[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.27' (ECDSA) to the list of known hosts. 2020/05/23 15:39:19 fuzzer started 2020/05/23 15:39:19 dialing manager at 10.128.0.26:38661 2020/05/23 15:39:19 syscalls: 3055 2020/05/23 15:39:19 code coverage: enabled 2020/05/23 15:39:19 comparison tracing: enabled 2020/05/23 15:39:19 extra coverage: enabled 2020/05/23 15:39:19 setuid sandbox: enabled 2020/05/23 15:39:19 namespace sandbox: enabled 2020/05/23 15:39:19 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/23 15:39:19 fault injection: enabled 2020/05/23 15:39:19 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/23 15:39:19 net packet injection: enabled 2020/05/23 15:39:19 net device setup: enabled 2020/05/23 15:39:19 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/05/23 15:39:19 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/23 15:39:19 USB emulation: enabled 15:41:15 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r2, 0x0) syzkaller login: [ 169.772815][ T6795] IPVS: ftp: loaded support on port[0] = 21 15:41:15 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000580)=[{&(0x7f0000001a00)="d8", 0xfffffdbb}], 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f0000000100)=0x101000000000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) splice(r0, 0x0, r4, 0x0, 0x10003, 0x0) [ 169.911156][ T6795] chnl_net:caif_netlink_parms(): no params data found [ 170.010767][ T6795] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.029737][ T6795] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.037848][ T6795] device bridge_slave_0 entered promiscuous mode [ 170.062573][ T6795] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.079529][ T6795] bridge0: port 2(bridge_slave_1) entered disabled state [ 170.087539][ T6795] device bridge_slave_1 entered promiscuous mode [ 170.137767][ T6795] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 170.171810][ T6795] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 170.213866][ T6933] IPVS: ftp: loaded support on port[0] = 21 [ 170.220796][ T6795] team0: Port device team_slave_0 added [ 170.229112][ T6795] team0: Port device team_slave_1 added 15:41:15 executing program 2: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000041c0)=[{{&(0x7f0000000380)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/220, 0xdc}, {0x0}], 0x2, &(0x7f0000000600)=""/233, 0xe9}, 0xb}, {{&(0x7f0000000780)=@xdp, 0x80, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000840)=""/131, 0x83}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000000980)=""/104, 0x68}, {&(0x7f0000000a00)=""/144, 0x90}], 0x5, &(0x7f0000000bc0)=""/98, 0x62}, 0x401}, {{&(0x7f0000002940)=@nfc, 0x80, &(0x7f0000003e40)=[{&(0x7f0000000e80)}, {&(0x7f00000029c0)=""/70, 0x46}, {&(0x7f0000002a40)=""/188, 0xbc}, {&(0x7f0000003b00)=""/252, 0xfc}, {&(0x7f0000003c00)=""/113, 0x71}, {&(0x7f0000000c40)=""/35, 0x23}, {&(0x7f0000003cc0)=""/66, 0x42}, {&(0x7f0000003d40)=""/240, 0xf0}], 0x8, &(0x7f0000003f00)=""/155, 0x9b}, 0xb2e}, {{0x0, 0x0, 0x0}, 0x5}], 0x4, 0x120, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000002c0)) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)={0xa, 0x4e28, 0x0, @ipv4={[], [], @rand_addr=0x64010101}, 0x8}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000004c0)}], 0x1, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], 0x187}, 0x4000085) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x807a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) [ 170.292746][ T6795] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 170.319521][ T6795] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 170.348275][ T6795] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 170.377723][ T6795] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 170.387061][ T6795] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 170.415706][ T6795] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 15:41:15 executing program 3: chdir(0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) [ 170.584514][ T6795] device hsr_slave_0 entered promiscuous mode [ 170.643683][ T6795] device hsr_slave_1 entered promiscuous mode [ 170.736400][ T6981] IPVS: ftp: loaded support on port[0] = 21 [ 170.858511][ T6989] IPVS: ftp: loaded support on port[0] = 21 [ 170.877976][ T6933] chnl_net:caif_netlink_parms(): no params data found 15:41:16 executing program 4: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/protocols\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r1, r0, 0x0, 0x20000000000000d8) [ 171.206157][ T6933] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.229543][ T6933] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.249500][ T6933] device bridge_slave_0 entered promiscuous mode 15:41:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x15, &(0x7f0000000040)=ANY=[], 0x0) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}, {{&(0x7f0000003300)=@tipc=@id, 0x80, &(0x7f00000049c0)=[{&(0x7f0000003380)=""/83, 0x53}, {0x0}, {0x0}, {&(0x7f0000004580)=""/203, 0xcb}, {0x0}, {&(0x7f00000048c0)=""/218, 0xda}], 0x6, &(0x7f0000004a40)=""/243, 0xf3}}], 0x20004582, 0x2, 0x0) [ 171.344006][ T6933] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.361816][ T6933] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.383598][ T6933] device bridge_slave_1 entered promiscuous mode [ 171.421474][ T6795] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 171.479036][ T7219] IPVS: ftp: loaded support on port[0] = 21 [ 171.489632][ T6795] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 171.527436][ T6933] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.542831][ T6981] chnl_net:caif_netlink_parms(): no params data found [ 171.561076][ T6795] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 171.624774][ T6795] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 171.679629][ T6933] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 171.708354][ T6989] chnl_net:caif_netlink_parms(): no params data found [ 171.721603][ T7266] IPVS: ftp: loaded support on port[0] = 21 [ 171.791026][ T6933] team0: Port device team_slave_0 added [ 171.820631][ T6933] team0: Port device team_slave_1 added [ 171.905974][ T6981] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.913761][ T6981] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.922013][ T6981] device bridge_slave_0 entered promiscuous mode [ 171.936935][ T6933] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 171.943977][ T6933] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 171.970195][ T6933] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 171.999799][ T6981] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.006861][ T6981] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.019155][ T6981] device bridge_slave_1 entered promiscuous mode [ 172.035288][ T6933] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 172.043108][ T6933] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.072235][ T6933] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 172.106150][ T6989] bridge0: port 1(bridge_slave_0) entered blocking state [ 172.113301][ T6989] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.122537][ T6989] device bridge_slave_0 entered promiscuous mode [ 172.163355][ T6933] device hsr_slave_0 entered promiscuous mode [ 172.219915][ T6933] device hsr_slave_1 entered promiscuous mode [ 172.259605][ T6933] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 172.267367][ T6933] Cannot create hsr debugfs directory [ 172.299179][ T6989] bridge0: port 2(bridge_slave_1) entered blocking state [ 172.306542][ T6989] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.315014][ T6989] device bridge_slave_1 entered promiscuous mode [ 172.324105][ T6981] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 172.336955][ T6981] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.391031][ T6981] team0: Port device team_slave_0 added [ 172.435789][ T6981] team0: Port device team_slave_1 added [ 172.476426][ T6989] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 172.509143][ T6989] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 172.598052][ T6981] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 172.605191][ T6981] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.632876][ T6981] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 172.673781][ T6989] team0: Port device team_slave_0 added [ 172.684413][ T7219] chnl_net:caif_netlink_parms(): no params data found [ 172.700262][ T6981] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 172.707199][ T6981] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 172.733704][ T6981] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 172.753176][ T6989] team0: Port device team_slave_1 added [ 172.801845][ T6795] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.809011][ T7266] chnl_net:caif_netlink_parms(): no params data found [ 172.933717][ T6981] device hsr_slave_0 entered promiscuous mode [ 172.979818][ T6981] device hsr_slave_1 entered promiscuous mode [ 173.030022][ T6981] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 173.037579][ T6981] Cannot create hsr debugfs directory [ 173.049851][ T6989] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 173.056803][ T6989] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 173.084056][ T6989] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 173.145459][ T6989] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 173.152748][ T6989] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 173.180696][ T6989] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 173.205877][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 173.214532][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 173.224634][ T7219] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.232465][ T7219] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.240642][ T7219] device bridge_slave_0 entered promiscuous mode [ 173.269470][ T6795] 8021q: adding VLAN 0 to HW filter on device team0 [ 173.291653][ T7219] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.298698][ T7219] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.312768][ T7219] device bridge_slave_1 entered promiscuous mode [ 173.332133][ T6933] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 173.386661][ T6933] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 173.445565][ T6933] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 173.563105][ T6989] device hsr_slave_0 entered promiscuous mode [ 173.619905][ T6989] device hsr_slave_1 entered promiscuous mode [ 173.659452][ T6989] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 173.667024][ T6989] Cannot create hsr debugfs directory [ 173.680049][ T7266] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.687108][ T7266] bridge0: port 1(bridge_slave_0) entered disabled state [ 173.697121][ T7266] device bridge_slave_0 entered promiscuous mode [ 173.708734][ T7266] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.716493][ T7266] bridge0: port 2(bridge_slave_1) entered disabled state [ 173.727316][ T7266] device bridge_slave_1 entered promiscuous mode [ 173.735119][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 173.744466][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 173.753586][ T2487] bridge0: port 1(bridge_slave_0) entered blocking state [ 173.760811][ T2487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 173.769928][ T6933] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 173.844907][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 173.873708][ T7219] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.920494][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 173.929088][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 173.938217][ T2515] bridge0: port 2(bridge_slave_1) entered blocking state [ 173.945342][ T2515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 173.955153][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 173.966224][ T7266] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.977826][ T7219] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 174.013247][ T7266] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 174.038593][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 174.047265][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 174.056943][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 174.065664][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 174.125204][ T7219] team0: Port device team_slave_0 added [ 174.138797][ T7219] team0: Port device team_slave_1 added [ 174.160449][ T7219] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 174.167485][ T7219] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 174.194226][ T7219] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 174.240388][ T7266] team0: Port device team_slave_0 added [ 174.257425][ T7219] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 174.266446][ T7219] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 174.297329][ T7219] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 174.308775][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 174.318431][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 174.327133][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 174.335977][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 174.356941][ T7266] team0: Port device team_slave_1 added [ 174.396673][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 174.406065][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 174.425973][ T7266] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 174.438223][ T7266] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 174.469191][ T7266] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 174.489652][ T6795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 174.511202][ T6981] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 174.546298][ T7266] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 174.553630][ T7266] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 174.581754][ T7266] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 174.643145][ T7219] device hsr_slave_0 entered promiscuous mode [ 174.710182][ T7219] device hsr_slave_1 entered promiscuous mode [ 174.749574][ T7219] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 174.757137][ T7219] Cannot create hsr debugfs directory [ 174.763937][ T6981] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 174.826290][ T6981] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 174.954004][ T6981] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 175.062387][ T7266] device hsr_slave_0 entered promiscuous mode [ 175.120297][ T7266] device hsr_slave_1 entered promiscuous mode [ 175.159577][ T7266] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 175.167238][ T7266] Cannot create hsr debugfs directory [ 175.210742][ T2522] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 175.218098][ T2522] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 175.236252][ T6795] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 175.258899][ T6989] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 175.307180][ T6989] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 175.376158][ T6989] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 175.449819][ T6989] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 175.546537][ T6933] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.594495][ T2522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 175.612504][ T2522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 175.706229][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.727427][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 175.743014][ T6933] 8021q: adding VLAN 0 to HW filter on device team0 [ 175.762992][ T7219] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 175.816665][ T7219] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 175.873530][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 175.883768][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 175.892645][ T2515] bridge0: port 1(bridge_slave_0) entered blocking state [ 175.899761][ T2515] bridge0: port 1(bridge_slave_0) entered forwarding state [ 175.907540][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 175.916413][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 175.925636][ T2515] bridge0: port 2(bridge_slave_1) entered blocking state [ 175.932780][ T2515] bridge0: port 2(bridge_slave_1) entered forwarding state [ 175.940768][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 175.984172][ T7266] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 176.032528][ T7219] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 176.102995][ T2522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 176.111452][ T2522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.120228][ T2522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.128933][ T2522] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 176.138334][ T2522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 176.147503][ T2522] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 176.156294][ T2522] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.164697][ T2522] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.173175][ T2522] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 176.190729][ T6795] device veth0_vlan entered promiscuous mode [ 176.200044][ T7266] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 176.241950][ T7219] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 176.301422][ T6795] device veth1_vlan entered promiscuous mode [ 176.311889][ T7266] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 176.357941][ T7266] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 176.404914][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 176.413044][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 176.425648][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 176.434304][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 176.446712][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.455249][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 176.467629][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.490047][ T6933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 176.550358][ T6981] 8021q: adding VLAN 0 to HW filter on device bond0 [ 176.582480][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 176.592246][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 176.614516][ T6795] device veth0_macvtap entered promiscuous mode [ 176.632892][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 176.645332][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 176.653123][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 176.663131][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.671678][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.684998][ T6933] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 176.694916][ T6795] device veth1_macvtap entered promiscuous mode [ 176.715951][ T6981] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.748782][ T6989] 8021q: adding VLAN 0 to HW filter on device bond0 [ 176.785014][ T6989] 8021q: adding VLAN 0 to HW filter on device team0 [ 176.794966][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 176.805516][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.818438][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.827211][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.834421][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.842954][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 176.850920][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.858523][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.867375][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.875988][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.883080][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.891297][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.902964][ T6795] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 176.948122][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 176.957269][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 176.966745][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 176.975874][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.984870][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.994640][ T2513] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.001750][ T2513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.009303][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 177.017764][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 177.026868][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.035639][ T2513] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.042741][ T2513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 177.050731][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 177.059320][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 177.067639][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 177.076401][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.087392][ T6795] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 177.128716][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.141127][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 177.148873][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.158140][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.166853][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 177.176138][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 177.184909][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 177.195756][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.204708][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 177.213484][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.221987][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 177.311778][ T6981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 177.335933][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 177.345283][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 177.354644][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 177.425684][ T7266] 8021q: adding VLAN 0 to HW filter on device bond0 [ 177.439100][ T6933] device veth0_vlan entered promiscuous mode [ 177.451863][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 177.461454][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 177.469108][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 177.478362][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 177.597172][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 177.617946][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 177.627031][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 177.642312][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 177.661701][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 177.675271][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 177.696868][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 177.706033][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 177.723479][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 177.733208][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 177.742556][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 177.753866][ T6933] device veth1_vlan entered promiscuous mode [ 177.766952][ T7266] 8021q: adding VLAN 0 to HW filter on device team0 [ 177.790780][ T6989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 177.804979][ T7219] 8021q: adding VLAN 0 to HW filter on device bond0 [ 177.814964][ T6981] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 177.834531][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 15:41:23 executing program 0: mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='cifs\x00', 0x0, &(0x7f0000000000)='A\x9a\xa0\xa9A\xf0\xf3\xb6\xc3l\xb9\x9cWE\xa79\xe8\xd4\xdaa\x80\x8dJZ\xd5I\x03\x00\xd7\a\x1a\x10O\x01\x05P\xa1\xa3Ls2\xbc[S\xc89:C\xc6L\xd1r\xd8,@\xa5\xa6*') syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100488, 0x0) [ 177.858013][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 177.868272][ T2513] bridge0: port 1(bridge_slave_0) entered blocking state [ 177.875405][ T2513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 177.941227][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 177.951623][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 177.965007][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 177.976018][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 177.983155][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.003790][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.018298][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 15:41:23 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x9, 0x1, '\''}, 0x610a01) [ 178.060355][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 178.080921][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.089968][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 178.110623][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.130284][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 178.138063][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 15:41:23 executing program 0: syz_open_procfs(0x0, &(0x7f0000000300)='net/rt6_stats\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$unix(0x1, 0x5, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) dup(r3) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) pipe(&(0x7f0000000240)) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) sched_setattr(0x0, &(0x7f0000000400)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b8}, &(0x7f0000000080)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 178.161530][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 178.195553][ T6933] device veth0_macvtap entered promiscuous mode [ 178.231441][ T7219] 8021q: adding VLAN 0 to HW filter on device team0 [ 178.250152][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 178.258759][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 178.274269][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 178.282406][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 178.290160][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 178.306955][ T7266] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 178.321362][ T7266] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 178.336740][ T6933] device veth1_macvtap entered promiscuous mode [ 178.357356][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 178.370342][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 178.378948][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.387914][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 178.397155][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.406517][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 178.415514][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 178.424359][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 178.433439][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 178.442092][ T2487] bridge0: port 1(bridge_slave_0) entered blocking state [ 178.449168][ T2487] bridge0: port 1(bridge_slave_0) entered forwarding state [ 178.457221][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 178.466119][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 178.474695][ T2487] bridge0: port 2(bridge_slave_1) entered blocking state [ 178.481811][ T2487] bridge0: port 2(bridge_slave_1) entered forwarding state [ 178.490331][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 178.498150][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 178.510489][ T6989] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 178.535548][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 178.570246][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 178.579191][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 178.587670][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 178.596948][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 178.606076][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 178.616829][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 178.625081][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.633382][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 178.648933][ T6981] device veth0_vlan entered promiscuous mode [ 178.671674][ T6933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 178.686040][ T6933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.698264][ T6933] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 178.718540][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 178.727455][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 178.736801][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 178.745918][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 178.754762][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 178.762963][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 178.773390][ T6933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 178.784579][ T6933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 178.796005][ T6933] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 178.810146][ T6981] device veth1_vlan entered promiscuous mode [ 178.821707][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 178.830873][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 178.840143][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 178.867978][ T7266] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 178.875796][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 178.885810][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 178.895051][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 178.904080][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 178.931051][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 178.944184][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 178.953002][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 178.978952][ T7219] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 15:41:24 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fde, 0x0) [ 179.127449][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 179.148704][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 179.174609][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 179.187600][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.206167][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 179.214174][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.233285][ T6981] device veth0_macvtap entered promiscuous mode [ 179.241698][ T6989] device veth0_vlan entered promiscuous mode [ 179.253531][ T6981] device veth1_macvtap entered promiscuous mode [ 179.275630][ T6989] device veth1_vlan entered promiscuous mode [ 179.333612][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 179.342007][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 179.350710][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 179.359122][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 179.389615][ T2487] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 179.408954][ T6981] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.428665][ T6981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.441818][ T6981] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 179.453984][ T6981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.466900][ T6981] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 179.485714][ T7219] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 179.503632][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 179.523016][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 179.538287][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 179.548447][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 179.572392][ T6981] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.583089][ T6981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.594837][ T6981] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 179.606296][ T6981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 179.617651][ T6981] batman_adv: batadv0: Interface activated: batadv_slave_1 15:41:25 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000001440)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_STATUS64(r1, 0x80984120, &(0x7f0000000080)) [ 179.639640][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 179.652903][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:41:25 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fanotify_init(0x0, 0x0) r2 = dup2(r1, r0) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) [ 179.817476][ T2477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 179.826780][ T2477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 179.859452][ T7266] device veth0_vlan entered promiscuous mode [ 179.887781][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready 15:41:25 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fde, 0x0) 15:41:25 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000780)=""/4096, 0x1519}], 0x1) [ 179.906604][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 179.955696][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 179.967061][ T2513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 180.017719][ T6989] device veth0_macvtap entered promiscuous mode [ 180.033197][ T6989] device veth1_macvtap entered promiscuous mode [ 180.086106][ T7266] device veth1_vlan entered promiscuous mode [ 180.135843][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 180.166359][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 180.175436][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 180.190423][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 180.198956][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 180.228053][ T6989] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 180.243042][ T6989] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.253678][ T6989] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 180.264734][ T6989] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.276718][ T6989] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 15:41:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000041c0)=[{{&(0x7f0000000380)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/220, 0xdc}, {0x0}], 0x2, &(0x7f0000000600)=""/233, 0xe9}, 0xb}, {{&(0x7f0000000780)=@xdp, 0x80, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000840)=""/131, 0x83}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000000980)=""/104, 0x68}, {&(0x7f0000000a00)=""/144, 0x90}], 0x5, &(0x7f0000000bc0)=""/98, 0x62}, 0x401}, {{&(0x7f0000002940)=@nfc, 0x80, &(0x7f0000003e40)=[{&(0x7f0000000e80)}, {&(0x7f00000029c0)=""/70, 0x46}, {&(0x7f0000002a40)=""/188, 0xbc}, {&(0x7f0000003b00)=""/252, 0xfc}, {&(0x7f0000003c00)=""/113, 0x71}, {&(0x7f0000000c40)=""/35, 0x23}, {&(0x7f0000003cc0)=""/66, 0x42}, {&(0x7f0000003d40)=""/240, 0xf0}], 0x8, &(0x7f0000003f00)=""/155, 0x9b}, 0xb2e}, {{0x0, 0x0, 0x0}, 0x5}], 0x4, 0x120, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000002c0)) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)={0xa, 0x4e28, 0x0, @ipv4={[], [], @rand_addr=0x64010101}, 0x8}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000004c0)}], 0x1, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], 0x187}, 0x4000085) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x807a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) [ 180.288663][ T6989] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.301365][ T6989] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 180.323012][ C1] hrtimer: interrupt took 28586 ns [ 180.359336][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 180.367550][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 180.390168][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 180.428074][ T6989] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 180.449241][ T6989] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.459061][ T6989] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 180.471807][ T6989] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.489093][ T6989] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 180.512606][ T6989] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.526222][ T6989] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 180.557162][ T7219] device veth0_vlan entered promiscuous mode [ 180.589692][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 180.598269][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 180.620093][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 180.628203][ T2500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 180.657987][ T7266] device veth0_macvtap entered promiscuous mode [ 180.689269][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 180.697076][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 180.708654][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 180.720946][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 180.732993][ T7219] device veth1_vlan entered promiscuous mode [ 180.744164][ T7266] device veth1_macvtap entered promiscuous mode [ 180.791902][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 180.810388][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 180.884588][ T7266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 180.909194][ T7266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.919006][ T7266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 180.938653][ T7266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.950799][ T7266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 180.962935][ T7266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 180.973528][ T7266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 180.991237][ T7266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.008301][ T7266] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 181.027511][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 181.037519][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 181.113304][ T7266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.141688][ T7266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 15:41:26 executing program 3: sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') sendfile(r1, r2, 0x0, 0x8000000a) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000003c0)={{0xf000, 0x4000, 0x0, 0x4a, 0xfa, 0x60, 0x5c, 0x7b, 0x8, 0x4, 0x3f, 0x9}, {0x10000, 0x2000, 0xf, 0x1, 0x40, 0x8, 0x6, 0x7f, 0xcf, 0xff, 0x7, 0x2}, {0x2000, 0x1, 0x0, 0x1d, 0x80, 0x5, 0x3f, 0x7f, 0xff, 0x40, 0x4, 0x20}, {0x4000, 0x3000, 0xe, 0x4, 0x8a, 0x4, 0x5, 0x40, 0x40, 0x3f, 0x4, 0x81}, {0x100000, 0xf000, 0x0, 0x0, 0x0, 0x6, 0x87, 0x81, 0x6, 0x1, 0xe6, 0x6}, {0x3000, 0x2, 0xa, 0x5, 0x7, 0x8, 0x7, 0x2, 0x6, 0x6, 0xf5, 0x6f}, {0x1, 0x5000, 0xd, 0x16, 0x7, 0x0, 0x4, 0x14, 0x4, 0xe5, 0x0, 0x1f}, {0x10000, 0x10000, 0xc, 0x6, 0x81, 0xf2, 0xf7, 0x1a, 0x1f, 0x0, 0xd0, 0x3}, {0x2000, 0x4}, {0x2, 0x5}, 0x40007, 0x0, 0x5000, 0x200, 0x3, 0x5101, 0x1, [0x40af5e61, 0x6, 0x9, 0x8a]}) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8001) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xdf52, 0x728df551}) [ 181.180524][ T7266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.197705][ T7266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.208554][ T7266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.220053][ T7266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.230037][ T7266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.242451][ T7266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.282059][ T29] audit: type=1804 audit(1590248486.621:2): pid=8133 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir946937134/syzkaller.82DLll/1/bus" dev="sda1" ino=15752 res=1 [ 181.284021][ T7266] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 181.348373][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 181.357387][ T29] audit: type=1804 audit(1590248486.701:3): pid=8136 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir946937134/syzkaller.82DLll/1/bus" dev="sda1" ino=15752 res=1 [ 181.387482][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 181.406682][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 181.431476][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 181.467346][ T7219] device veth0_macvtap entered promiscuous mode [ 181.557359][ T7219] device veth1_macvtap entered promiscuous mode [ 181.665942][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 181.690643][ T2515] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 181.707679][ T7219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.729666][ T7219] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.749200][ T7219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.761439][ T0] NOHZ: local_softirq_pending 08 [ 181.769617][ T7219] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.784335][ T7219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.795761][ T7219] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.806029][ T7219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.818077][ T7219] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.828301][ T7219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 181.839088][ T7219] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.853977][ T7219] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 181.883802][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 181.892730][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 181.906479][ T7219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.917584][ T7219] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.930902][ T7219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.942043][ T7219] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.952369][ T7219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.963440][ T7219] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.973779][ T7219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 181.986162][ T7219] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 181.996569][ T7219] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 182.008899][ T7219] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 182.021265][ T7219] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 182.033664][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 182.042454][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 15:41:28 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'bridge0\x00'}) 15:41:28 executing program 2: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000041c0)=[{{&(0x7f0000000380)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/220, 0xdc}, {0x0}], 0x2, &(0x7f0000000600)=""/233, 0xe9}, 0xb}, {{&(0x7f0000000780)=@xdp, 0x80, &(0x7f0000000b40)=[{0x0}, {&(0x7f0000000840)=""/131, 0x83}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000000980)=""/104, 0x68}, {&(0x7f0000000a00)=""/144, 0x90}], 0x5, &(0x7f0000000bc0)=""/98, 0x62}, 0x401}, {{&(0x7f0000002940)=@nfc, 0x80, &(0x7f0000003e40)=[{&(0x7f0000000e80)}, {&(0x7f00000029c0)=""/70, 0x46}, {&(0x7f0000002a40)=""/188, 0xbc}, {&(0x7f0000003b00)=""/252, 0xfc}, {&(0x7f0000003c00)=""/113, 0x71}, {&(0x7f0000000c40)=""/35, 0x23}, {&(0x7f0000003cc0)=""/66, 0x42}, {&(0x7f0000003d40)=""/240, 0xf0}], 0x8, &(0x7f0000003f00)=""/155, 0x9b}, 0xb2e}, {{0x0, 0x0, 0x0}, 0x5}], 0x4, 0x120, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000002c0)) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)={0xa, 0x4e28, 0x0, @ipv4={[], [], @rand_addr=0x64010101}, 0x8}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000004c0)}], 0x1, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], 0x187}, 0x4000085) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x807a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) 15:41:28 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000003c0)={0x9, 0x1, "15"}, 0x402000) 15:41:28 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fde, 0x0) 15:41:28 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x4000000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="ec0100002800270d00"/20, @ANYRES32, @ANYBLOB], 0x1ec}}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/partitions\x00', 0x0, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x141042, 0x0) clone(0x200183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x3, 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) pipe(&(0x7f0000000400)) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x20000000000000, 0x40000004}, 0x0, &(0x7f0000000140)={0xffc}, 0x0, 0x0) 15:41:28 executing program 5: syz_open_procfs(0x0, &(0x7f0000000300)='net/rt6_stats\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$unix(0x1, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x1000000c8) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) sched_setattr(0x0, &(0x7f0000000400)={0x38, 0x1, 0x0, 0x0, 0x1}, 0x0) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b8}, &(0x7f0000000080)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 15:41:28 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000003c0)={0x9, 0x1, "15"}, 0x402000) [ 182.755506][ T8166] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 15:41:28 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d08, &(0x7f0000000000)) 15:41:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0xd, &(0x7f00000000c0), 0x10) 15:41:28 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0xd, &(0x7f00000000c0), 0x10) socket$kcm(0x29, 0x0, 0x0) 15:41:28 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d08, &(0x7f0000000000)) 15:41:28 executing program 1: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r1, 0x11, 0x0, 0x0, 0x0}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x220000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x2c, &(0x7f0000000000), 0x4) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, 0x0, 0x0) recvmsg(r4, &(0x7f00000157c0)={&(0x7f0000013f40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000015640)=[{&(0x7f0000013fc0)=""/4096, 0x1000}, {&(0x7f0000014fc0)=""/202, 0xca}, {&(0x7f00000150c0)=""/187, 0xbb}, {&(0x7f0000015180)=""/193, 0xc1}, {&(0x7f0000015280)=""/252, 0xfc}, {&(0x7f0000015380)=""/229, 0xe5}, {&(0x7f0000015480)=""/115, 0x73}, {&(0x7f0000015500)=""/93, 0x5d}, {&(0x7f0000015580)=""/46, 0x2e}, {&(0x7f00000155c0)=""/93, 0x5d}], 0xa, &(0x7f0000015700)=""/191, 0xbf}, 0x1) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000015800)=r5) ioctl$TUNSETVNETBE(r2, 0x400454de, 0x0) 15:41:28 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x38}, 0x8000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103600000f000009e0ff008001fffffe100004000632177fbac141414e0020005be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)={0x0, r2, 0xe}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x25, 0x40, 0x0, 0x9, 0x4810, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x3ff}, 0x40000, 0x1, 0xfffffffa, 0x4, 0x0, 0x8, 0x3}, 0xffffffffffffffff, 0xe, r0, 0x0) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 15:41:28 executing program 2: write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, 0x0}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00004cd4000000", @ANYRES32=r8, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c0002000500070005"], 0x3c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r8], 0x28}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000dc0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r8}, @IFLA_HSR_SLAVE2={0x8, 0x2, r2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x48045}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={0x0, 0xa0}}, 0x44004) sendfile(0xffffffffffffffff, r0, 0x0, 0x1000000ce) 15:41:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) r1 = socket$inet6(0x10, 0x3, 0x4) sendto$inet6(r1, &(0x7f00000001c0)="4c00000012001f15b9409b849ac00a00a5784002000000000000030038c88cc055c5ac27a6c5b068d0bf46d323456536005ad94a461cdbfee9bdb9423523598451d1ec0cffc8792cd8000000", 0x4c, 0x0, 0x0, 0x0) [ 183.448096][ T8207] device veth0 entered promiscuous mode [ 183.499969][ T8207] device batadv0 entered promiscuous mode 15:41:28 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fde, 0x0) 15:41:28 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="5f16e16d18800de14e11"], 0xa) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0x12, &(0x7f00000001c0), 0x4) close(r2) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4f0a, 0x0) 15:41:28 executing program 5: r0 = socket(0x10, 0x400000000080803, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d0a0b49ff70880000800328000802010001010000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 15:41:28 executing program 2: write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, 0x0}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00004cd4000000", @ANYRES32=r8, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c0002000500070005"], 0x3c}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r8], 0x28}}, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000dc0)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r8}, @IFLA_HSR_SLAVE2={0x8, 0x2, r2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x48045}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={0x0, 0xa0}}, 0x44004) sendfile(0xffffffffffffffff, r0, 0x0, 0x1000000ce) 15:41:29 executing program 1: r0 = socket(0x18, 0x3, 0x0) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="02a3b7cfbabf7a9f", 0x8, 0x0, 0x0, 0x0) [ 183.748616][ T8225] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:29 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x5, 0x0) sendmsg(r1, &(0x7f0000000040)={&(0x7f0000000080)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000000)="a3", 0x1}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x84, 0x1e, &(0x7f0000000100), 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 15:41:29 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r1, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x38}, 0x8000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103600000f000009e0ff008001fffffe100004000632177fbac141414e0020005be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)={0x0, r2, 0xe}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x70, 0x0, 0x0, 0x25, 0x40, 0x0, 0x9, 0x4810, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x3ff}, 0x40000, 0x1, 0xfffffffa, 0x4, 0x0, 0x8, 0x3}, 0xffffffffffffffff, 0xe, r0, 0x0) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 15:41:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0x7b, &(0x7f0000000ac0), 0x8) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) 15:41:29 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r3, 0xf, 0xffffffffffffffff, 0x14) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x4) 15:41:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="ac", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), 0x14) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)=""/191, 0xbf}], 0x1}}], 0x1, 0x6, 0x0) 15:41:29 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x140c, 0x103, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 15:41:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(cbc(cast6))\x00'}, 0x58) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(rfc4106-gcm-aesni)\x00'}, 0x58) 15:41:29 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, r1, 0x0, 0x47fde, 0x0) 15:41:29 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 15:41:29 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r3, 0xf, 0xffffffffffffffff, 0x14) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x4) 15:41:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="340000000b06bb8b00000000000000000000000005000100060000000c00078008000940000000000900020073797a30"], 0x34}}, 0x0) 15:41:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00f0000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) 15:41:29 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="5f16e16d18800de14e11"], 0xa) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0x12, &(0x7f00000001c0), 0x4) close(r2) r4 = socket$netlink(0x10, 0x3, 0x4) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4f0a, 0x0) 15:41:30 executing program 2: clone(0x900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x5, 0x7, 0x20d, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 15:41:30 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 15:41:30 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r3, 0xf, 0xffffffffffffffff, 0x14) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x4) [ 184.647436][ T8291] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 184.685035][ T8297] team0: Cannot enslave team device to itself [ 184.728506][ T8297] team0: Cannot enslave team device to itself 15:41:30 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0x9, &(0x7f0000000240)=0x0) socket$inet(0x2, 0x4000000000000001, 0x0) connect$can_bcm(r0, &(0x7f0000000140), 0x10) io_submit(r1, 0x2, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x20000238}]) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x0, 0x0) pipe(&(0x7f0000000200)) io_submit(r1, 0x2000000000000072, &(0x7f0000000080)) 15:41:30 executing program 5: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000000)=0x27) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) dup3(r1, r0, 0x0) 15:41:30 executing program 4: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000000)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000080)) 15:41:30 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, r1, 0x0, 0x47fde, 0x0) 15:41:30 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r3, 0xf, 0xffffffffffffffff, 0x14) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x4) 15:41:30 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000000)=""/35, 0x23}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x2) 15:41:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x12, r1, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 15:41:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000013c0)=[{{&(0x7f0000000240)={0xa, 0x4e27, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x851) 15:41:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1e) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) socket$inet6(0xa, 0x2, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, 0x0) 15:41:30 executing program 5: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000003c0)=0x10) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000cc0)=@newtfilter={0x4c, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x1c, 0x2, [@TCA_CGROUP_POLICE={0x18, 0x2, [@TCA_POLICE_RESULT={0x8}, @TCA_POLICE_PEAKRATE64={0xc}]}]}}]}, 0x4c}}, 0x0) 15:41:30 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000300)=""/124, 0x7c}], 0x1, 0x0) 15:41:30 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r3, 0xf, 0xffffffffffffffff, 0x14) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 15:41:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 15:41:31 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r3, 0xf, 0xffffffffffffffff, 0x14) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)) 15:41:31 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x10, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2e, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x2e, 0x3]}, 0x40) 15:41:31 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[], 0xfffffd88) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x1, 0x0, 0x3}, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snd/timer\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) clone(0x200183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ttyS3\x00', 0x0, 0x0) pipe(&(0x7f0000000140)) pselect6(0x40, &(0x7f00000002c0), 0x0, &(0x7f0000000300)={0xffc, 0x0, 0x10}, 0x0, 0x0) 15:41:31 executing program 3: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) 15:41:31 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, r3, 0xf, 0xffffffffffffffff, 0x14) 15:41:31 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, r1, 0x0, 0x47fde, 0x0) 15:41:31 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) unshare(0x44020600) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') open(&(0x7f0000000040)='./file0\x00', 0x2817e, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x0, 0x0, [{{}, 0x0, 0x0, 0x0, 0x2}]}) 15:41:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x12, r1, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) [ 186.471988][ T8380] IPVS: ftp: loaded support on port[0] = 21 15:41:31 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 15:41:31 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$netlink(0x10, 0x3, 0x0) splice(r2, 0x0, r4, 0x0, 0x1420000a70, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f07003fffffffda0602", 0x11}], 0x1) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) 15:41:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x9f9}, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005c40)=[{{&(0x7f0000000b80)=@generic, 0x80, 0x0, 0x0, &(0x7f0000000780)=""/70, 0x46}}, {{0x0, 0x0, 0x0}, 0xffffff00}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, 0x0, 0x0) vmsplice(r1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r3, 0x800) lseek(r3, 0x0, 0x2) r4 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r3, r4, 0x0, 0x8400f7ffffe0) syz_genetlink_get_family_id$fou(0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) [ 186.580801][ T29] audit: type=1804 audit(1590248491.931:4): pid=8386 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir672424111/syzkaller.GbH4XF/8/bus/file0" dev="overlay" ino=15764 res=1 15:41:32 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x8955, &(0x7f0000000040)=0x2) [ 186.716678][ T8386] IPVS: ftp: loaded support on port[0] = 21 [ 186.740422][ T8405] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.3'. [ 186.770884][ T122] tipc: TX() has been purged, node left! [ 186.792149][ T29] audit: type=1800 audit(1590248492.141:5): pid=8419 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=15767 res=0 15:41:32 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 15:41:32 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r2) 15:41:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x12, r1, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 15:41:32 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fde, 0x0) [ 187.502465][ T29] audit: type=1800 audit(1590248492.851:6): pid=8422 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=15767 res=0 15:41:32 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 15:41:32 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = timerfd_create(0x0, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000000)=0x3ff, 0x4) dup2(r1, r0) 15:41:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x9f9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000005c40)=[{{&(0x7f0000000b80)=@generic, 0x80, 0x0, 0x0, &(0x7f0000000780)=""/70, 0x46}}, {{0x0, 0x0, 0x0}, 0xffffff00}, {{&(0x7f0000001140)=@alg, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x4, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) r5 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r4, r5, 0x0, 0x8400f7ffffe0) syz_genetlink_get_family_id$fou(0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 15:41:35 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x9f9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000005c40)=[{{&(0x7f0000000b80)=@generic, 0x80, 0x0, 0x0, &(0x7f0000000780)=""/70, 0x46}}, {{&(0x7f0000001140)=@alg, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) r5 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r4, r5, 0x0, 0x8400f7ffff13) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 15:41:35 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) 15:41:35 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet(0x2b, 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fde, 0x0) 15:41:35 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x12, r0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x88400) syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 15:41:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x12, r1, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 15:41:35 executing program 1: socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x40186366, 0x0) [ 190.124733][ T29] audit: type=1800 audit(1590248495.471:7): pid=8466 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=15758 res=0 15:41:35 executing program 1: socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x40186366, 0x0) [ 190.364862][ T29] audit: type=1800 audit(1590248495.711:8): pid=8473 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=15761 res=0 15:41:35 executing program 1: socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x40186366, 0x0) 15:41:36 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x40186366, 0x0) 15:41:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000e80)) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000041c0)=[{{&(0x7f0000000380)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/220, 0xdc}, {&(0x7f0000000580)=""/58, 0x3a}], 0x2, &(0x7f0000000600)=""/233, 0xe9}, 0xb}, {{&(0x7f0000000780)=@xdp, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000800)=""/55, 0x37}, {&(0x7f0000000840)=""/131, 0x83}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000000900)=""/109, 0x6d}, {&(0x7f0000000980)=""/104, 0x68}, {&(0x7f0000000a00)=""/144, 0x90}, {&(0x7f0000000ac0)=""/67, 0x43}], 0x7, &(0x7f0000000bc0)=""/98, 0x62}, 0x401}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/245, 0xf5}, {&(0x7f0000000d80)=""/230, 0xe6}, {&(0x7f0000002100)=""/241, 0xf1}, {&(0x7f0000002200)=""/180, 0xb4}, {&(0x7f00000022c0)=""/209, 0xd1}, {&(0x7f00000023c0)=""/242, 0xf2}, {&(0x7f0000004300)=""/163, 0xa3}, {&(0x7f0000002580)=""/229, 0xe5}, {&(0x7f0000002680)=""/216, 0xd8}], 0xa, &(0x7f0000002840)=""/243, 0xf3}, 0x8}, {{&(0x7f0000002940)=@nfc, 0x80, &(0x7f0000003e40)=[{&(0x7f0000000e80)}, {&(0x7f00000029c0)=""/70, 0x46}, {&(0x7f0000002a40)=""/188, 0xbc}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/252, 0xfc}, {&(0x7f0000003c00)=""/113, 0x71}, {&(0x7f0000000c40)=""/35, 0x23}, {0x0}, {&(0x7f0000003d40)=""/240, 0xf0}], 0x9, &(0x7f0000003f00)=""/155, 0x9b}, 0xb2e}, {{0x0, 0x0, &(0x7f0000004180)=[{&(0x7f0000003fc0)=""/157, 0x9d}, {&(0x7f0000004080)}], 0x2}, 0x5}], 0x5, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f00000002c0)) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)={0xa, 0x4e28, 0x0, @ipv4={[], [], @rand_addr=0x64010101}, 0x8}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000004c0)}], 0x1, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], 0x187}, 0x4000085) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext, 0x9000, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x807a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) 15:41:36 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fde, 0x0) 15:41:36 executing program 4: unshare(0x44020600) open(&(0x7f0000000040)='./file0\x00', 0x2817e, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc020660b, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x0, 0x0, [{{}, 0x0, 0x0, 0x0, 0x2}]}) 15:41:36 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x12, r0, 0x0) syz_open_dev$mouse(0x0, 0x0, 0x88400) syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 15:41:36 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x40186366, 0x0) 15:41:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x12, r1, 0x0) syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 15:41:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000e80)) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000041c0)=[{{&(0x7f0000000380)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/220, 0xdc}, {&(0x7f0000000580)=""/58, 0x3a}], 0x2, &(0x7f0000000600)=""/233, 0xe9}, 0xb}, {{&(0x7f0000000780)=@xdp, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000800)=""/55, 0x37}, {&(0x7f0000000840)=""/131, 0x83}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000000900)=""/109, 0x6d}, {&(0x7f0000000980)=""/104, 0x68}, {&(0x7f0000000a00)=""/144, 0x90}, {&(0x7f0000000ac0)=""/67, 0x43}], 0x7, &(0x7f0000000bc0)=""/98, 0x62}, 0x401}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/245, 0xf5}, {&(0x7f0000000d80)=""/230, 0xe6}, {&(0x7f0000002100)=""/241, 0xf1}, {&(0x7f0000002200)=""/180, 0xb4}, {&(0x7f00000022c0)=""/209, 0xd1}, {&(0x7f00000023c0)=""/242, 0xf2}, {&(0x7f0000004300)=""/163, 0xa3}, {&(0x7f0000002580)=""/229, 0xe5}, {&(0x7f0000002680)=""/216, 0xd8}], 0xa, &(0x7f0000002840)=""/243, 0xf3}, 0x8}, {{&(0x7f0000002940)=@nfc, 0x80, &(0x7f0000003e40)=[{&(0x7f0000000e80)}, {&(0x7f00000029c0)=""/70, 0x46}, {&(0x7f0000002a40)=""/188, 0xbc}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/252, 0xfc}, {&(0x7f0000003c00)=""/113, 0x71}, {&(0x7f0000000c40)=""/35, 0x23}, {0x0}, {&(0x7f0000003d40)=""/240, 0xf0}], 0x9, &(0x7f0000003f00)=""/155, 0x9b}, 0xb2e}, {{0x0, 0x0, &(0x7f0000004180)=[{&(0x7f0000003fc0)=""/157, 0x9d}, {&(0x7f0000004080)}], 0x2}, 0x5}], 0x5, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f00000002c0)) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)={0xa, 0x4e28, 0x0, @ipv4={[], [], @rand_addr=0x64010101}, 0x8}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000004c0)}], 0x1, &(0x7f0000000ec0)=ANY=[@ANYBLOB="08010000000000002900000036000000331de514c9f00000c910ff0100000000000000000000000000010401020401e5c810fe800000000000001800000000100012050200090712b4734e5d81752c887d3878db2f002b512fb557f5a9c40843b38fbdcbc2c7454e2b9f36f94217d5160b1eb27c60662bf40ec5956c2c269e7a0f28e3bb0c07d8f6de7fc2dad631f0508ea25819e05798f2d937ad3e7d58e5fed16f5493ed4efd8c34297a3dfd8c45916f4dc93eaa21886c57d492d9fdf7573bc5a2707914a485aefbf7a2cb42cd4715fed9710a7f8d11172ed86e4c6aab5672039181e091955bf07c871fca0502ffffc20404000004c204000000700000000000000029000000040000002c0a000000000000e710fe80000000000000000000000000001c0740781f6af40e01ff00040000000000000003000000000000008000000000000000ff0000000000000001000000000000000300000000000000810000000000000004010900700000000000000029000000370d3685fe1cdb4f2ac950f38bc5eec91c173320ea9f440cd0fc3ab6d91832a985ef46c88a755ca69209e4158cf16e74b2421eb27b0f6f24764f1c2235227991c49fac44dcdda15c68e60ef9cbf73a21361ea2b8bd49f2ebaeffec65a744244daad344a3cd759bf915d6b5d3e8bdeaa8b2f5c1e2066b3f313184c871d2680e718dbb42c3f1aad67905dd2f453b34efba1e7f5ead227c62a51fd3c8cc388741a22eff1ea6992db43aa60a87"], 0x187}, 0x4000085) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext, 0x9000, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x807a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) [ 191.258330][ T29] audit: type=1804 audit(1590248496.601:9): pid=8509 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir672424111/syzkaller.GbH4XF/10/file0" dev="sda1" ino=15823 res=1 [ 191.301309][ T8508] IPVS: ftp: loaded support on port[0] = 21 15:41:36 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x40186366, 0x0) 15:41:36 executing program 1: r0 = socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) 15:41:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000e80)) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000041c0)=[{{&(0x7f0000000380)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/220, 0xdc}, {&(0x7f0000000580)=""/58, 0x3a}], 0x2, &(0x7f0000000600)=""/233, 0xe9}, 0xb}, {{&(0x7f0000000780)=@xdp, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000800)=""/55, 0x37}, {&(0x7f0000000840)=""/131, 0x83}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000000900)=""/109, 0x6d}, {&(0x7f0000000980)=""/104, 0x68}, {&(0x7f0000000a00)=""/144, 0x90}, {&(0x7f0000000ac0)=""/67, 0x43}], 0x7, &(0x7f0000000bc0)=""/98, 0x62}, 0x401}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/245, 0xf5}, {&(0x7f0000000d80)=""/230, 0xe6}, {&(0x7f0000002100)=""/241, 0xf1}, {&(0x7f0000002200)=""/180, 0xb4}, {&(0x7f00000022c0)=""/209, 0xd1}, {&(0x7f00000023c0)=""/242, 0xf2}, {&(0x7f0000004300)=""/163, 0xa3}, {&(0x7f0000002580)=""/229, 0xe5}, {&(0x7f0000002680)=""/216, 0xd8}], 0xa, &(0x7f0000002840)=""/243, 0xf3}, 0x8}, {{&(0x7f0000002940)=@nfc, 0x80, &(0x7f0000003e40)=[{&(0x7f0000000e80)}, {&(0x7f00000029c0)=""/70, 0x46}, {&(0x7f0000002a40)=""/188, 0xbc}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/252, 0xfc}, {&(0x7f0000003c00)=""/113, 0x71}, {&(0x7f0000000c40)=""/35, 0x23}, {0x0}, {&(0x7f0000003d40)=""/240, 0xf0}], 0x9, &(0x7f0000003f00)=""/155, 0x9b}, 0xb2e}, {{0x0, 0x0, &(0x7f0000004180)=[{&(0x7f0000003fc0)=""/157, 0x9d}, {&(0x7f0000004080)}], 0x2}, 0x5}], 0x5, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f00000002c0)) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)={0xa, 0x4e28, 0x0, @ipv4={[], [], @rand_addr=0x64010101}, 0x8}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000004c0)}], 0x1, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], 0x187}, 0x4000085) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext, 0x9000, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x807a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) [ 191.640832][ T8508] IPVS: ftp: loaded support on port[0] = 21 [ 191.673677][ T29] audit: type=1804 audit(1590248497.021:10): pid=8542 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir672424111/syzkaller.GbH4XF/10/file0" dev="sda1" ino=15823 res=1 15:41:37 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fde, 0x0) 15:41:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000005c40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=""/70, 0x46}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write(r1, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x0, 0x2) r3 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r2, r3, 0x0, 0x8400f7ffffe0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 15:41:37 executing program 1: r0 = socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) 15:41:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 15:41:37 executing program 4: unshare(0x44020600) open(&(0x7f0000000040)='./file0\x00', 0x2817e, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc020660b, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x0, 0x0, [{{}, 0x0, 0x0, 0x0, 0x2}]}) 15:41:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x9f9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000005c40)=[{{&(0x7f0000000b80)=@generic, 0x80, 0x0, 0x0, &(0x7f0000000780)=""/70, 0x46}}, {{0x0, 0x0, 0x0}, 0xffffff00}, {{&(0x7f0000001140)=@alg, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x4, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) lseek(r4, 0x0, 0x2) r5 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r4, r5, 0x0, 0x8400f7ffffe0) syz_genetlink_get_family_id$fou(0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) [ 192.203695][ T29] audit: type=1800 audit(1590248497.551:11): pid=8595 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=15827 res=0 [ 192.205438][ T8593] IPVS: ftp: loaded support on port[0] = 21 15:41:37 executing program 1: r0 = socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x40186366, 0x0) [ 192.279090][ T546] tipc: TX() has been purged, node left! [ 192.282694][ T29] audit: type=1804 audit(1590248497.601:12): pid=8596 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir672424111/syzkaller.GbH4XF/11/file0" dev="sda1" ino=15828 res=1 [ 192.472299][ T29] audit: type=1800 audit(1590248497.661:13): pid=8600 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15684 res=0 15:41:38 executing program 1: socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x40186366, 0x0) 15:41:38 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fde, 0x0) 15:41:38 executing program 4: unshare(0x44020600) open(&(0x7f0000000040)='./file0\x00', 0x2817e, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc020660b, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x0, 0x0, [{{}, 0x0, 0x0, 0x0, 0x2}]}) 15:41:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfffeffffffffffff, r3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8052, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="3d6561446faec4a12680202880c4035c18870df36415b71cdc7574010b59753f7addb533c9f978d1a94a2b4349449bc1e2c0e8000087c0d7cc30f9007d330867bc0000009d13d9bdfe61072bd40cb4cf410e838a8b0e4ff28f94bd97383f04f2857c89bc5a9b0ea09977394a7a5782f4a64623278c34a14747ad5f63928324e56ca3505c98281335071399eb8e5c6338b080020de34c6edca6f447871692a80be8c864ff4b335b03777d38c5e25e2455517904f1cd48d53d95ebe90db01bd6503e9b7d3d99faf071d17fc9fc3e58cb96612a1d6a6ff081bb14afd385226fcd664302b01ba0fb1ff72d264923b96bc3c9fb605c356a85a3b401c6608a1b2291fff72147ea80787c85bbcf2549538496711d5d61294cc2b5b6eb75174cedfffad7df"], 0x0, 0x0) r4 = gettid() r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r5, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x187) inotify_init1(0x0) dup(0xffffffffffffffff) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 15:41:38 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6(0xa, 0x3, 0x3a) recvfrom$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x30) 15:41:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 15:41:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "080002000000000008ff43944eeba71a4976e252922cb18f6e2e48ba000000012e0b385404b03ae96d09800000000000000101013c5811039e15825527ecba66fd767ce7a7f6e1b6b408561839ede6dd248a00000000000000000000000000000006ad8e5ecc326d3a09ffc2c6540200e4f200"}, 0x80) getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 15:41:38 executing program 1: socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x40186366, 0x0) [ 193.042534][ T8639] ptrace attach of "/root/syz-executor.3"[8638] was attempted by "/root/syz-executor.3"[8639] [ 193.100506][ T8640] IPVS: ftp: loaded support on port[0] = 21 15:41:38 executing program 1: socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8903, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x40186366, 0x0) [ 193.181944][ T29] audit: type=1804 audit(1590248498.531:14): pid=8653 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir672424111/syzkaller.GbH4XF/12/file0" dev="sda1" ino=15823 res=1 15:41:38 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x40186366, 0x0) 15:41:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "080002000000000008ff43944eeba71a4976e252922cb18f6e2e48ba000000012e0b385404b03ae96d09800000000000000101013c5811039e15825527ecba66fd767ce7a7f6e1b6b408561839ede6dd248a00000000000000000000000000000006ad8e5ecc326d3a09ffc2c6540200e4f200"}, 0x80) getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 15:41:38 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x40186366, 0x0) 15:41:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "080002000000000008ff43944eeba71a4976e252922cb18f6e2e48ba000000012e0b385404b03ae96d09800000000000000101013c5811039e15825527ecba66fd767ce7a7f6e1b6b408561839ede6dd248a00000000000000000000000000000006ad8e5ecc326d3a09ffc2c6540200e4f200"}, 0x80) getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 15:41:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "080002000000000008ff43944eeba71a4976e252922cb18f6e2e48ba000000012e0b385404b03ae96d09800000000000000101013c5811039e15825527ecba66fd767ce7a7f6e1b6b408561839ede6dd248a00000000000000000000000000000006ad8e5ecc326d3a09ffc2c6540200e4f200"}, 0x80) getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 15:41:39 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x40186366, 0x0) 15:41:39 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x2b, 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fde, 0x0) 15:41:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpid() sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) modify_ldt$write(0x1, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xfffeffffffffffff, r3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8052, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) getxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0, 0x0) r4 = gettid() r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r5, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x187) inotify_init1(0x0) dup(0xffffffffffffffff) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 15:41:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "080002000000000008ff43944eeba71a4976e252922cb18f6e2e48ba000000012e0b385404b03ae96d09800000000000000101013c5811039e15825527ecba66fd767ce7a7f6e1b6b408561839ede6dd248a00000000000000000000000000000006ad8e5ecc326d3a09ffc2c6540200e4f200"}, 0x80) getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 15:41:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 15:41:39 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x40186366, 0x0) 15:41:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "080002000000000008ff43944eeba71a4976e252922cb18f6e2e48ba000000012e0b385404b03ae96d09800000000000000101013c5811039e15825527ecba66fd767ce7a7f6e1b6b408561839ede6dd248a00000000000000000000000000000006ad8e5ecc326d3a09ffc2c6540200e4f200"}, 0x80) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 194.062228][ T8701] ptrace attach of "/root/syz-executor.5"[8700] was attempted by "/root/syz-executor.5"[8701] 15:41:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "080002000000000008ff43944eeba71a4976e252922cb18f6e2e48ba000000012e0b385404b03ae96d09800000000000000101013c5811039e15825527ecba66fd767ce7a7f6e1b6b408561839ede6dd248a00000000000000000000000000000006ad8e5ecc326d3a09ffc2c6540200e4f200"}, 0x80) getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 15:41:39 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x40186366, 0x0) 15:41:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) socket(0x11, 0x800000003, 0x0) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 15:41:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "080002000000000008ff43944eeba71a4976e252922cb18f6e2e48ba000000012e0b385404b03ae96d09800000000000000101013c5811039e15825527ecba66fd767ce7a7f6e1b6b408561839ede6dd248a00000000000000000000000000000006ad8e5ecc326d3a09ffc2c6540200e4f200"}, 0x80) getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 15:41:39 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8903, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x40186366, 0x0) 15:41:40 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x2b, 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fde, 0x0) 15:41:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "080002000000000008ff43944eeba71a4976e252922cb18f6e2e48ba000000012e0b385404b03ae96d09800000000000000101013c5811039e15825527ecba66fd767ce7a7f6e1b6b408561839ede6dd248a00000000000000000000000000000006ad8e5ecc326d3a09ffc2c6540200e4f200"}, 0x80) getsockname$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) 15:41:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 15:41:40 executing program 1: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x909, 0x0) 15:41:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x12, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 15:41:40 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x12, r0, 0x0) syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 15:41:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 15:41:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "080002000000000008ff43944eeba71a4976e252922cb18f6e2e48ba000000012e0b385404b03ae96d09800000000000000101013c5811039e15825527ecba66fd767ce7a7f6e1b6b408561839ede6dd248a00000000000000000000000000000006ad8e5ecc326d3a09ffc2c6540200e4f200"}, 0x80) 15:41:40 executing program 1: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x56a, 0x314, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000000)={0x24, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="002201"], 0x0}, 0x0) 15:41:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 15:41:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) socket(0x11, 0x800000003, 0x0) 15:41:40 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 195.399156][ T2477] usb 2-1: new high-speed USB device number 2 using dummy_hcd 15:41:41 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x2b, 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fde, 0x0) 15:41:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) 15:41:41 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @remote}}}], 0x20}}], 0x1, 0x0) 15:41:41 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000800)=[{{&(0x7f0000000100)={0x2, 0x4e20, @dev}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @remote}}}], 0x20}}], 0x1, 0x0) [ 195.849342][ T2477] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 195.886220][ T2477] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 15:41:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffdffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x12, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 15:41:41 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x12, r0, 0x0) syz_read_part_table(0x0, 0xb784, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff0a000000ff45ac00000000006300e931190000000000000680ffffffa5000000e100e2ff877700720030070081ffffff00000000008000da55aa", 0x40, 0x1c0}]) 15:41:41 executing program 4: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) [ 195.932297][ T2477] usb 2-1: New USB device found, idVendor=056a, idProduct=0314, bcdDevice= 0.40 [ 195.980343][ T2477] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 196.035146][ T2477] usb 2-1: config 0 descriptor?? 15:41:41 executing program 4: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x5, &(0x7f0000000080)=0x32, 0x4) [ 196.564576][ T2477] wacom 0003:056A:0314.0001: unknown main item tag 0x0 [ 196.610316][ T2477] wacom 0003:056A:0314.0001: Unknown device_type for 'HID 056a:0314'. Assuming pen. [ 196.696123][ T2477] input: Wacom Intuos Pro S Pen as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:056A:0314.0001/input/input5 [ 196.799417][ T2477] wacom 0003:056A:0314.0001: hidraw0: USB HID v0.00 Device [HID 056a:0314] on usb-dummy_hcd.1-1/input0 [ 196.854602][ T2477] usb 2-1: USB disconnect, device number 2 [ 196.913841][ T2477] ================================================================== [ 196.922187][ T2477] BUG: KASAN: use-after-free in __mutex_lock+0x1033/0x13c0 [ 196.929404][ T2477] Read of size 8 at addr ffff8880a7bfa150 by task kworker/0:2/2477 [ 196.937300][ T2477] [ 196.939647][ T2477] CPU: 0 PID: 2477 Comm: kworker/0:2 Not tainted 5.7.0-rc6-next-20200522-syzkaller #0 [ 196.949189][ T2477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.959270][ T2477] Workqueue: usb_hub_wq hub_event [ 196.964325][ T2477] Call Trace: [ 196.967635][ T2477] dump_stack+0x18f/0x20d [ 196.972044][ T2477] ? __mutex_lock+0x1033/0x13c0 [ 196.976927][ T2477] ? __mutex_lock+0x1033/0x13c0 [ 196.981799][ T2477] print_address_description.constprop.0.cold+0xd3/0x413 [ 196.988838][ T2477] ? cdev_device_del+0x69/0x80 [ 196.993912][ T2477] ? mousedev_destroy+0x20/0xa0 [ 196.999741][ T2477] ? __input_unregister_device+0x1b0/0x430 [ 197.005574][ T2477] ? release_nodes+0x499/0x910 [ 197.010357][ T2477] ? devres_release_group+0x160/0x210 [ 197.015738][ T2477] ? vprintk_func+0x97/0x1a6 [ 197.020334][ T2477] ? __mutex_lock+0x1033/0x13c0 [ 197.025188][ T2477] kasan_report.cold+0x1f/0x37 [ 197.029964][ T2477] ? __mutex_lock+0x1033/0x13c0 [ 197.034822][ T2477] __mutex_lock+0x1033/0x13c0 [ 197.039515][ T2477] ? mousedev_cleanup+0x21/0x180 [ 197.044469][ T2477] ? print_usage_bug+0x240/0x240 [ 197.049420][ T2477] ? trace_hardirqs_off+0x50/0x220 [ 197.054554][ T2477] ? mutex_trylock+0x2c0/0x2c0 [ 197.059329][ T2477] ? mark_held_locks+0x9f/0xe0 [ 197.064098][ T2477] ? kfree+0x1eb/0x2b0 [ 197.068177][ T2477] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 197.074212][ T2477] ? kfree_const+0x51/0x60 [ 197.078653][ T2477] ? mousedev_cleanup+0x21/0x180 [ 197.083624][ T2477] mousedev_cleanup+0x21/0x180 [ 197.088399][ T2477] mousedev_destroy+0x28/0xa0 [ 197.093084][ T2477] __input_unregister_device+0x1b0/0x430 [ 197.098726][ T2477] release_nodes+0x499/0x910 [ 197.103333][ T2477] ? devres_remove_group+0x440/0x440 [ 197.108632][ T2477] devres_release_group+0x160/0x210 [ 197.113845][ T2477] wacom_remove+0x244/0x3b0 [ 197.118358][ T2477] hid_device_remove+0xed/0x240 [ 197.123215][ T2477] ? wacom_close+0x80/0x80 [ 197.127643][ T2477] ? hid_compare_device_paths+0xc0/0xc0 [ 197.133189][ T2477] device_release_driver_internal+0x231/0x500 [ 197.139275][ T2477] bus_remove_device+0x2dc/0x4a0 [ 197.144231][ T2477] device_del+0x481/0xd30 [ 197.148584][ T2477] ? device_link_add_missing_supplier_links+0x370/0x370 [ 197.155533][ T2477] ? mark_held_locks+0x9f/0xe0 [ 197.160316][ T2477] ? _raw_spin_unlock_irq+0x1f/0x80 [ 197.165533][ T2477] hid_destroy_device+0xe1/0x150 [ 197.170520][ T2477] usbhid_disconnect+0x9f/0xe0 [ 197.175332][ T2477] usb_unbind_interface+0x1bd/0x8a0 [ 197.180558][ T2477] ? __pm_runtime_idle+0xd1/0x320 [ 197.185620][ T2477] ? usb_autoresume_device+0x60/0x60 [ 197.190928][ T2477] device_release_driver_internal+0x432/0x500 [ 197.197034][ T2477] bus_remove_device+0x2dc/0x4a0 [ 197.202016][ T2477] device_del+0x481/0xd30 [ 197.206378][ T2477] ? device_link_add_missing_supplier_links+0x370/0x370 [ 197.213326][ T2477] ? usb_remove_ep_devs+0x3e/0x80 [ 197.218366][ T2477] ? remove_intf_ep_devs+0x13f/0x1d0 [ 197.223676][ T2477] usb_disable_device+0x211/0x690 [ 197.228725][ T2477] usb_disconnect+0x284/0x8d0 [ 197.233427][ T2477] hub_event+0x17ca/0x38f0 [ 197.237899][ T2477] ? hub_port_debounce+0x260/0x260 [ 197.243029][ T2477] ? usermodehelper_read_trylock+0xf0/0x2d0 [ 197.249036][ T2477] ? debug_smp_processor_id+0x2f/0x185 [ 197.254516][ T2477] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 197.260083][ T2477] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 197.266095][ T2477] process_one_work+0x965/0x16a0 [ 197.271063][ T2477] ? lock_release+0x800/0x800 [ 197.275754][ T2477] ? pwq_dec_nr_in_flight+0x310/0x310 [ 197.281152][ T2477] ? rwlock_bug.part.0+0x90/0x90 [ 197.286129][ T2477] worker_thread+0x7ab/0xe20 [ 197.290754][ T2477] ? process_one_work+0x16a0/0x16a0 [ 197.295970][ T2477] kthread+0x3b5/0x4a0 [ 197.300057][ T2477] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 197.305794][ T2477] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 197.311555][ T2477] ret_from_fork+0x24/0x30 [ 197.315997][ T2477] [ 197.318348][ T2477] Allocated by task 2477: [ 197.322694][ T2477] save_stack+0x1b/0x40 [ 197.326861][ T2477] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 197.332504][ T2477] kmem_cache_alloc_trace+0x153/0x7d0 [ 197.337905][ T2477] mousedev_create+0x90/0xa20 [ 197.342601][ T2477] mousedev_connect+0x20/0x280 [ 197.347413][ T2477] input_attach_handler+0x194/0x200 [ 197.352627][ T2477] input_register_device.cold+0xf5/0x246 [ 197.358279][ T2477] wacom_parse_and_register+0x3936/0x53e0 [ 197.364018][ T2477] wacom_probe+0x96b/0xbc0 [ 197.368444][ T2477] hid_device_probe+0x2be/0x3f0 [ 197.373304][ T2477] really_probe+0x281/0x6d0 [ 197.377817][ T2477] driver_probe_device+0xfe/0x1d0 [ 197.382859][ T2477] __device_attach_driver+0x1c2/0x220 [ 197.388245][ T2477] bus_for_each_drv+0x162/0x1e0 [ 197.393113][ T2477] __device_attach+0x21a/0x360 [ 197.397901][ T2477] bus_probe_device+0x1e4/0x290 [ 197.402765][ T2477] device_add+0xaf1/0x1900 [ 197.407193][ T2477] hid_add_device+0x33c/0x9a0 [ 197.411881][ T2477] usbhid_probe+0xac8/0xff0 [ 197.416426][ T2477] usb_probe_interface+0x305/0x7a0 [ 197.421572][ T2477] really_probe+0x281/0x6d0 [ 197.426089][ T2477] driver_probe_device+0xfe/0x1d0 [ 197.431132][ T2477] __device_attach_driver+0x1c2/0x220 [ 197.436518][ T2477] bus_for_each_drv+0x162/0x1e0 [ 197.441383][ T2477] __device_attach+0x21a/0x360 [ 197.446202][ T2477] bus_probe_device+0x1e4/0x290 [ 197.451068][ T2477] device_add+0xaf1/0x1900 [ 197.455523][ T2477] usb_set_configuration+0xec5/0x1740 [ 197.460913][ T2477] usb_generic_driver_probe+0x9d/0xe0 [ 197.466303][ T2477] usb_probe_device+0xc6/0x1f0 [ 197.471085][ T2477] really_probe+0x281/0x6d0 [ 197.475606][ T2477] driver_probe_device+0xfe/0x1d0 [ 197.480645][ T2477] __device_attach_driver+0x1c2/0x220 [ 197.486030][ T2477] bus_for_each_drv+0x162/0x1e0 [ 197.490897][ T2477] __device_attach+0x21a/0x360 [ 197.495674][ T2477] bus_probe_device+0x1e4/0x290 [ 197.500537][ T2477] device_add+0xaf1/0x1900 [ 197.504976][ T2477] usb_new_device.cold+0x753/0x103d [ 197.510190][ T2477] hub_event+0x1eca/0x38f0 [ 197.514647][ T2477] process_one_work+0x965/0x16a0 [ 197.519600][ T2477] worker_thread+0x96/0xe20 [ 197.524110][ T2477] kthread+0x3b5/0x4a0 [ 197.528194][ T2477] ret_from_fork+0x24/0x30 [ 197.532612][ T2477] [ 197.534953][ T2477] Freed by task 2477: [ 197.538948][ T2477] save_stack+0x1b/0x40 [ 197.543110][ T2477] __kasan_slab_free+0xf7/0x140 [ 197.547970][ T2477] kfree+0x109/0x2b0 [ 197.551872][ T2477] device_release+0x71/0x200 [ 197.556474][ T2477] kobject_put+0x1c8/0x2f0 [ 197.560908][ T2477] cdev_device_del+0x69/0x80 [ 197.565522][ T2477] mousedev_destroy+0x20/0xa0 [ 197.570216][ T2477] __input_unregister_device+0x1b0/0x430 [ 197.575886][ T2477] release_nodes+0x499/0x910 [ 197.580493][ T2477] devres_release_group+0x160/0x210 [ 197.585727][ T2477] wacom_remove+0x244/0x3b0 [ 197.590245][ T2477] hid_device_remove+0xed/0x240 [ 197.595112][ T2477] device_release_driver_internal+0x231/0x500 [ 197.601195][ T2477] bus_remove_device+0x2dc/0x4a0 [ 197.606152][ T2477] device_del+0x481/0xd30 [ 197.610495][ T2477] hid_destroy_device+0xe1/0x150 [ 197.615447][ T2477] usbhid_disconnect+0x9f/0xe0 [ 197.620228][ T2477] usb_unbind_interface+0x1bd/0x8a0 [ 197.625441][ T2477] device_release_driver_internal+0x432/0x500 [ 197.631669][ T2477] bus_remove_device+0x2dc/0x4a0 [ 197.636624][ T2477] device_del+0x481/0xd30 [ 197.640971][ T2477] usb_disable_device+0x211/0x690 [ 197.646024][ T2477] usb_disconnect+0x284/0x8d0 [ 197.650716][ T2477] hub_event+0x17ca/0x38f0 [ 197.656740][ T2477] process_one_work+0x965/0x16a0 [ 197.661695][ T2477] worker_thread+0x7ab/0xe20 [ 197.666303][ T2477] kthread+0x3b5/0x4a0 [ 197.670389][ T2477] ret_from_fork+0x24/0x30 [ 197.674837][ T2477] [ 197.677176][ T2477] The buggy address belongs to the object at ffff8880a7bfa000 [ 197.677176][ T2477] which belongs to the cache kmalloc-2k of size 2048 [ 197.691240][ T2477] The buggy address is located 336 bytes inside of [ 197.691240][ T2477] 2048-byte region [ffff8880a7bfa000, ffff8880a7bfa800) [ 197.704600][ T2477] The buggy address belongs to the page: [ 197.710249][ T2477] page:ffffea00029efe80 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 [ 197.719366][ T2477] flags: 0xfffe0000000200(slab) [ 197.724233][ T2477] raw: 00fffe0000000200 ffffea00028ebb08 ffffea00029095c8 ffff8880aa000e00 [ 197.732860][ T2477] raw: 0000000000000000 ffff8880a7bfa000 0000000100000001 0000000000000000 [ 197.741448][ T2477] page dumped because: kasan: bad access detected [ 197.747864][ T2477] [ 197.750197][ T2477] Memory state around the buggy address: [ 197.755837][ T2477] ffff8880a7bfa000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.763944][ T2477] ffff8880a7bfa080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.772057][ T2477] >ffff8880a7bfa100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.780126][ T2477] ^ [ 197.786813][ T2477] ffff8880a7bfa180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.794891][ T2477] ffff8880a7bfa200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 197.802973][ T2477] ================================================================== [ 197.811126][ T2477] Disabling lock debugging due to kernel taint [ 197.915654][ T2477] Kernel panic - not syncing: panic_on_warn set ... [ 197.922286][ T2477] CPU: 0 PID: 2477 Comm: kworker/0:2 Tainted: G B 5.7.0-rc6-next-20200522-syzkaller #0 [ 197.933238][ T2477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.943331][ T2477] Workqueue: usb_hub_wq hub_event [ 197.948350][ T2477] Call Trace: [ 197.951670][ T2477] dump_stack+0x18f/0x20d [ 197.956008][ T2477] ? __mutex_lock+0xf50/0x13c0 [ 197.960786][ T2477] panic+0x2e3/0x75c [ 197.964692][ T2477] ? __warn_printk+0xf3/0xf3 [ 197.969296][ T2477] ? preempt_schedule_common+0x5e/0xc0 [ 197.974760][ T2477] ? __mutex_lock+0x1033/0x13c0 [ 197.979615][ T2477] ? __mutex_lock+0x1033/0x13c0 [ 197.984476][ T2477] ? preempt_schedule_thunk+0x16/0x18 [ 197.989854][ T2477] ? trace_hardirqs_on+0x55/0x230 [ 197.994884][ T2477] ? __mutex_lock+0x1033/0x13c0 [ 197.999737][ T2477] ? __mutex_lock+0x1033/0x13c0 [ 198.004595][ T2477] end_report+0x4d/0x53 [ 198.011040][ T2477] kasan_report.cold+0xd/0x37 [ 198.015730][ T2477] ? __mutex_lock+0x1033/0x13c0 [ 198.020587][ T2477] __mutex_lock+0x1033/0x13c0 [ 198.025271][ T2477] ? mousedev_cleanup+0x21/0x180 [ 198.030247][ T2477] ? print_usage_bug+0x240/0x240 [ 198.035191][ T2477] ? trace_hardirqs_off+0x50/0x220 [ 198.040307][ T2477] ? mutex_trylock+0x2c0/0x2c0 [ 198.045078][ T2477] ? mark_held_locks+0x9f/0xe0 [ 198.049874][ T2477] ? kfree+0x1eb/0x2b0 [ 198.053955][ T2477] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 198.059943][ T2477] ? kfree_const+0x51/0x60 [ 198.064378][ T2477] ? mousedev_cleanup+0x21/0x180 [ 198.069320][ T2477] mousedev_cleanup+0x21/0x180 [ 198.074090][ T2477] mousedev_destroy+0x28/0xa0 [ 198.078779][ T2477] __input_unregister_device+0x1b0/0x430 [ 198.084420][ T2477] release_nodes+0x499/0x910 [ 198.089017][ T2477] ? devres_remove_group+0x440/0x440 [ 198.094319][ T2477] devres_release_group+0x160/0x210 [ 198.099524][ T2477] wacom_remove+0x244/0x3b0 [ 198.104039][ T2477] hid_device_remove+0xed/0x240 [ 198.108892][ T2477] ? wacom_close+0x80/0x80 [ 198.113318][ T2477] ? hid_compare_device_paths+0xc0/0xc0 [ 198.118870][ T2477] device_release_driver_internal+0x231/0x500 [ 198.124954][ T2477] bus_remove_device+0x2dc/0x4a0 [ 198.129910][ T2477] device_del+0x481/0xd30 [ 198.134254][ T2477] ? device_link_add_missing_supplier_links+0x370/0x370 [ 198.141221][ T2477] ? mark_held_locks+0x9f/0xe0 [ 198.145995][ T2477] ? _raw_spin_unlock_irq+0x1f/0x80 [ 198.151206][ T2477] hid_destroy_device+0xe1/0x150 [ 198.156152][ T2477] usbhid_disconnect+0x9f/0xe0 [ 198.160929][ T2477] usb_unbind_interface+0x1bd/0x8a0 [ 198.166149][ T2477] ? __pm_runtime_idle+0xd1/0x320 [ 198.171181][ T2477] ? usb_autoresume_device+0x60/0x60 [ 198.176471][ T2477] device_release_driver_internal+0x432/0x500 [ 198.182550][ T2477] bus_remove_device+0x2dc/0x4a0 [ 198.187497][ T2477] device_del+0x481/0xd30 [ 198.191857][ T2477] ? device_link_add_missing_supplier_links+0x370/0x370 [ 198.198800][ T2477] ? usb_remove_ep_devs+0x3e/0x80 [ 198.203829][ T2477] ? remove_intf_ep_devs+0x13f/0x1d0 [ 198.209123][ T2477] usb_disable_device+0x211/0x690 [ 198.214162][ T2477] usb_disconnect+0x284/0x8d0 [ 198.218848][ T2477] hub_event+0x17ca/0x38f0 [ 198.223282][ T2477] ? hub_port_debounce+0x260/0x260 [ 198.228400][ T2477] ? usermodehelper_read_trylock+0xf0/0x2d0 [ 198.234332][ T2477] ? debug_smp_processor_id+0x2f/0x185 [ 198.239813][ T2477] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 198.245375][ T2477] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 198.251375][ T2477] process_one_work+0x965/0x16a0 [ 198.256326][ T2477] ? lock_release+0x800/0x800 [ 198.261014][ T2477] ? pwq_dec_nr_in_flight+0x310/0x310 [ 198.266393][ T2477] ? rwlock_bug.part.0+0x90/0x90 [ 198.271338][ T2477] worker_thread+0x7ab/0xe20 [ 198.275941][ T2477] ? process_one_work+0x16a0/0x16a0 [ 198.281140][ T2477] kthread+0x3b5/0x4a0 [ 198.285214][ T2477] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 198.290940][ T2477] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 198.296664][ T2477] ret_from_fork+0x24/0x30 [ 198.302353][ T2477] Kernel Offset: disabled [ 198.306674][ T2477] Rebooting in 86400 seconds..