLOADLUT(0xffffffffffffffff, 0x541c, &(0x7f0000000140)) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 04:13:31 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480), 0x232, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 04:13:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)={0x0, 0xc020660b, 0x5}) 04:13:31 executing program 5: 04:13:31 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) chdir(&(0x7f0000000240)='./file0\x00') [ 259.440028] hrtimer: interrupt took 27106 ns 04:13:31 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0x2}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000580)={0xffffffff000, 0x9}) 04:13:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) 04:13:31 executing program 2: 04:13:31 executing program 1: [ 259.618421] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.625570] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.687593] device bridge0 entered promiscuous mode [ 259.730008] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.5'. [ 259.744428] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.751125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.758513] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.765241] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.787050] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 259.798294] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.799152] syz-executor.5 (7739) used greatest stack depth: 24144 bytes left [ 259.804851] bridge0: port 1(bridge_slave_0) entered disabled state 04:13:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000003, 0x4012, r0, 0x30edb000) openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, 0x0) socket(0x10, 0x800000000080002, 0x10) poll(&(0x7f0000000040)=[{}, {}, {}, {}, {}], 0x5, 0x2e) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000000)={0x0, 0x5}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) dup2(r1, r0) creat(0x0, 0x0) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000000)=@v3, 0x18, 0x0) 04:13:31 executing program 2: 04:13:32 executing program 4: 04:13:32 executing program 0: 04:13:32 executing program 1: 04:13:32 executing program 5: 04:13:32 executing program 2: 04:13:32 executing program 4: 04:13:32 executing program 5: 04:13:32 executing program 0: 04:13:32 executing program 2: 04:13:32 executing program 1: mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x401c5820, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) chdir(&(0x7f0000000240)='./file0\x00') 04:13:32 executing program 3: 04:13:32 executing program 4: 04:13:32 executing program 0: 04:13:32 executing program 5: 04:13:32 executing program 1: mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x401c5820, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) chdir(&(0x7f0000000240)='./file0\x00') 04:13:32 executing program 2: 04:13:32 executing program 4: 04:13:32 executing program 5: 04:13:32 executing program 2: 04:13:32 executing program 1: mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x401c5820, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) chdir(&(0x7f0000000240)='./file0\x00') 04:13:32 executing program 3: 04:13:32 executing program 0: 04:13:32 executing program 4: 04:13:32 executing program 2: 04:13:32 executing program 5: 04:13:32 executing program 4: 04:13:32 executing program 1: mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x401c5820, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) chdir(&(0x7f0000000240)='./file0\x00') 04:13:32 executing program 0: 04:13:32 executing program 3: 04:13:32 executing program 4: 04:13:32 executing program 2: 04:13:32 executing program 3: 04:13:32 executing program 5: 04:13:32 executing program 0: 04:13:32 executing program 1: mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x401c5820, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:32 executing program 4: 04:13:32 executing program 3: 04:13:33 executing program 0: 04:13:33 executing program 3: 04:13:33 executing program 5: 04:13:33 executing program 2: 04:13:33 executing program 4: 04:13:33 executing program 1: mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x401c5820, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:33 executing program 5: 04:13:33 executing program 0: 04:13:33 executing program 3: 04:13:33 executing program 2: 04:13:33 executing program 4: 04:13:33 executing program 2: 04:13:33 executing program 0: 04:13:33 executing program 4: 04:13:33 executing program 1: mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:33 executing program 3: 04:13:33 executing program 5: 04:13:33 executing program 2: 04:13:33 executing program 3: 04:13:33 executing program 4: 04:13:33 executing program 1: mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:33 executing program 5: 04:13:33 executing program 0: 04:13:33 executing program 4: 04:13:33 executing program 3: 04:13:33 executing program 1: mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) writev(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:33 executing program 2: 04:13:33 executing program 5: 04:13:33 executing program 3: 04:13:33 executing program 4: 04:13:33 executing program 0: 04:13:33 executing program 3: 04:13:33 executing program 1: mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) writev(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:33 executing program 5: 04:13:33 executing program 5: 04:13:33 executing program 2: 04:13:33 executing program 4: 04:13:33 executing program 0: 04:13:33 executing program 1: mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) writev(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:33 executing program 3: 04:13:33 executing program 2: 04:13:33 executing program 4: 04:13:33 executing program 0: 04:13:33 executing program 5: 04:13:33 executing program 3: 04:13:33 executing program 2: 04:13:33 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:33 executing program 4: 04:13:33 executing program 0: 04:13:33 executing program 3: 04:13:33 executing program 2: 04:13:33 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:33 executing program 0: 04:13:33 executing program 4: 04:13:33 executing program 5: 04:13:33 executing program 3: 04:13:34 executing program 0: 04:13:34 executing program 2: 04:13:34 executing program 4: 04:13:34 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:34 executing program 5: 04:13:34 executing program 3: 04:13:34 executing program 2: 04:13:34 executing program 0: 04:13:34 executing program 5: 04:13:34 executing program 4: 04:13:34 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:34 executing program 3: 04:13:34 executing program 2: 04:13:34 executing program 0: 04:13:34 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x428, 0x260, 0x268, 0x0, 0x0, 0x268, 0x358, 0x460, 0x460, 0x358, 0x460, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x220, 0x260, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'hsr0\x00', {0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x9}}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00'}}}, {{@ipv6={@remote, @mcast2, [], [], 'wg2\x00', 'team0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x488) 04:13:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) dup3(r1, r0, 0x0) 04:13:34 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) 04:13:34 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f0080a1fffffff00004000631177fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) 04:13:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x47f) connect$inet(r0, &(0x7f0000000180), 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) shutdown(r0, 0x1) 04:13:34 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:34 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 04:13:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004105) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x0) 04:13:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3e8, 0x98, 0x280, 0x150, 0x1e8, 0x0, 0x350, 0x350, 0x350, 0x350, 0x350, 0x6, 0x0, {[{{@ip={@multicast2, @rand_addr, 0x0, 0x0, 'netdevsim0\x00', 'lo\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00'}}, {{@ip={@dev, @rand_addr, 0x0, 0x0, 'geneve1\x00', 'veth0\x00'}, 0x0, 0x70, 0xb8}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@multicast2, 'veth0\x00'}}}, {{@ip={@dev, @dev, 0x0, 0x0, 'veth1_to_bond\x00', 'nr0\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@local, @multicast1, 0x0, 0x0, 'veth0_to_hsr\x00', 'ip_vti0\x00'}, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) 04:13:34 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) [ 262.513263] x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 04:13:34 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) [ 262.584314] xt_HMARK: hash modulus can't be zero 04:13:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)={0x14, r2, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 04:13:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 04:13:34 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) 04:13:34 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000007961e62273faa6884c44825cc4f142133d4a1cac53819fda7ffe332b0d27517495db22c369fc01b191533df23e4a10cbd4dfb403d82acd600312817f2b17e678d15e020912aa8ef860dd81ea21f886dc0154419e857178e246297048629c6326bfe8f81c360dd7c9efafb9ff34fedbb2ca4d35f6b5f65e8894425d22dce799b0a5d65dee16bffed85ac530e49bbe2cc6e0745503aa6c636e4b0d78e3d530d91e8213cc3f3aa07295e86df0557be41f4f982eb553b1b9e36d77174f29c57c0db60076f5ab323325dbfa90e0edab3ddb5ed8fa984bb0fcb52ad14988f58de2ec276e5d9d9464ede6deb474604da29f1b7d924c96d8c04e5ff44ca849a436284bc99d4b03487b4c221a26c27228aea193cb831124187765d3c1b162bd4e64b2ca92c22afa1ecff1edecd4de1e8d2c88b2b03ad75e3774a70363ad121331b0988b9fa3fd3bdd1f48369863e3c2bc37067a1fe90d7cc733eb753fc3fbe8fa03ed9c061732486e68b39e02a63cbff4af35dd8a17dd33dfa196911b654e60fa881a77b295a8ed9374cb784e9afcfd308951b6f00b359d41bfe024aa9e037891216b4c02291f042c51c1e3291195615f13acdbe142541ba3ba10abca64f1cb9d9c819422bf2cf04699902d8e19a9ba1afc6edc2e615a527698f2f84fec03800c18f1731575893bafb7acbe7c3eb1ae1576f0e7e88e57dc1c3f7639768e84dda015f8fa1ecfba22ade43e667d8cc897bec4921aa032f4285a7b6ccf4b17ce6e26b345f1cbc0b16312ec7fc71724fcde39982c720fbad55be728acdc4acb8ce24c6fc3bf21e7f2f9c1916f77d6db064ab7ba34debf9fd2d0dd40b341afc6a1be00d1910c024351e926f30153cadfbeb9110ff0696fde63973c0a1d85e37c34d1842d50af6e53ec269554a76541422120010000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030700009e40f008061fffffe100004000638477fbac14143fe0004301c699da153f08a0e6e380f60106f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) 04:13:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x6c00) dup3(r1, r0, 0x0) 04:13:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000180), 0xff7e) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) [ 262.813516] x_tables: ip6_tables: TCPMSS target: only valid for protocol 6 04:13:34 executing program 4: write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xffffff88, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) 04:13:34 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(0xffffffffffffffff, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) [ 262.883277] serio: Serial port pts0 04:13:34 executing program 5: r0 = epoll_create1(0x0) r1 = socket(0x11, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000280)) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000080)) [ 262.957302] serio: Serial port pts0 04:13:35 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000800)='/dev/nullb0\x00', 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x49eb, 0x0) read$FUSE(r0, 0x0, 0x0) 04:13:35 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, 0x0, 0x0) 04:13:35 executing program 3: socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000001580), 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x1, 0x0, 0x2) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) pread64(r0, 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1da) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 04:13:35 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, 0x0, 0x0) 04:13:35 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x18000000000002e0, 0xe80, 0x0, &(0x7f0000000280)="b95b03b700030700009e40f086dd1fffffe100004000638477fbac14143fe0004301c699da153f08a0e6e380f6010af683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) 04:13:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) setitimer(0x0, &(0x7f0000000300)={{0x0, 0x2710}, {0x0, r2/1000+10000}}, 0x0) 04:13:35 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getgid() r1 = epoll_create1(0x0) r2 = socket(0x1, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) sendmsg$IPSET_CMD_TYPE(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0xd, 0x6, 0x0, 0x0, 0x0, {0xc, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x80c0) socket$inet6(0xa, 0x3, 0x180000000000000a) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c9, &(0x7f0000000100)) 04:13:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 04:13:35 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, 0x0, 0x0) 04:13:35 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) write$evdev(r0, &(0x7f0000000040), 0xfd18) 04:13:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="8c", 0x1) r2 = accept$alg(r1, 0x0, 0x0) sendto(r2, &(0x7f0000000280)="fccb0bca67bfc159bff3845ae5b6d85e139ed1bbe15c40f949c029d36aad3ab7a865d7c0da08e3a9ebb09126d1653ab480889fa1b47de514136ca7d5f1e0499c7dfa10d27b5bdbc20d407306afbfbcb4713bad806e2f61460f3e213c07475c833300035e1ecd594ff2bbb3b6d5f17ee882115e71ebe341e1f4d6f8328e0bb8115e447cc1b23fad1f30cfa76ee5e8fb22e818c78e9b06b415fd497871b8fa6ef7dc91c31ec498", 0xffffffffffffffd4, 0x20000800, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) 04:13:35 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400), 0x0) [ 263.343455] IPVS: ftp: loaded support on port[0] = 21 [ 263.348751] audit: type=1400 audit(1585628015.366:43): avc: denied { sys_admin } for pid=8068 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 04:13:35 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400), 0x0) 04:13:35 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400), 0x0) 04:13:36 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{0x0}], 0x1) 04:13:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{}], 0x1) 04:13:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000004540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@restrict={0x0, 0x2, 0x0, 0x6, 0x1}, @struct={0x2600, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000004600)=""/200, 0x3e, 0xc8, 0x8}, 0x20) 04:13:36 executing program 3: socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000001580), 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x800, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) set_mempolicy(0x1, 0x0, 0x2) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) pread64(r0, 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1da) clone(0x4412c500, 0x0, 0x0, 0x0, 0x0) 04:13:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) [ 264.271499] IPVS: ftp: loaded support on port[0] = 21 04:13:37 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0xc3631, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffbfffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x81, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 04:13:37 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{0x0}], 0x1) 04:13:37 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x60000000, 0x0}}], 0x210, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000480)='asymmetric\x00', &(0x7f00000001c0)=@builtin='builtin_trusted\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) 04:13:38 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xfffffffffffffe7f, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001fffffff00004000632977fbac14140ee934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010108038da1924425181aa5", 0x0, 0x100, 0x60000000, 0x0, 0xfffffffffffffe09}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 04:13:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) 04:13:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x6e, 0x6e, &(0x7f0000000280)="b9ff030084000d698cb89e499df6a4784636b19d00de0500000377fb7f11c72be9400000000000000000988103279122db2461f6f5b86ecd3ca00f90e09d2f86db9cc4c65a47a617e746257260cb58287e08b002a0ba9444f217b3ff01000093092ff962b60f0cd5eadbfb0e8ed9776e86a97ac72f9eefec6ba70b1c14b30f8d2df172d6cc6ff919", 0x0, 0x100, 0x0, 0x3b3, 0xfffffffffffffda8, &(0x7f0000000640)="97e365fe4fcb298113c04ace07adda8f1b6b81cc1c292ce1acd402575cfc25b425cadff5e19b9f78aabdbd1290c3979fd034847ec519a0aa9dd5d8f697e79ba02f529fb6246e5d6f236432cf849803466563fcb08e47f7c2390a0721e2641e2a5c2330c1daae9e364243755c05acba456a844a8c3a82fc16bdc7789d83f1af4872fc5cc0a8c8d4f0101022569cded0a684d08cf58a76cd04e46435a9523649cc3296da6b8adaa3cb044444910dbe9370"}, 0x28) 04:13:38 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{0x0}], 0x1) 04:13:38 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe900, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x3a00010, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x7c774aac) socket$inet6_tcp(0xa, 0x1, 0x0) 04:13:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x60000000, 0x0}}], 0x210, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000480)='asymmetric\x00', &(0x7f00000001c0)=@builtin='builtin_trusted\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) 04:13:38 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0], 0x12}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x120}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 04:13:38 executing program 3: sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00012dbd70ff4c2fef250500000008000280040004"], 0x3}}, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xc, 0x121041) write$evdev(r0, &(0x7f0000000040), 0x373) 04:13:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) 04:13:39 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") 04:13:39 executing program 3: r0 = socket(0x400000000000010, 0x802, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x0) 04:13:39 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)}], 0x1) 04:13:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x60000000, 0x0}}], 0x210, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000480)='asymmetric\x00', &(0x7f00000001c0)=@builtin='builtin_trusted\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) 04:13:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x4000000000, 0x2, &(0x7f0000002280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c00fec9000000000100000001000000000700000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x400}, {&(0x7f0000000140)="fcba5820c3ef1b77e8a23dd18b16961616356dd7fdeb89769b12def3b6cfd1ab4505524f78c1aa2bf4de120e650f04d278edd8006ad9f89c8b6d8ed96e63d878ff15074525d84e21090fcf500adea45e5683baf409b890f14dec72b7819a765b1f523b740006fa097ad63376050c8f865b5ffbd88b998d1665f951439c15e32429223f310ee8e4d1652b156fd2a1b1c7deec970e41e7a4", 0x97, 0x6}], 0x4801, 0x0) 04:13:39 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)}], 0x1) 04:13:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="25bcc574769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e7ff9f5400d7dcc6760253ef", 0x3a, 0x400}], 0x0, 0x0) 04:13:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file1\x00', 0x0, 0x1, &(0x7f00000009c0)=[{&(0x7f0000000b40)="10de07ffc665e5626b6d7647bb9b5ea3e74e0eedf1cccafa6cd226eef3cc068f35aec15182531a33b218da4d8bf4f6e40f3cb362536f48bbae2f5594960eca2ef96adf4a03a8c028e118146f090d904cb29deb5718731460d2083aeac1512887ba20dc2a6685e5f54895e8c1a2c306e507b2ca7e6f9a2e4deab8b8759c8d0edc43", 0x81}], 0x0, &(0x7f0000000bc0)=ANY=[]) 04:13:39 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)}], 0x1) [ 267.515917] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 267.539710] EXT4-fs (loop3): Can't read superblock on 2nd try 04:13:39 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004", 0x4}], 0x1) 04:13:39 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr=0x8001}}, 0x1c) 04:13:39 executing program 3: connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) ppoll(0x0, 0x0, 0x0, 0x0, 0x1ffc3c0000000000) 04:13:39 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) dup3(r1, r0, 0x0) 04:13:39 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004", 0x4}], 0x1) 04:13:39 executing program 3: r0 = gettid() r1 = getpid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) kcmp(r0, r1, 0x0, r2, r3) [ 268.041985] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 268.056869] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 268.066234] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 268.080277] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 268.094241] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 04:13:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x60000000, 0x0}}], 0x210, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000480)='asymmetric\x00', &(0x7f00000001c0)=@builtin='builtin_trusted\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setuid(0x0) statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) 04:13:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e0c010040d5ae7d0202ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x600}, 0x80) 04:13:40 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004", 0x4}], 0x1) 04:13:40 executing program 0: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet_udp(0x2, 0x2, 0x0) inotify_init() pipe(&(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 04:13:40 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x0, 0x0, "b04a83706694a7d154c629f75b71a95a8f3b289271c607adb22d4d414f70cb7b1291b1150d4d3aa20d7beebc689ab001521f48dc57042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d756bd900300000000000000a482ebf7a08c305bee6fd6"}) 04:13:40 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') sendfile(r0, r1, 0x0, 0xedc1) 04:13:40 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="040000040003", 0x6}], 0x1) 04:13:40 executing program 0: r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB='G'], 0x1) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0, 0x0) r2 = fanotify_init(0x200, 0x0) fanotify_mark(r2, 0x1, 0x4800003e, r1, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x8080fffffffe) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0xc080661a, 0x0) [ 268.216790] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.223569] bridge0: port 1(bridge_slave_0) entered disabled state 04:13:40 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="040000040003", 0x6}], 0x1) 04:13:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="25bcc574769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e7ff9f5400d7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000280)={[{@nouser_xattr='nouser_xattr'}]}) [ 268.286631] device bridge0 entered promiscuous mode [ 268.306464] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 04:13:40 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="040000040003", 0x6}], 0x1) 04:13:40 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\vem1\xc1\xf8\xa6\xc1\a\xae/\x81\x8dN&\ad\x9aJ\xc0\xa3w\xe2\xcb\xa2\xba\xe5\xf4\xe13\xfd\x9f\'\xf2\x99\"\x1e\xa6[\x0e\x97t\xd4\x86\xe4\xa8\xcf\xb8\x86\x8b&\x9d\xcf\xa1\xab\xaf\xf5z\xa7?\rpjv\x05m\xfd\x89MbRz?\ft\xd2!\xe8k\xc4sc\x18b\xb6\xfc\xbe\x8b\x86F\xfdT{M\xd5\x03Y\x90tM\xa1-Q\x97$\x1b\xd7T\xf79\x06+\x06E\"\x19\x90\xba\xaf\x05\x10\x156\xa8\x9a\x99\xbd\x1a\x99\'\xe5l\xc5{7\rca|\x7f`\xb88*\xcf;\x13\x98\xab[\t\xc3p\x9c\n\xb7h\xdaN\xb6\xb1\x9f\x87SC\xe4:\xb4(H\x8f\x18/\xbe* \x02\xc9\xe9V\x0fF\x12\x0e\x8b\xb8\xcf\x00\x83\xcb!0\b\xd3d\xb3_\xc2\xf8\f\xa6A`\xdf)\x91(\x9a\xac\x12\xc7\xb7\x11\xa9S\xd2aX\xa4\xed\xa2\x7f\xf2#\x9f\x19s\x96\xa8\xec2\xdb\xf1KH4\xa9\xb9\x90\xe4\xad\x05\x8dE\xae\xb9w\xdd\x95\f\x9b\xef\xc4*', 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) [ 268.339474] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.345947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.352787] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.359221] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.425848] EXT4-fs (loop5): Mount option "nouser_xattr" will be removed by 3.5 [ 268.425848] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 268.425848] [ 268.466985] audit: type=1400 audit(1585628020.486:44): avc: denied { map } for pid=8275 comm="syz-executor.3" path=2F6D656D66643A0B656D31C1F8A6C107AE2F818D4E2607649A4AC0A377E2CBA2BAE5F4E133FD9F27F299221EA65B0E9774D486E4A8CFB8868B269DCFA1ABAFF57AA73F0D706A76056DFD894D62527A3F0C74D221E86BC473631862B6FCBE8B8646FD547B4DD5035990744DA12D5197241BD754F739062B0645221990BAAF05101536A89A99BD1A9927E56CC57B370D63617C7F60B8382ACF3B1398AB5B09C3709C0AB768DA4EB6B19F875343E43AB428488F182FBE2A2002C9E9560F46120E8BB8CF202864656C6574656429 dev="tmpfs" ino=31354 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 268.472083] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 268.539531] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 268.563452] EXT4-fs (loop5): Can't read superblock on 2nd try [ 268.638729] EXT4-fs (loop5): Mount option "nouser_xattr" will be removed by 3.5 [ 268.638729] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 268.638729] [ 268.674976] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 268.695504] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.702066] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.716313] EXT4-fs (loop5): Can't read superblock on 2nd try 04:13:41 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x43) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bsg\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x200000201, 0x0, 0x4c8], 0x0, 0x40210}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0x8001}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 04:13:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1000060, 0x0}}], 0xc6, 0x24000000) 04:13:41 executing program 3: socket(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f32f00fb30f0f309a0900000065002ed8ddc74424008f6dc4bd8787442402c43a727fc7442406000000000f35f30f090f013a360f06c4c18d72d683b9070200000f32ed", 0xbfc7713255079c2d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000002f000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, 0x0}], 0x1, 0x8, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 04:13:41 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={0xffffffffffffffff, r0}, 0x14) 04:13:41 executing program 5: open(&(0x7f0000002000)='./bus\x00', 0x60602, 0x71) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) syz_open_procfs(0x0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) lchown(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8001) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xdf52, 0x728df552}) [ 269.122369] audit: type=1804 audit(1585628021.146:45): pid=8298 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir268906169/syzkaller.niIjyg/39/bus" dev="sda1" ino=16639 res=1 [ 269.169831] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 04:13:41 executing program 0: r0 = semget(0x0, 0x0, 0x0) shmctl$SHM_UNLOCK(r0, 0xc) [ 269.263613] kvm: pic: level sensitive irq not supported [ 269.291378] audit: type=1804 audit(1585628021.176:46): pid=8298 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir268906169/syzkaller.niIjyg/39/bus" dev="sda1" ino=16639 res=1 04:13:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001840)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x0, 0x0, 0x0) 04:13:41 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x1100082) memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, "f8ca781d5f7e93115c52fa936f014904ccdb29372829d175a4e80426585243b3926d887f686449fdd786f718d8343d49d4273cc82ed2a2ef63524fc21d710476", "92ef27daf4634f9065ecbc04c983083f390c3d7bf9ac5c11d0b60f5d070e9826557914da15563be035c7fb302fe546973e9c78070000000700", "f1a55947f83b5a8a1bd0d7e25a30c2c9d78038891de2ae1c3c5b7be4da2a17da"}) 04:13:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'syz_tun\x00', 0x2000000000000001}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'syz_tun\x00'}) [ 269.444594] kvm: pic: non byte read 04:13:41 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPG(r0, 0xc01812f4, &(0x7f0000000240)={0x0, 0x4, 0x0, &(0x7f0000000800)}) [ 269.493300] kvm: pic: single mode not supported 04:13:41 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x925, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) 04:13:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_open_pts(0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0xae03, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 04:13:41 executing program 5: syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000200)="25bcc574769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e7ff9f5400d7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)={[{@noquota='noquota'}]}) 04:13:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f00000003c0)="35a5716ac85c48cbd9562d870b5696cd25abea4076e7df28e83226371a12cb48161ff14dbcba71dc9134b4e391f605b6a04cc252fb60e80f75489dbd87d1e33affe79e547061436aa96452d8ce6ba543478c0e3e129434ab60e5fce277ce761a3ea94615a94dda0fb49b6018015244ddc01ced2aa49e0fedcc86514a90e182aa2772e828993680b8c059a59542b34502ccdbdbada858205f550f147fff", 0x9d, 0x4040, &(0x7f0000000140)=@isdn={0x22, 0x80, 0x20, 0x43, 0x2}, 0x80) unshare(0x2a000400) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) 04:13:41 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) [ 269.493309] kvm: pic: level sensitive irq not supported [ 269.697864] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 269.755449] EXT4-fs (loop5): Can't read superblock on 2nd try [ 269.824085] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 269.838001] EXT4-fs (loop5): Can't read superblock on 2nd try 04:13:41 executing program 4: 04:13:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32=r3, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=@ipv4_newaddr={0x34, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r3}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xffffffff}}, @IFA_LOCAL={0x8, 0x2, @local}]}, 0x34}, 0x1, 0xf0ffffff}, 0x0) 04:13:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$FS_IOC_FIEMAP(r0, 0x402c5829, &(0x7f0000000580)={0x0, 0x0, 0x5}) 04:13:41 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) r1 = creat(0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, 0x0) 04:13:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$FS_IOC_FIEMAP(r0, 0x402c5829, &(0x7f0000000580)={0x0, 0x9, 0x5}) 04:13:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000140), 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0xfffffffffffffffd, 0x15e) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="2967138b9678c0247dfef930a34eccbb17b55a0bda82294982a16bb414427c01ecd35428550000000000000005a95b9dc1ed3c1cf579fa9d01000004a04442df99f0a7e8b2623506a8c8251a69158200000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a300745f0500", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffe0}, {}, {0xfff1}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x4}}]}, 0x34}}, 0x0) 04:13:41 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x925, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) 04:13:42 executing program 2: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x80002, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) 04:13:42 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001400)=[{&(0x7f00000001c0)="04000004000319", 0x7}], 0x1) r1 = creat(0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, 0x0) [ 269.971556] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=8369 comm=syz-executor.0 04:13:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f00000003c0)="35a5716ac85c48cbd9562d870b5696cd25abea4076e7df28e83226371a12cb48161ff14dbcba71dc9134b4e391f605b6a04cc252fb60e80f75489dbd87d1e33affe79e547061436aa96452d8ce6ba543478c0e3e129434ab60e5fce277ce761a3ea94615a94dda0fb49b6018015244ddc01ced2aa49e0fedcc86514a90e182aa2772e828993680b8c059a59542b34502ccdbdbada858205f550f14", 0x9b, 0x4040, &(0x7f0000000140)=@isdn={0x22, 0x80, 0x20, 0x43, 0x2}, 0x80) unshare(0x2a000400) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) 04:13:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x5, &(0x7f0000000140)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000100)=[{}, {}], &(0x7f0000000200)={0x0, 0x1c9c380}) 04:13:42 executing program 1: open(&(0x7f0000002000)='./bus\x00', 0x60602, 0x71) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) syz_open_procfs(0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_int(r2, 0x0, 0x12, &(0x7f0000000080), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) lchown(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) getpid() sendfile(r0, r3, 0x0, 0x8001) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000140)={'#! ', './bus', [{0x20, '%'}, {0x20, '('}, {0x20, 'vboxnet1{em1vboxnet0eth1self-&$cgroup'}, {}], 0xa, "87ba683cfc24f306ac52927011f851b402ae1e3e6643909c1626727b883794f56339d178d7bbcde455b48c6e5a0fb61fc2bbd176e71fe7fcb2934bfc2ebcb94546ff49962cd2c98bcc506f3cef143f3a731fa2dd4d3b3a078e2b279a0aeb77ede4fe452262e8356d18e25a1f1d52907b8339bea2beed602703cbf8c3b83b30ca5e328bf9b8defa7ba8da5db885c7c1d0f3bddc4d079bbf8290d2b6ae03acbd447807829bd5359f1d32c2b2bd67962a3601c88e76f46931882f22c3bb1961996955c67f2f5df71f28bf76373891610f72416f2ad65aaf25bce53c775e7e4139f4a362060cfda6eef4200c86493abd61350c6b"}, 0x126) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xdf52, 0x728df552}) 04:13:42 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000140)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000100)="660f382b1a0f01df0f300f32d9e90f79d16665676426f7c5000000000f22fd4545ef1e03e5", 0x25}], 0x1, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1f}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0xfffffffffffffffe], 0x10000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 270.215474] audit: type=1804 audit(1585628022.236:47): pid=8406 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir015158934/syzkaller.mkZNLm/48/bus" dev="sda1" ino=16621 res=1 [ 270.276380] audit: type=1804 audit(1585628022.276:48): pid=8410 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir015158934/syzkaller.mkZNLm/48/bus" dev="sda1" ino=16621 res=1 04:13:42 executing program 2: setitimer(0x1, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x80002, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) 04:13:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x4000000000042) creat(0x0, 0x0) close(0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) sendmsg$RDMA_NLDEV_CMD_DELLINK(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$SEG6(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 04:13:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d20202020202020202020202020202020202020202020202020202000200000000000004f0200000000024f000000000000000000000000000000000000000000000000000000000000000001000001010000010008", 0x82, 0x8000}, {&(0x7f0000000280)="e5a5c14d7a964273446754cde612e2abbe48aa379f5c03", 0x17, 0x3}], 0x0, 0x0) open(0x0, 0x141042, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setgid(0x0) sync() socket$inet_udplite(0x2, 0x2, 0x88) setgid(0x0) mount$overlay(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='overlay\x00', 0x14c010, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setgid(0x0) lsetxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 04:13:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, &(0x7f00000003c0)="35a5716ac85c48cbd9562d870b5696cd25abea4076e7df28e83226371a12cb48161ff14dbcba71dc9134b4e391f605b6a04cc252fb60e80f75489dbd87d1e33affe79e547061436aa96452d8ce6ba543478c0e3e129434ab60e5fce277ce761a3ea94615a94dda0fb49b6018015244ddc01ced2aa49e0fedcc86514a90e182aa2772e828993680b8c059a59542b34502ccdbdbada858205f550f14", 0x9b, 0x4040, &(0x7f0000000140)=@isdn={0x22, 0x80, 0x20, 0x43, 0x2}, 0x80) unshare(0x2a000400) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) 04:13:42 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x252a, 0x925, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) 04:13:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="0307000000000000000401070f00040001800e8d47d74034eb0cbaff1ed9e116fb9da063b0ef86d61004976df4a0beaa162e0fc775adfe1d85fdb6990eab561cc84763b4ecea044efc34b6eec9da935369790ef9fce6bf784fb200"], 0x18}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 04:13:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = timerfd_create(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x0, 0x4000}}) [ 270.557686] kvm [8422]: vcpu0, guest rIP: 0x108 disabled perfctr wrmsr: 0xc2 data 0x0 04:13:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x4000000000000002, &(0x7f0000000280)=0x5, 0x4) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x44e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20040218, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 270.709703] kvm [8422]: vcpu0, guest rIP: 0x108 disabled perfctr wrmsr: 0xc2 data 0x0 04:13:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x3b, 0x0, 0x32, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1068, 0x40}, [{}]}, 0x78) 04:13:42 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)) 04:13:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000140), 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="2967138b9678c0247dfef930a34eccbb17b55a0bda82294982a16bb414427c01ecd35428550000000000000005a95b9dc1ed3c1cf579fa9d01000004a04442df99f0a7e8b2623506a8c8251a69158200000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a300745f0500", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffe0}, {}, {0xfff1}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x4}}]}, 0x34}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) [ 270.778657] kvm [8422]: vcpu0, guest rIP: 0x108 disabled perfctr wrmsr: 0xc1 data 0x0 04:13:43 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000140)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x1) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000100)="660f382b1a0f01df0f300f32d9e90f79d16665676426f7c5000000000f22fd4545ef1e03e5", 0x25}], 0x1, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x1f}, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb, 0x0, 0x0, 0xfffffffffffffffe], 0x10000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 04:13:43 executing program 5: mremap(&(0x7f000029a000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000016b000/0x3000)=nil) mlockall(0x1) ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 04:13:43 executing program 1: fchdir(0xffffffffffffffff) open(&(0x7f0000002000)='./bus\x00', 0x60602, 0x71) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x2, 0x7ffc, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score_adj\x00') getgid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000080)=ANY=[], 0x0) fcntl$setstatus(r1, 0x4, 0x44900) lchown(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8001) openat$autofs(0xffffffffffffff9c, 0x0, 0x1c1200, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xdf52, 0x728df552}) 04:13:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\x16(O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\xafa\xacg\xd0\xbf\xf4\x9b7\xa9>\xfb\x88\xf5\xb5\xb6`\x14{X:d\xc3c3\xd7)p*{F\x02\x0eI9\xce9b\x7f\n\xc0\xca\xc8\xe2\xb8\xf5\xbdL\xc6\x9f\xfd\x13\xa6\xe4\x8aEM\xa7OY)\xee\xad\'\xf2S\v\x90\xf6\xdc\x96\x01\xd3\xe85a\\t\x8f\x89\x16\xc9O', 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fsetxattr$system_posix_acl(r2, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000340)={{}, {}, [], {}, [{}, {}, {}, {}, {}, {}, {}, {}]}, 0x64, 0x0) 04:13:43 executing program 2: perf_event_open(&(0x7f000025c000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newlink={0x48, 0x10, 0x401, 0x0, 0x25dfdbfe, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_TTL={0x5}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x48}}, 0x0) 04:13:43 executing program 3: tkill(0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000380), 0x24, 0x0) 04:13:43 executing program 3: [ 271.110938] audit: type=1804 audit(1585628023.126:49): pid=8495 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir015158934/syzkaller.mkZNLm/50/bus" dev="sda1" ino=16662 res=1 04:13:43 executing program 0: 04:13:43 executing program 2: 04:13:43 executing program 3: r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f00000001c0)=0x1000, 0x4) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DEL_KEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, 0x0, 0x80) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000680)=ANY=[@ANYBLOB="02000000", @ANYRES16, @ANYBLOB="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"], 0x3}}, 0x80) open(0x0, 0x0, 0x0) creat(0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="9b275cb1a717d628075fdc209c76fc0b02a38a132781ababe7620023ba78a63f7304828a151abf6c757f70f508b4c6a28bb95f1985ac7582f2831007b628acd905f94798f78bb17a48a4b79adea13a272bb36dad80f1ae72809a1da37281838a208142dd2041db7b8760b4b8d0f41f195ae1", 0x72, 0xffffffffffffffff) keyctl$get_security(0x11, r1, 0x0, 0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040), 0x0, 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0xe8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) setsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f00000000c0)="59639f78abd654d6d1bbc019323b9b1fc2740270441ed14097e1a08d32b26642de66d64fa0baa06198f16b25b7d071dd011cd5c3f93f77e2d5e73404edce8607c3bf3c700370c6582a9aab61e84a3a9920acf48a2cd065da1d44d1bb56fbc515a2aa3b1e3be52595946f4f6dfc91dea7a4093b96d5a46e59f8ed02aa07530d2634f9ae4deeb51672", 0x88) [ 271.165010] kvm [8485]: vcpu0, guest rIP: 0x108 disabled perfctr wrmsr: 0xc2 data 0x0 04:13:43 executing program 0: 04:13:43 executing program 2: [ 271.277608] audit: type=1804 audit(1585628023.206:50): pid=8506 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir015158934/syzkaller.mkZNLm/50/bus" dev="sda1" ino=16662 res=1 [ 271.279689] kvm [8485]: vcpu0, guest rIP: 0x108 disabled perfctr wrmsr: 0xc2 data 0x0 [ 271.497259] kvm [8485]: vcpu0, guest rIP: 0x108 disabled perfctr wrmsr: 0xc1 data 0x0 04:13:43 executing program 4: 04:13:43 executing program 5: 04:13:43 executing program 3: 04:13:43 executing program 0: 04:13:43 executing program 2: 04:13:43 executing program 1: 04:13:43 executing program 4: 04:13:43 executing program 5: 04:13:43 executing program 1: 04:13:43 executing program 4: 04:13:43 executing program 2: 04:13:43 executing program 5: 04:13:43 executing program 3: 04:13:43 executing program 0: 04:13:43 executing program 1: 04:13:43 executing program 5: 04:13:43 executing program 2: 04:13:43 executing program 3: 04:13:43 executing program 0: 04:13:43 executing program 4: 04:13:43 executing program 1: 04:13:43 executing program 5: 04:13:43 executing program 3: 04:13:43 executing program 2: 04:13:44 executing program 0: 04:13:44 executing program 4: 04:13:44 executing program 5: 04:13:44 executing program 3: 04:13:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000140), 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0xfffffffffffffffd, 0x15e) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="2967138b9678c0247dfef930a34eccbb17b55a0bda82294982a16bb414427c01ecd35428550000000000000005a95b9dc1ed3c1cf579fa9d01000004a04442df99f0a7e8b2623506a8c8251a69158200000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a300745f0500", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=@newtfilter={0x47c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffe0}, {}, {0xfff1}}, [@filter_kind_options=@f_route={{0xa, 0x1, 'route\x00'}, {0x44c, 0x2, [@TCA_ROUTE4_ACT={0x448, 0x6, [@m_police={0x424, 0x0, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x410, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x63, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x40, 0x40000000, 0x3ff, 0x0, 0x6, 0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, 0x0, 0xf11, 0x3, 0x0, 0x2, 0x0, 0x4, 0xb69b, 0x1, 0x3694, 0x1fc0000, 0x3, 0x0, 0x0, 0x1f, 0x0, 0x151, 0x5b6, 0x9, 0x10001, 0x84, 0x5, 0x6, 0x0, 0x7f, 0x4, 0x1000000, 0x200, 0x2b0, 0xffffffff, 0x400, 0x4, 0x81, 0x6, 0x0, 0x9, 0x0, 0x100, 0x0, 0xcd3dc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xffff5679, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x2, 0x0, 0x1, 0x9, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x1c6, 0x2, 0x0, 0x2, 0x4, 0x0, 0x6e, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8001, 0x0, 0x0, 0x83, 0x0, 0x3, 0x0, 0x0, 0x9, 0x20000000, 0x0, 0x6, 0x200, 0x0, 0x79, 0x5, 0xed16, 0x0, 0x7, 0x0, 0x0, 0x8, 0x9, 0x0, 0x0, 0x5, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x2, 0x0, 0x3, 0x0, 0x40, 0x9, 0x3, 0x0, 0x0, 0xfffffe01, 0x0, 0x6, 0x58000000, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x12, 0x31f, 0x0, 0x100, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0xe08f, 0x0, 0x7, 0x800, 0x6, 0x0, 0x0, 0x10001, 0x3, 0xa8, 0x0, 0x40, 0x3de42c2f, 0x0, 0x4, 0x0, 0x1, 0x2, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x4, 0x0, 0x484, 0x2, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xd4f, 0x0, 0x8001, 0x0, 0x0, 0x800, 0x8000, 0x0, 0x0, 0x0, 0xfdfc, 0xff, 0x7, 0x0, 0x6, 0x0, 0x1, 0x0, 0x5, 0x0, 0x80, 0x0, 0x2bfe, 0x0, 0x0, 0x4, 0x2fc1, 0x6, 0x6, 0x0, 0x0, 0x0, 0x1cfe936, 0x0, 0x0, 0x4, 0x80000000, 0x0, 0x400, 0xfffffff8, 0x0, 0x0, 0x4, 0x5]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0xfa98}]]}, {0x4}}}, @m_mpls={0x20, 0x0, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_PROTO={0x6}]}, {0x4}}}]}]}}]}, 0x47c}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) 04:13:44 executing program 1: 04:13:44 executing program 0: 04:13:44 executing program 4: 04:13:44 executing program 3: 04:13:44 executing program 4: 04:13:44 executing program 0: 04:13:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_open_pts(0xffffffffffffffff, 0x0) creat(0x0, 0x0) write$char_usb(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) 04:13:44 executing program 5: 04:13:44 executing program 4: 04:13:44 executing program 5: 04:13:44 executing program 3: 04:13:44 executing program 2: 04:13:44 executing program 0: 04:13:44 executing program 4: 04:13:44 executing program 5: 04:13:44 executing program 1: 04:13:44 executing program 3: 04:13:44 executing program 1: 04:13:44 executing program 0: 04:13:44 executing program 5: 04:13:44 executing program 4: 04:13:44 executing program 3: 04:13:44 executing program 2: 04:13:44 executing program 0: 04:13:44 executing program 3: 04:13:44 executing program 1: 04:13:44 executing program 5: 04:13:44 executing program 4: 04:13:44 executing program 2: 04:13:44 executing program 0: 04:13:44 executing program 1: 04:13:44 executing program 3: 04:13:44 executing program 4: 04:13:44 executing program 5: 04:13:44 executing program 2: 04:13:44 executing program 0: 04:13:44 executing program 1: 04:13:44 executing program 3: 04:13:44 executing program 4: 04:13:44 executing program 2: 04:13:44 executing program 5: 04:13:44 executing program 3: 04:13:44 executing program 0: 04:13:44 executing program 1: 04:13:44 executing program 4: 04:13:45 executing program 5: 04:13:45 executing program 2: 04:13:45 executing program 3: 04:13:45 executing program 1: 04:13:45 executing program 4: 04:13:45 executing program 0: 04:13:45 executing program 3: 04:13:45 executing program 2: 04:13:45 executing program 5: 04:13:45 executing program 1: 04:13:45 executing program 4: 04:13:45 executing program 0: 04:13:45 executing program 3: 04:13:45 executing program 5: 04:13:45 executing program 1: 04:13:45 executing program 2: 04:13:45 executing program 4: 04:13:45 executing program 1: 04:13:45 executing program 0: 04:13:45 executing program 3: 04:13:45 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000000), 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000180)="16", 0x1}], 0x1, 0x401081806) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) uselib(0x0) 04:13:45 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/timer_list\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/121, 0x79}], 0x1, 0x0) 04:13:45 executing program 5: sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="7000000000011905030100000800000022000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f00000152b0c20b3acaebcf3e6df10de3e41b3143f7f17636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f0000000000000000000000000000003f000248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d78643b56ba6be4f7771b9666d5e7891e1c66fb9176438ae530e527800000000000000cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) 04:13:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000000), 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000180)="16", 0x1}], 0x1, 0x401081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) socket(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xfffffffffffffe80) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x181000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) uselib(0x0) 04:13:45 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000080)='./file0\x00') mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1001, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') open(0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 04:13:45 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x10, 0x3e8, 0x0, 0x0, 0x0, "", ["", ""]}, 0x10}}, 0x0) [ 273.398118] audit: type=1400 audit(1585628025.416:51): avc: denied { create } for pid=8708 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 04:13:45 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) vmsplice(r1, &(0x7f0000000580)=[{&(0x7f0000001a00)="98", 0x1}], 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="66696c74657200000000000000000100000000000000000000000000000000000e00000004000000580200000000000000000000000000002c01000000000000c4010000c4010000c4010000c4010000c40100000400000000000000ac1e000100000000000000000000000076657468305f746f5f626f6e640000006772657461703000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700094000000000000000000000000040000004000000000240052454a45435400000000000000000000000000004969e6c8000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028004d41524b0000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000e7ffffff000000000000000000000000ef0000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000001000000000000000014000000000028005345540000000000000000000000000000000002000000000000000000010000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000940000be625cc919ed5292b9000000000000000000002400000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) pipe(0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:13:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x1a, 0x0, 0x0, "b04a83706694a7d154c629f75b71a95a8f3b289271c607adb22d4d414f70cb761291b1150d4d3aa20d7beebc689ab001521f48dc57042f1b38e9e8af694c0d43", "d66ee4ffff000000000000bd900300000000000000a482ebf7a08c305bee6fd6"}) [ 273.438311] BUG: sleeping function called from invalid context at arch/x86/mm/fault.c:1363 [ 273.481202] in_atomic(): 0, irqs_disabled(): 0, pid: 8710, name: syz-executor.5 [ 273.496063] audit: type=1400 audit(1585628025.456:52): avc: denied { write } for pid=8708 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 273.509134] 3 locks held by syz-executor.5/8710: 04:13:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) 04:13:45 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000140)=0x1f, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x3e8}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 04:13:45 executing program 3: mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) 04:13:45 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000001c0)="fc0000001c00071bab092500090007000aab08330200000000004c93210001c000000000000000000000740000039815fa2c1ec28656aaa79bb96b46fe000000bc00020000036c6c256f1a272fdfff7f512fd633d440000076000089aa6a216a4ec40cfc08f00472e9b19102ade01720d3d5bbe633439bc7775f7d981c69260c71423e2e80772c05de18444ef92e475eb8b29d3ef3d92c83170e5bba53463ae4f588574f8cee1cb88302ca38fe5e566f91cf190201dee515ff0d8dd3f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c0258a503f9c780ac811fe442cab15db68f0f1d297ad7af3d0041f0d4d75cd3f4ff2d4d3750", 0xfc) [ 273.530387] #0: (&table[i].mutex){+.+.}, at: [] nfnetlink_rcv_msg+0x78a/0xc00 04:13:45 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x8000, 0x56) pselect6(0x40, &(0x7f0000000140)={0x20, 0x8, 0xeda4, 0x8809, 0x1, 0x80, 0x8, 0x2}, &(0x7f0000000180)={0x2, 0x1, 0x44f4, 0x0, 0x4, 0x1ff, 0x1f, 0x7}, &(0x7f00000001c0)={0x5, 0x7, 0xffffffffffffff24, 0x9, 0x2, 0x5798, 0xe9}, &(0x7f0000000200), &(0x7f0000000280)={&(0x7f0000000240)={[0x7]}, 0x8}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4cc834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfffffffffffffdbe, 0x44070, 0x0, 0x657) splice(r1, 0x0, r0, 0x0, 0x7fffffff, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r2, 0x80042407, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setitimer(0x1, 0x0, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) tkill(0x0, 0x3a) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/tcp\x00') setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) 04:13:45 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="7000000000011905030100000800000022000000240001001400010008000100ffffffff08000200ac1e00010c0002000500010000000000240002000c00020005000100000000001400010008000100e0000002080002000000000008000700000000000c000600080001007f00000152b0c20b3acaebcf3e6df10de3e41b3143f7f17636dc46e47f0a3f1cd4ce77c76e72fc1ddf1e3f0000000000000000000000000000003f000248e4ab74764b1108e1e5c2b839ef2f56d5760f6385414ffa7ed2edc846946b783a01e148d78643b56ba6be4f7771b9666d5e7891e1c66fb9176438ae530e527800000000000000cfcd8bf4366c0a7fdd6a"], 0x70}}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0xb, 0x6000000}, 0x0) [ 273.602225] #1: (rcu_read_lock){....}, at: [] ctnetlink_create_conntrack+0x166/0x1040 [ 273.614968] #2: (&mm->mmap_sem){++++}, at: [] __do_page_fault+0x2cd/0xb40 [ 273.633012] Preemption disabled at: [ 273.633032] [] rcu_lockdep_current_cpu_online+0x30/0x140 [ 273.652633] CPU: 0 PID: 8710 Comm: syz-executor.5 Not tainted 4.14.174-syzkaller #0 [ 273.660453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.669807] Call Trace: [ 273.672390] dump_stack+0x13e/0x194 [ 273.676017] ? rcu_lockdep_current_cpu_online+0x30/0x140 [ 273.681451] ___might_sleep.cold+0x1bd/0x1f9 [ 273.685848] __do_page_fault+0x2f0/0xb40 [ 273.689896] ? vmalloc_fault+0xdf0/0xdf0 [ 273.693944] ? do_page_fault+0x60/0x4f2 [ 273.697915] page_fault+0x25/0x50 [ 273.701350] RIP: 0010: (null) [ 273.705217] RSP: 0018:ffff88804d6d7268 EFLAGS: 00010246 [ 273.710573] RAX: dffffc0000000000 RBX: ffff88804d6d72f0 RCX: ffffc90005e24000 [ 273.717824] RDX: 1ffffffff112601d RSI: ffff88804d6d72a0 RDI: ffff88804d6d72f0 [ 273.725096] RBP: ffff888099561dc0 R08: ffffffff873c5f20 R09: ffff88804d6d72f0 [ 273.732348] R10: ffffed1009adae63 R11: ffff88804d6d731f R12: 0000000000000000 [ 273.739610] R13: 0000000000000000 R14: ffffffff889300b0 R15: ffff88804d6d72a0 [ 273.746907] ? nfnetlink_parse_nat_setup+0x1e0/0x370 [ 273.751999] ? nf_nat_alloc_null_binding+0x40/0x40 [ 273.756941] ? nf_nat_alloc_null_binding+0x40/0x40 [ 273.761894] ? ctnetlink_parse_nat_setup+0x70/0x490 [ 273.766916] ? ctnetlink_create_conntrack+0x477/0x1040 [ 273.772185] ? ctnetlink_del_conntrack+0x5a0/0x5a0 [ 273.777108] ? __do_once_done+0x1be/0x240 [ 273.781245] ? hash_conntrack_raw+0x2ab/0x410 [ 273.785731] ? nf_ct_get_id+0x160/0x160 [ 273.789696] ? ctnetlink_new_conntrack+0x460/0xc30 [ 273.794613] ? ctnetlink_create_conntrack+0x1040/0x1040 [ 273.799962] ? mutex_trylock+0x1a0/0x1a0 [ 273.804013] ? ctnetlink_create_conntrack+0x1040/0x1040 [ 273.809360] ? nfnetlink_rcv_msg+0xa08/0xc00 [ 273.813780] ? netlink_rcv_skb+0x127/0x370 [ 273.818018] ? match_held_lock+0x5b3/0x5c0 [ 273.822254] ? nfnetlink_bind+0x240/0x240 [ 273.826393] ? netlink_ack+0x980/0x980 [ 273.830283] ? ns_capable_common+0x127/0x150 [ 273.834701] ? nfnetlink_rcv+0x1ab/0x1650 [ 273.838845] ? netdev_pick_tx+0x2e0/0x2e0 [ 273.842977] ? skb_clone+0x11c/0x310 [ 273.846680] ? save_trace+0x290/0x290 [ 273.850469] ? memcpy+0x35/0x50 [ 273.853736] ? nfnl_err_del+0x150/0x150 [ 273.857695] ? find_held_lock+0x2d/0x110 [ 273.861851] ? netlink_deliver_tap+0x90/0x860 [ 273.866334] ? rcu_is_watching+0x11/0xb0 [ 273.870381] ? lock_downgrade+0x6e0/0x6e0 [ 273.874525] ? netlink_unicast+0x437/0x620 [ 273.878743] ? netlink_attachskb+0x600/0x600 [ 273.883145] ? netlink_sendmsg+0x733/0xbe0 [ 273.887393] ? netlink_unicast+0x620/0x620 [ 273.891621] ? SYSC_sendto+0x2b0/0x2b0 [ 273.895514] ? security_socket_sendmsg+0x83/0xb0 [ 273.900297] ? netlink_unicast+0x620/0x620 [ 273.904517] ? sock_sendmsg+0xc5/0x100 [ 273.908392] ? ___sys_sendmsg+0x70a/0x840 [ 273.912530] ? trace_hardirqs_on+0x10/0x10 [ 273.916761] ? copy_msghdr_from_user+0x380/0x380 [ 273.921505] ? find_held_lock+0x2d/0x110 [ 273.925556] ? __fget+0x201/0x360 [ 273.928995] ? lock_downgrade+0x6e0/0x6e0 [ 273.933302] ? __fget+0x228/0x360 [ 273.936740] ? __fget_light+0x199/0x1f0 [ 273.940700] ? sockfd_lookup_light+0xb2/0x160 [ 273.945179] ? __sys_sendmsg+0xa3/0x120 [ 273.949136] ? SyS_shutdown+0x160/0x160 [ 273.953100] ? SyS_clock_gettime+0xf5/0x180 [ 273.957753] ? SyS_clock_settime+0x1a0/0x1a0 [ 273.962143] ? SyS_sendmsg+0x27/0x40 [ 273.965838] ? __sys_sendmsg+0x120/0x120 [ 273.969879] ? do_syscall_64+0x1d5/0x640 [ 273.973935] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 274.010340] BUG: unable to handle kernel NULL pointer dereference at (null) [ 274.011924] syz-executor.1 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 274.018362] IP: (null) [ 274.018367] PGD a4d9b067 P4D a4d9b067 PUD 9ee19067 PMD 0 [ 274.018384] Oops: 0010 [#1] PREEMPT SMP KASAN [ 274.018390] Modules linked in: [ 274.044872] CPU: 0 PID: 8710 Comm: syz-executor.5 Tainted: G W 4.14.174-syzkaller #0 [ 274.053860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.063296] task: ffff88804dbda040 task.stack: ffff88804d6d0000 [ 274.069338] RIP: 0010: (null) [ 274.073204] RSP: 0018:ffff88804d6d7268 EFLAGS: 00010246 [ 274.078559] RAX: dffffc0000000000 RBX: ffff88804d6d72f0 RCX: ffffc90005e24000 [ 274.085903] RDX: 1ffffffff112601d RSI: ffff88804d6d72a0 RDI: ffff88804d6d72f0 [ 274.093156] RBP: ffff888099561dc0 R08: ffffffff873c5f20 R09: ffff88804d6d72f0 [ 274.100407] R10: ffffed1009adae63 R11: ffff88804d6d731f R12: 0000000000000000 [ 274.107667] R13: 0000000000000000 R14: ffffffff889300b0 R15: ffff88804d6d72a0 [ 274.114927] FS: 00007f928af0b700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 274.123132] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 274.128994] CR2: 0000000000b70004 CR3: 00000000a0b2d000 CR4: 00000000001406f0 [ 274.136254] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 274.143517] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 274.150776] Call Trace: [ 274.153623] nfnetlink_parse_nat_setup+0x1e0/0x370 [ 274.158640] ? nf_nat_alloc_null_binding+0x40/0x40 [ 274.163650] ? nf_nat_alloc_null_binding+0x40/0x40 [ 274.168589] ctnetlink_parse_nat_setup+0x70/0x490 [ 274.174548] ctnetlink_create_conntrack+0x477/0x1040 [ 274.180335] ? ctnetlink_del_conntrack+0x5a0/0x5a0 [ 274.185270] ? __do_once_done+0x1be/0x240 [ 274.189682] ? hash_conntrack_raw+0x2ab/0x410 [ 274.194434] ? nf_ct_get_id+0x160/0x160 [ 274.198394] ctnetlink_new_conntrack+0x460/0xc30 [ 274.203133] ? ctnetlink_create_conntrack+0x1040/0x1040 [ 274.208481] ? mutex_trylock+0x1a0/0x1a0 [ 274.212703] ? ctnetlink_create_conntrack+0x1040/0x1040 [ 274.218154] nfnetlink_rcv_msg+0xa08/0xc00 [ 274.222470] netlink_rcv_skb+0x127/0x370 [ 274.226621] ? match_held_lock+0x5b3/0x5c0 [ 274.231357] ? nfnetlink_bind+0x240/0x240 [ 274.235488] ? netlink_ack+0x980/0x980 [ 274.239367] ? ns_capable_common+0x127/0x150 [ 274.243787] nfnetlink_rcv+0x1ab/0x1650 [ 274.247758] ? netdev_pick_tx+0x2e0/0x2e0 [ 274.252423] ? skb_clone+0x11c/0x310 [ 274.256922] ? save_trace+0x290/0x290 [ 274.260886] ? memcpy+0x35/0x50 [ 274.264507] ? nfnl_err_del+0x150/0x150 [ 274.269274] ? find_held_lock+0x2d/0x110 [ 274.273325] ? netlink_deliver_tap+0x90/0x860 [ 274.277806] ? rcu_is_watching+0x11/0xb0 [ 274.281850] ? lock_downgrade+0x6e0/0x6e0 [ 274.285999] netlink_unicast+0x437/0x620 [ 274.290048] ? netlink_attachskb+0x600/0x600 [ 274.294445] netlink_sendmsg+0x733/0xbe0 [ 274.298490] ? netlink_unicast+0x620/0x620 [ 274.302718] ? SYSC_sendto+0x2b0/0x2b0 [ 274.306595] ? security_socket_sendmsg+0x83/0xb0 [ 274.311352] ? netlink_unicast+0x620/0x620 [ 274.316747] sock_sendmsg+0xc5/0x100 [ 274.320468] ___sys_sendmsg+0x70a/0x840 [ 274.324459] ? trace_hardirqs_on+0x10/0x10 [ 274.328682] ? copy_msghdr_from_user+0x380/0x380 [ 274.333532] ? find_held_lock+0x2d/0x110 [ 274.337667] ? __fget+0x201/0x360 [ 274.341121] ? lock_downgrade+0x6e0/0x6e0 [ 274.345255] ? __fget+0x228/0x360 [ 274.348717] ? __fget_light+0x199/0x1f0 [ 274.354337] ? sockfd_lookup_light+0xb2/0x160 [ 274.358817] __sys_sendmsg+0xa3/0x120 [ 274.362614] ? SyS_shutdown+0x160/0x160 [ 274.366585] ? SyS_clock_gettime+0xf5/0x180 [ 274.371015] ? SyS_clock_settime+0x1a0/0x1a0 [ 274.375407] SyS_sendmsg+0x27/0x40 [ 274.378954] ? __sys_sendmsg+0x120/0x120 [ 274.383002] do_syscall_64+0x1d5/0x640 [ 274.386880] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 274.392064] RIP: 0033:0x45c849 [ 274.395237] RSP: 002b:00007f928af0ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 274.403025] RAX: ffffffffffffffda RBX: 00007f928af0b6d4 RCX: 000000000045c849 [ 274.410364] RDX: 0000000000000000 RSI: 0000000020000580 RDI: 0000000000000003 [ 274.417708] RBP: 000000000076bf00 R08: 0000000000000000 R09: 0000000000000000 [ 274.425133] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 274.432384] R13: 000000000000095c R14: 00000000004cc0fb R15: 000000000076bf0c [ 274.439658] Code: Bad RIP value. [ 274.443145] RIP: (null) RSP: ffff88804d6d7268 [ 274.448513] CR2: 0000000000000000 [ 274.457603] ---[ end trace 71297d7f432b5471 ]--- [ 274.462419] Kernel panic - not syncing: Fatal exception [ 274.469173] Kernel Offset: disabled [ 274.472794] Rebooting in 86400 seconds..