[ 50.772025][ T27] audit: type=1800 audit(1577721282.064:21): pid=7737 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 50.813687][ T27] audit: type=1800 audit(1577721282.064:22): pid=7737 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 51.830022][ T7804] sshd (7804) used greatest stack depth: 10136 bytes left [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.183' (ECDSA) to the list of known hosts. 2019/12/30 15:54:52 fuzzer started 2019/12/30 15:54:54 dialing manager at 10.128.0.105:34777 2019/12/30 15:54:54 syscalls: 2695 2019/12/30 15:54:54 code coverage: enabled 2019/12/30 15:54:54 comparison tracing: enabled 2019/12/30 15:54:54 extra coverage: enabled 2019/12/30 15:54:54 setuid sandbox: enabled 2019/12/30 15:54:54 namespace sandbox: enabled 2019/12/30 15:54:54 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/30 15:54:54 fault injection: enabled 2019/12/30 15:54:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/30 15:54:54 net packet injection: enabled 2019/12/30 15:54:54 net device setup: enabled 2019/12/30 15:54:54 concurrency sanitizer: enabled 2019/12/30 15:54:54 devlink PCI setup: PCI device 0000:00:10.0 is not available 2019/12/30 15:54:54 adding functions to KCSAN blacklist: 'tomoyo_supervisor' '__hrtimer_run_queues' 15:54:56 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = inotify_init1(0x0) r3 = dup3(r0, r2, 0x0) bind(r3, &(0x7f00000000c0)=@generic={0x10, "e4a78707aee5ad63b84e795af5a89b0a340a717ceeae16cd2ffc9c92fdc5f8e3cb9167c6623dcd2f18c903c678f92e5fe991458e2a5eda4be0842c3c82e5e38541857153a416faa555fa65f0407cd7b4b90bf246f98e336e0338687d5fa361074bae5b26e766c13dd38f03e4c029ce24c6fcc2b2813983cdcc78c3363bf5"}, 0x80) 15:54:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8}, @IFLA_GRE_OFLAGS={0x8}]]}}}]}, 0x48}}, 0x0) syzkaller login: [ 65.476901][ T7910] IPVS: ftp: loaded support on port[0] = 21 [ 65.572356][ T7910] chnl_net:caif_netlink_parms(): no params data found [ 65.643625][ T7910] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.660255][ T7910] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.668074][ T7910] device bridge_slave_0 entered promiscuous mode [ 65.691472][ T7910] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.698645][ T7910] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.706588][ T7910] device bridge_slave_1 entered promiscuous mode [ 65.718980][ T7913] IPVS: ftp: loaded support on port[0] = 21 [ 65.742348][ T7910] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 65.763288][ T7910] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 15:54:57 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) r1 = socket$inet6(0xa, 0x200000000003, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0xff, 0x8001}, 0x20) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000240)={@remote, 0x0, 0x0, 0x2000ff, 0x41}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@rand_addr="c84b735dfd6a7e364f1bd2500d523c7d", 0x800, 0x2}, 0x20) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000000)=0x47ffee) r3 = epoll_create(0x9) ppoll(&(0x7f00000000c0)=[{r3}, {r0, 0x40}], 0x2, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000280)={0xc0000008}) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="89", 0x1}], 0x1, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x15, &(0x7f0000d84ffc)=0xbd, 0x4) setsockopt$sock_int(r4, 0x1, 0x80000000009, &(0x7f0000000000)=0x425c00000, 0x71) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RMKDIR(r8, &(0x7f00000001c0)={0x14, 0x49, 0x2, {0xa, 0x1, 0x7}}, 0x14) rt_tgsigqueueinfo(r5, r5, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0x0, 0x0, 0x8, &(0x7f0000000100)) socket(0x10, 0x400000000080803, 0x0) [ 65.800946][ T7910] team0: Port device team_slave_0 added [ 65.834922][ T7910] team0: Port device team_slave_1 added [ 65.922605][ T7910] device hsr_slave_0 entered promiscuous mode [ 65.960618][ T7910] device hsr_slave_1 entered promiscuous mode [ 66.011188][ T7913] chnl_net:caif_netlink_parms(): no params data found [ 66.042262][ T7916] IPVS: ftp: loaded support on port[0] = 21 15:54:57 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x44, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) [ 66.079465][ T7910] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 66.143726][ T7910] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 66.202470][ T7913] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.209596][ T7913] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.220239][ T7913] device bridge_slave_0 entered promiscuous mode [ 66.234222][ T7910] netdevsim netdevsim0 netdevsim2: renamed from eth2 15:54:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000080)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6804890339fb4c7d", 0x20}, {&(0x7f0000000180)="e31520aa566f103686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a822100b301f45542d83e05d01a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x3c0}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x0) [ 66.272377][ T7910] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 66.332217][ T7913] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.339361][ T7913] bridge0: port 2(bridge_slave_1) entered disabled state [ 66.360986][ T7913] device bridge_slave_1 entered promiscuous mode [ 66.397402][ T7918] IPVS: ftp: loaded support on port[0] = 21 [ 66.400015][ T7910] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.410503][ T7910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.417791][ T7910] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.424876][ T7910] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.463704][ T7922] IPVS: ftp: loaded support on port[0] = 21 [ 66.477674][ T7913] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 66.494160][ T7913] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 66.545907][ T7913] team0: Port device team_slave_0 added [ 66.562326][ T7913] team0: Port device team_slave_1 added [ 66.602306][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.611932][ T17] bridge0: port 2(bridge_slave_1) entered disabled state 15:54:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000280)={0x1, 0x0, [{0x413}]}) [ 66.702272][ T7913] device hsr_slave_0 entered promiscuous mode [ 66.751512][ T7913] device hsr_slave_1 entered promiscuous mode [ 66.790344][ T7913] debugfs: Directory 'hsr0' with parent '/' already present! [ 66.834955][ T7916] chnl_net:caif_netlink_parms(): no params data found [ 66.853289][ T7922] chnl_net:caif_netlink_parms(): no params data found [ 66.876619][ T7925] IPVS: ftp: loaded support on port[0] = 21 [ 66.937476][ T7910] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.965969][ T7922] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.973441][ T7922] bridge0: port 1(bridge_slave_0) entered disabled state [ 66.981624][ T7922] device bridge_slave_0 entered promiscuous mode [ 66.988690][ T7913] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 67.046279][ T7913] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 67.092671][ T7918] chnl_net:caif_netlink_parms(): no params data found [ 67.111850][ T7922] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.119758][ T7922] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.127473][ T7922] device bridge_slave_1 entered promiscuous mode [ 67.138661][ T7916] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.155008][ T7916] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.162872][ T7916] device bridge_slave_0 entered promiscuous mode [ 67.170065][ T7913] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 67.254841][ T7913] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 67.326348][ T7916] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.335345][ T7916] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.343808][ T7916] device bridge_slave_1 entered promiscuous mode [ 67.367011][ T7910] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.378744][ T7922] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.389425][ T7922] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.400173][ T7916] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 67.423697][ T3607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.432539][ T3607] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.455058][ T7916] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 67.471453][ T7922] team0: Port device team_slave_0 added [ 67.477988][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.486813][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.495355][ T2650] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.503479][ T2650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.511751][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.521075][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.529459][ T2650] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.536776][ T2650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.544639][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.591214][ T7922] team0: Port device team_slave_1 added [ 67.603315][ T7916] team0: Port device team_slave_0 added [ 67.611908][ T7925] chnl_net:caif_netlink_parms(): no params data found [ 67.623279][ T7916] team0: Port device team_slave_1 added [ 67.629853][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.639067][ T7918] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.646185][ T7918] bridge0: port 1(bridge_slave_0) entered disabled state [ 67.653971][ T7918] device bridge_slave_0 entered promiscuous mode [ 67.661933][ T7918] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.669166][ T7918] bridge0: port 2(bridge_slave_1) entered disabled state [ 67.677567][ T7918] device bridge_slave_1 entered promiscuous mode [ 67.709962][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.719266][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.727991][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.782720][ T7922] device hsr_slave_0 entered promiscuous mode [ 67.850474][ T7922] device hsr_slave_1 entered promiscuous mode [ 67.900319][ T7922] debugfs: Directory 'hsr0' with parent '/' already present! [ 67.921115][ T3607] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.930005][ T3607] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.941201][ T7918] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.002517][ T7916] device hsr_slave_0 entered promiscuous mode [ 68.060768][ T7916] device hsr_slave_1 entered promiscuous mode [ 68.110370][ T7916] debugfs: Directory 'hsr0' with parent '/' already present! [ 68.121827][ T7918] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.166208][ T7922] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 68.216715][ T7922] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 68.263693][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.273047][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.282378][ T7925] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.289509][ T7925] bridge0: port 1(bridge_slave_0) entered disabled state [ 68.298480][ T7925] device bridge_slave_0 entered promiscuous mode [ 68.307346][ T7925] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.315047][ T7925] bridge0: port 2(bridge_slave_1) entered disabled state [ 68.322872][ T7925] device bridge_slave_1 entered promiscuous mode [ 68.341907][ T7918] team0: Port device team_slave_0 added [ 68.348010][ T7922] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 68.424132][ T7922] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 68.493177][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.502086][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.521337][ T7918] team0: Port device team_slave_1 added [ 68.528508][ T7925] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 68.538067][ T7916] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 68.572321][ T7916] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 68.612833][ T7916] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 68.652856][ T7916] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 68.713551][ T7925] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 68.741638][ T7910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 68.771956][ T7925] team0: Port device team_slave_0 added [ 68.822127][ T7918] device hsr_slave_0 entered promiscuous mode [ 68.860757][ T7918] device hsr_slave_1 entered promiscuous mode [ 68.920414][ T7918] debugfs: Directory 'hsr0' with parent '/' already present! [ 68.952250][ T7913] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.960775][ T7925] team0: Port device team_slave_1 added [ 68.982782][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 68.990662][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 69.000880][ T7910] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 69.019665][ T7913] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.040346][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.051720][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.059719][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.068598][ T7921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.079823][ T7921] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.087054][ T7921] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.107764][ T7918] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 69.147627][ T7918] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 69.195612][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.220623][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.230909][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 15:55:00 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = inotify_init1(0x0) r3 = dup3(r0, r2, 0x0) bind(r3, &(0x7f00000000c0)=@generic={0x10, "e4a78707aee5ad63b84e795af5a89b0a340a717ceeae16cd2ffc9c92fdc5f8e3cb9167c6623dcd2f18c903c678f92e5fe991458e2a5eda4be0842c3c82e5e38541857153a416faa555fa65f0407cd7b4b90bf246f98e336e0338687d5fa361074bae5b26e766c13dd38f03e4c029ce24c6fcc2b2813983cdcc78c3363bf5"}, 0x80) [ 69.239341][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.246602][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.271010][ T7918] netdevsim netdevsim3 netdevsim2: renamed from eth2 15:55:00 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = inotify_init1(0x0) r3 = dup3(r0, r2, 0x0) bind(r3, &(0x7f00000000c0)=@generic={0x10, "e4a78707aee5ad63b84e795af5a89b0a340a717ceeae16cd2ffc9c92fdc5f8e3cb9167c6623dcd2f18c903c678f92e5fe991458e2a5eda4be0842c3c82e5e38541857153a416faa555fa65f0407cd7b4b90bf246f98e336e0338687d5fa361074bae5b26e766c13dd38f03e4c029ce24c6fcc2b2813983cdcc78c3363bf5"}, 0x80) [ 69.312834][ T7918] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 69.352561][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 69.365784][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 69.374996][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 69.386944][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.407623][ T7922] 8021q: adding VLAN 0 to HW filter on device bond0 15:55:00 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = inotify_init1(0x0) r3 = dup3(r0, r2, 0x0) bind(r3, &(0x7f00000000c0)=@generic={0x10, "e4a78707aee5ad63b84e795af5a89b0a340a717ceeae16cd2ffc9c92fdc5f8e3cb9167c6623dcd2f18c903c678f92e5fe991458e2a5eda4be0842c3c82e5e38541857153a416faa555fa65f0407cd7b4b90bf246f98e336e0338687d5fa361074bae5b26e766c13dd38f03e4c029ce24c6fcc2b2813983cdcc78c3363bf5"}, 0x80) [ 69.452427][ T7925] device hsr_slave_0 entered promiscuous mode 15:55:00 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = inotify_init1(0x0) r3 = dup3(r0, r2, 0x0) bind(r3, &(0x7f00000000c0)=@generic={0x10, "e4a78707aee5ad63b84e795af5a89b0a340a717ceeae16cd2ffc9c92fdc5f8e3cb9167c6623dcd2f18c903c678f92e5fe991458e2a5eda4be0842c3c82e5e38541857153a416faa555fa65f0407cd7b4b90bf246f98e336e0338687d5fa361074bae5b26e766c13dd38f03e4c029ce24c6fcc2b2813983cdcc78c3363bf5"}, 0x80) [ 69.510573][ T7925] device hsr_slave_1 entered promiscuous mode 15:55:00 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = inotify_init1(0x0) r3 = dup3(r0, r2, 0x0) bind(r3, &(0x7f00000000c0)=@generic={0x10, "e4a78707aee5ad63b84e795af5a89b0a340a717ceeae16cd2ffc9c92fdc5f8e3cb9167c6623dcd2f18c903c678f92e5fe991458e2a5eda4be0842c3c82e5e38541857153a416faa555fa65f0407cd7b4b90bf246f98e336e0338687d5fa361074bae5b26e766c13dd38f03e4c029ce24c6fcc2b2813983cdcc78c3363bf5"}, 0x80) [ 69.560254][ T7925] debugfs: Directory 'hsr0' with parent '/' already present! 15:55:00 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = inotify_init1(0x0) r3 = dup3(r0, r2, 0x0) bind(r3, &(0x7f00000000c0)=@generic={0x10, "e4a78707aee5ad63b84e795af5a89b0a340a717ceeae16cd2ffc9c92fdc5f8e3cb9167c6623dcd2f18c903c678f92e5fe991458e2a5eda4be0842c3c82e5e38541857153a416faa555fa65f0407cd7b4b90bf246f98e336e0338687d5fa361074bae5b26e766c13dd38f03e4c029ce24c6fcc2b2813983cdcc78c3363bf5"}, 0x80) [ 69.605088][ T7916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 69.627530][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 69.642427][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 69.664347][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 69.677232][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 69.687029][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 69.703354][ T7922] 8021q: adding VLAN 0 to HW filter on device team0 15:55:01 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = inotify_init1(0x0) r3 = dup3(r0, r2, 0x0) bind(r3, &(0x7f00000000c0)=@generic={0x10, "e4a78707aee5ad63b84e795af5a89b0a340a717ceeae16cd2ffc9c92fdc5f8e3cb9167c6623dcd2f18c903c678f92e5fe991458e2a5eda4be0842c3c82e5e38541857153a416faa555fa65f0407cd7b4b90bf246f98e336e0338687d5fa361074bae5b26e766c13dd38f03e4c029ce24c6fcc2b2813983cdcc78c3363bf5"}, 0x80) [ 69.724899][ T7913] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 69.737514][ T7913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 69.754416][ T7916] 8021q: adding VLAN 0 to HW filter on device team0 [ 69.793751][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.810951][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.823857][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 69.832440][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 69.843964][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 69.852389][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 69.891627][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 69.901274][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 69.909569][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.916758][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 69.924949][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 69.933944][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 69.942292][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.949352][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 69.957421][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 69.966667][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 69.976029][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 69.984720][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 69.993272][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.001964][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.011044][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.019276][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.027968][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.036590][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.044959][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.054361][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.062867][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.070532][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.078439][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.086988][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.095290][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.102821][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.111809][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.121080][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.129087][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.137488][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.155386][ T7918] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.167686][ T7913] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.183517][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 70.191033][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 70.198662][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.208158][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.218535][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.228288][ T7922] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.238500][ T7925] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 70.282622][ T7925] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 70.344173][ T7925] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 70.392335][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.406703][ T7918] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.418305][ T7925] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 70.473821][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.482716][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.490914][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 70.498394][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 70.506291][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.515256][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.524134][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.532571][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.544284][ T7922] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 70.552155][ T7957] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 70.560849][ T7957] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 15:55:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8}, @IFLA_GRE_OFLAGS={0x8}]]}}}]}, 0x48}}, 0x0) [ 70.588449][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.597606][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.616987][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 70.624172][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 70.635403][ T7916] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 70.662366][ T7916] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.685403][ T7925] 8021q: adding VLAN 0 to HW filter on device bond0 [ 70.696326][ T7962] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 70.705042][ T7962] netlink: 'syz-executor.1': attribute type 3 has an invalid length. [ 70.714370][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 70.727565][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.736740][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.745454][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 70.755045][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 70.764044][ T7919] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.771107][ T7919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 70.781248][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 70.797501][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 70.814214][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 70.823663][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 70.832960][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 70.841765][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 70.851201][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 70.859860][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 70.869871][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 70.883996][ T7925] 8021q: adding VLAN 0 to HW filter on device team0 [ 70.894819][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 70.903046][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 70.912785][ T7918] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 70.924164][ T7918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 70.946047][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 70.958243][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 70.966910][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 70.974482][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 70.981924][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 70.990507][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 70.999074][ T7929] bridge0: port 1(bridge_slave_0) entered blocking state [ 71.006136][ T7929] bridge0: port 1(bridge_slave_0) entered forwarding state [ 71.014257][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 71.023049][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 71.031478][ T7929] bridge0: port 2(bridge_slave_1) entered blocking state [ 71.038488][ T7929] bridge0: port 2(bridge_slave_1) entered forwarding state [ 71.046664][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.055716][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.066606][ T7929] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 71.077055][ T7916] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.089537][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 71.099702][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 71.109224][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 71.124681][ T7925] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 71.144287][ T7925] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 71.165813][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 71.192920][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 71.209633][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 71.221283][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 71.231823][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 71.241330][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 71.249673][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 71.258104][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 71.266658][ T7919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 71.279573][ T7918] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.298553][ T7925] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 71.313154][ T3607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 71.321515][ T3607] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 71.461183][ C1] hrtimer: interrupt took 32454 ns 15:55:02 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) r1 = socket$inet6(0xa, 0x200000000003, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0xff, 0x8001}, 0x20) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000240)={@remote, 0x0, 0x0, 0x2000ff, 0x41}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@rand_addr="c84b735dfd6a7e364f1bd2500d523c7d", 0x800, 0x2}, 0x20) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000000)=0x47ffee) r3 = epoll_create(0x9) ppoll(&(0x7f00000000c0)=[{r3}, {r0, 0x40}], 0x2, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000280)={0xc0000008}) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="89", 0x1}], 0x1, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x15, &(0x7f0000d84ffc)=0xbd, 0x4) setsockopt$sock_int(r4, 0x1, 0x80000000009, &(0x7f0000000000)=0x425c00000, 0x71) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RMKDIR(r8, &(0x7f00000001c0)={0x14, 0x49, 0x2, {0xa, 0x1, 0x7}}, 0x14) rt_tgsigqueueinfo(r5, r5, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0x0, 0x0, 0x8, &(0x7f0000000100)) socket(0x10, 0x400000000080803, 0x0) [ 71.483108][ T7995] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 15:55:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x44, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) 15:55:02 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = inotify_init1(0x0) r3 = dup3(r0, r2, 0x0) bind(r3, &(0x7f00000000c0)=@generic={0x10, "e4a78707aee5ad63b84e795af5a89b0a340a717ceeae16cd2ffc9c92fdc5f8e3cb9167c6623dcd2f18c903c678f92e5fe991458e2a5eda4be0842c3c82e5e38541857153a416faa555fa65f0407cd7b4b90bf246f98e336e0338687d5fa361074bae5b26e766c13dd38f03e4c029ce24c6fcc2b2813983cdcc78c3363bf5"}, 0x80) 15:55:02 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8}, @IFLA_GRE_OFLAGS={0x8}]]}}}]}, 0x48}}, 0x0) 15:55:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000080)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6804890339fb4c7d", 0x20}, {&(0x7f0000000180)="e31520aa566f103686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a822100b301f45542d83e05d01a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x3c0}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x0) 15:55:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000280)={0x1, 0x0, [{0x413}]}) 15:55:03 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = inotify_init1(0x0) r3 = dup3(r0, r2, 0x0) bind(r3, &(0x7f00000000c0)=@generic={0x10, "e4a78707aee5ad63b84e795af5a89b0a340a717ceeae16cd2ffc9c92fdc5f8e3cb9167c6623dcd2f18c903c678f92e5fe991458e2a5eda4be0842c3c82e5e38541857153a416faa555fa65f0407cd7b4b90bf246f98e336e0338687d5fa361074bae5b26e766c13dd38f03e4c029ce24c6fcc2b2813983cdcc78c3363bf5"}, 0x80) [ 71.718837][ T8014] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 71.747482][ T8014] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 15:55:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) r1 = socket$inet6(0xa, 0x200000000003, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0xff, 0x8001}, 0x20) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000240)={@remote, 0x0, 0x0, 0x2000ff, 0x41}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@rand_addr="c84b735dfd6a7e364f1bd2500d523c7d", 0x800, 0x2}, 0x20) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000000)=0x47ffee) r3 = epoll_create(0x9) ppoll(&(0x7f00000000c0)=[{r3}, {r0, 0x40}], 0x2, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000280)={0xc0000008}) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="89", 0x1}], 0x1, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x15, &(0x7f0000d84ffc)=0xbd, 0x4) setsockopt$sock_int(r4, 0x1, 0x80000000009, &(0x7f0000000000)=0x425c00000, 0x71) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RMKDIR(r8, &(0x7f00000001c0)={0x14, 0x49, 0x2, {0xa, 0x1, 0x7}}, 0x14) rt_tgsigqueueinfo(r5, r5, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0x0, 0x0, 0x8, &(0x7f0000000100)) socket(0x10, 0x400000000080803, 0x0) 15:55:03 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6erspan={{0x10, 0x1, 'ip6erspan\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8}, @IFLA_GRE_OFLAGS={0x8}]]}}}]}, 0x48}}, 0x0) 15:55:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000280)={0x1, 0x0, [{0x413}]}) 15:55:03 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) r1 = socket$inet6(0xa, 0x200000000003, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0xff, 0x8001}, 0x20) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000240)={@remote, 0x0, 0x0, 0x2000ff, 0x41}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@rand_addr="c84b735dfd6a7e364f1bd2500d523c7d", 0x800, 0x2}, 0x20) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000000)=0x47ffee) r3 = epoll_create(0x9) ppoll(&(0x7f00000000c0)=[{r3}, {r0, 0x40}], 0x2, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000280)={0xc0000008}) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="89", 0x1}], 0x1, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x15, &(0x7f0000d84ffc)=0xbd, 0x4) setsockopt$sock_int(r4, 0x1, 0x80000000009, &(0x7f0000000000)=0x425c00000, 0x71) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RMKDIR(r8, &(0x7f00000001c0)={0x14, 0x49, 0x2, {0xa, 0x1, 0x7}}, 0x14) rt_tgsigqueueinfo(r5, r5, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0x0, 0x0, 0x8, &(0x7f0000000100)) socket(0x10, 0x400000000080803, 0x0) [ 72.068383][ T8032] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 15:55:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x44, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) [ 72.117037][ T8032] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 15:55:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x44, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) 15:55:04 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x44, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) 15:55:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000280)={0x1, 0x0, [{0x413}]}) 15:55:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x44, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) 15:55:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x44, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) 15:55:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000080)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6804890339fb4c7d", 0x20}, {&(0x7f0000000180)="e31520aa566f103686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe0fc1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a822100b301f45542d83e05d01a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x3c0}], 0x3}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x0) 15:55:04 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) r1 = socket$inet6(0xa, 0x200000000003, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0xff, 0x8001}, 0x20) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000240)={@remote, 0x0, 0x0, 0x2000ff, 0x41}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@rand_addr="c84b735dfd6a7e364f1bd2500d523c7d", 0x800, 0x2}, 0x20) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000000)=0x47ffee) r3 = epoll_create(0x9) ppoll(&(0x7f00000000c0)=[{r3}, {r0, 0x40}], 0x2, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000280)={0xc0000008}) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="89", 0x1}], 0x1, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x15, &(0x7f0000d84ffc)=0xbd, 0x4) setsockopt$sock_int(r4, 0x1, 0x80000000009, &(0x7f0000000000)=0x425c00000, 0x71) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RMKDIR(r8, &(0x7f00000001c0)={0x14, 0x49, 0x2, {0xa, 0x1, 0x7}}, 0x14) rt_tgsigqueueinfo(r5, r5, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0x0, 0x0, 0x8, &(0x7f0000000100)) socket(0x10, 0x400000000080803, 0x0) 15:55:04 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x44, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) 15:55:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x44, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) 15:55:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x44, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) 15:55:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fe530cb7d7f933eda02ba18ad181867514fe60077d4dd90123d3ee7cf43548ee858e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e70233bfd8115efd90c8c48258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000000000000000000000000000000000000018287ba7d8807cf077cc420efca6785deb269d0a91985602763e0d70d404da006a3d6eef8fb7fcdd82eb1e4841"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x0, 0x44, 0x0, &(0x7f0000000080)="4d50b441e692763113ef8745ffa3a30538bd7ee5e39d9d59026786dd223ec75b4e1a9ae934c8f49b21f35c012238103650e1c4f9ed85e2cc4f890f3ee6312a7400021522", 0x0, 0x400}, 0x28) 15:55:04 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) r1 = socket$inet6(0xa, 0x200000000003, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0xff, 0x8001}, 0x20) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000240)={@remote, 0x0, 0x0, 0x2000ff, 0x41}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@rand_addr="c84b735dfd6a7e364f1bd2500d523c7d", 0x800, 0x2}, 0x20) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000000)=0x47ffee) r3 = epoll_create(0x9) ppoll(&(0x7f00000000c0)=[{r3}, {r0, 0x40}], 0x2, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000280)={0xc0000008}) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="89", 0x1}], 0x1, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x15, &(0x7f0000d84ffc)=0xbd, 0x4) setsockopt$sock_int(r4, 0x1, 0x80000000009, &(0x7f0000000000)=0x425c00000, 0x71) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RMKDIR(r8, &(0x7f00000001c0)={0x14, 0x49, 0x2, {0xa, 0x1, 0x7}}, 0x14) rt_tgsigqueueinfo(r5, r5, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0x0, 0x0, 0x8, &(0x7f0000000100)) socket(0x10, 0x400000000080803, 0x0) 15:55:05 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20082, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000500)=""/246) r1 = socket$inet6(0xa, 0x200000000003, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x800, 0x0, 0xff, 0x8001}, 0x20) r2 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000240)={@remote, 0x0, 0x0, 0x2000ff, 0x41}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000001c0)={@rand_addr="c84b735dfd6a7e364f1bd2500d523c7d", 0x800, 0x2}, 0x20) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000000)=0x47ffee) r3 = epoll_create(0x9) ppoll(&(0x7f00000000c0)=[{r3}, {r0, 0x40}], 0x2, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000280)={0xc0000008}) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000140)="89", 0x1}], 0x1, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x15, &(0x7f0000d84ffc)=0xbd, 0x4) setsockopt$sock_int(r4, 0x1, 0x80000000009, &(0x7f0000000000)=0x425c00000, 0x71) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x4000000000000016, &(0x7f00000004c0)) ptrace(0x4206, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = socket(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RMKDIR(r8, &(0x7f00000001c0)={0x14, 0x49, 0x2, {0xa, 0x1, 0x7}}, 0x14) rt_tgsigqueueinfo(r5, r5, 0x12, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) wait4(0x0, 0x0, 0x8, &(0x7f0000000100)) socket(0x10, 0x400000000080803, 0x0) [ 73.970851][ T10] ================================================================== [ 73.979356][ T10] BUG: KCSAN: data-race in rcu_gp_fqs_loop / rcu_preempt_deferred_qs_irqrestore [ 73.989328][ T10] [ 73.991666][ T10] write to 0xffffffff85c7d190 of 8 bytes by task 8075 on cpu 1: [ 73.999305][ T10] rcu_preempt_deferred_qs_irqrestore+0x43d/0x580 [ 74.005727][ T10] __rcu_read_unlock+0x16a/0x3d0 [ 74.010662][ T10] bpf_test_run+0x3e3/0x490 [ 74.015174][ T10] bpf_prog_test_run_skb+0x511/0x8a0 [ 74.020469][ T10] __do_sys_bpf+0xf77/0x3150 [ 74.025073][ T10] __x64_sys_bpf+0x4c/0x60 [ 74.029583][ T10] do_syscall_64+0xcc/0x3a0 [ 74.034093][ T10] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 74.039973][ T10] [ 74.042308][ T10] read to 0xffffffff85c7d190 of 8 bytes by task 10 on cpu 0: [ 74.049698][ T10] rcu_gp_fqs_loop+0x23c/0x580 [ 74.054478][ T10] rcu_gp_kthread+0x143/0x230 [ 74.059163][ T10] kthread+0x1d4/0x200 [ 74.063264][ T10] ret_from_fork+0x1f/0x30 [ 74.067672][ T10] [ 74.070003][ T10] Reported by Kernel Concurrency Sanitizer on: [ 74.076260][ T10] CPU: 0 PID: 10 Comm: rcu_preempt Not tainted 5.5.0-rc1-syzkaller #0 [ 74.084427][ T10] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.094490][ T10] ================================================================== [ 74.102575][ T10] Kernel panic - not syncing: panic_on_warn set ... [ 74.109166][ T10] CPU: 0 PID: 10 Comm: rcu_preempt Not tainted 5.5.0-rc1-syzkaller #0 [ 74.117423][ T10] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.128983][ T10] Call Trace: [ 74.132277][ T10] dump_stack+0x11d/0x181 [ 74.136717][ T10] panic+0x210/0x640 [ 74.140635][ T10] ? vprintk_func+0x8d/0x140 [ 74.145252][ T10] kcsan_report.cold+0xc/0xd [ 74.149871][ T10] kcsan_setup_watchpoint+0x3fe/0x460 [ 74.155263][ T10] __tsan_read8+0xc6/0x100 [ 74.159693][ T10] rcu_gp_fqs_loop+0x23c/0x580 [ 74.164486][ T10] rcu_gp_kthread+0x143/0x230 [ 74.169193][ T10] kthread+0x1d4/0x200 [ 74.173373][ T10] ? rcu_gp_cleanup+0x520/0x520 [ 74.178252][ T10] ? kthread_unpark+0xe0/0xe0 [ 74.182936][ T10] ret_from_fork+0x1f/0x30 [ 74.188789][ T10] Kernel Offset: disabled [ 74.193495][ T10] Rebooting in 86400 seconds..