[ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.30' (ECDSA) to the list of known hosts. 2020/05/23 23:12:22 fuzzer started 2020/05/23 23:12:22 dialing manager at 10.128.0.26:38661 2020/05/23 23:12:23 syscalls: 3055 2020/05/23 23:12:23 code coverage: enabled 2020/05/23 23:12:23 comparison tracing: enabled 2020/05/23 23:12:23 extra coverage: enabled 2020/05/23 23:12:23 setuid sandbox: enabled 2020/05/23 23:12:23 namespace sandbox: enabled 2020/05/23 23:12:23 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/23 23:12:23 fault injection: enabled 2020/05/23 23:12:23 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/23 23:12:23 net packet injection: enabled 2020/05/23 23:12:23 net device setup: enabled 2020/05/23 23:12:23 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/05/23 23:12:23 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/23 23:12:23 USB emulation: enabled 23:14:44 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x20) syzkaller login: [ 196.775469][ T6849] IPVS: ftp: loaded support on port[0] = 21 23:14:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect(r1, &(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="1c2efeab4e00"}, 0x80) [ 196.925254][ T6849] chnl_net:caif_netlink_parms(): no params data found [ 197.029008][ T6849] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.038579][ T6849] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.047137][ T6849] device bridge_slave_0 entered promiscuous mode [ 197.059505][ T6849] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.066964][ T6849] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.075106][ T6849] device bridge_slave_1 entered promiscuous mode [ 197.112721][ T6849] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 197.139185][ T6849] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 197.168384][ T6985] IPVS: ftp: loaded support on port[0] = 21 [ 197.195380][ T6849] team0: Port device team_slave_0 added [ 197.222331][ T6849] team0: Port device team_slave_1 added 23:14:45 executing program 2: bpf$BPF_TASK_FD_QUERY(0x16, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) [ 197.270219][ T6849] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 197.278945][ T6849] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 197.312127][ T6849] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 197.337164][ T6849] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 197.344129][ T6849] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 197.406758][ T6849] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 197.510790][ T6849] device hsr_slave_0 entered promiscuous mode 23:14:45 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x2, 0x1, 0x2, 0x0, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000100)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 197.558424][ T6849] device hsr_slave_1 entered promiscuous mode [ 197.622973][ T7025] IPVS: ftp: loaded support on port[0] = 21 [ 197.798174][ T6985] chnl_net:caif_netlink_parms(): no params data found [ 197.862370][ T7126] IPVS: ftp: loaded support on port[0] = 21 23:14:45 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) bind$ax25(r0, &(0x7f0000000200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) [ 198.028220][ T6985] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.035319][ T6985] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.058009][ T6985] device bridge_slave_0 entered promiscuous mode [ 198.105920][ T6985] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.116329][ T6985] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.138005][ T6985] device bridge_slave_1 entered promiscuous mode [ 198.245398][ T6985] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 198.285728][ T6985] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 198.375889][ T6985] team0: Port device team_slave_0 added [ 198.383619][ T6849] netdevsim netdevsim0 netdevsim0: renamed from eth0 23:14:46 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1e, 0x0, &(0x7f0000012ffc)) [ 198.508360][ T6985] team0: Port device team_slave_1 added [ 198.559273][ T7025] chnl_net:caif_netlink_parms(): no params data found [ 198.586509][ T6849] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 198.620560][ T6849] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 198.680099][ T6985] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 198.687195][ T6985] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 198.713338][ T6985] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 198.743957][ T6849] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 198.792752][ T6985] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 198.799929][ T6985] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 198.827039][ T6985] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 198.848637][ T7245] IPVS: ftp: loaded support on port[0] = 21 [ 198.889561][ T7343] IPVS: ftp: loaded support on port[0] = 21 [ 199.001191][ T6985] device hsr_slave_0 entered promiscuous mode [ 199.058679][ T6985] device hsr_slave_1 entered promiscuous mode [ 199.096933][ T6985] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 199.104650][ T6985] Cannot create hsr debugfs directory [ 199.124472][ T7025] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.135193][ T7025] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.143824][ T7025] device bridge_slave_0 entered promiscuous mode [ 199.165457][ T7126] chnl_net:caif_netlink_parms(): no params data found [ 199.191506][ T7025] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.199364][ T7025] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.208554][ T7025] device bridge_slave_1 entered promiscuous mode [ 199.289752][ T7025] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.320183][ T7025] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.437863][ T7025] team0: Port device team_slave_0 added [ 199.454589][ T7126] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.462242][ T7126] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.471912][ T7126] device bridge_slave_0 entered promiscuous mode [ 199.483888][ T7126] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.491414][ T7126] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.499813][ T7126] device bridge_slave_1 entered promiscuous mode [ 199.522648][ T7025] team0: Port device team_slave_1 added [ 199.626226][ T7025] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 199.633961][ T7025] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 199.663535][ T7025] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 199.682412][ T7025] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 199.689917][ T7025] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 199.719048][ T7025] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 199.730797][ T7245] chnl_net:caif_netlink_parms(): no params data found [ 199.754123][ T7126] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.790921][ T7126] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.819475][ T7126] team0: Port device team_slave_0 added [ 199.874793][ T7126] team0: Port device team_slave_1 added [ 199.881556][ T7343] chnl_net:caif_netlink_parms(): no params data found [ 199.971886][ T7025] device hsr_slave_0 entered promiscuous mode [ 200.027332][ T7025] device hsr_slave_1 entered promiscuous mode [ 200.066962][ T7025] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 200.074546][ T7025] Cannot create hsr debugfs directory [ 200.081965][ T6985] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 200.146679][ T6849] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.154683][ T6985] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 200.195172][ T6985] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 200.261145][ T7126] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 200.269876][ T7126] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 200.297204][ T7126] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 200.314239][ T7126] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 200.321366][ T7126] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 200.347818][ T7126] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 200.364838][ T6985] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 200.498203][ T6849] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.528199][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.536600][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.609940][ T7126] device hsr_slave_0 entered promiscuous mode [ 200.647428][ T7126] device hsr_slave_1 entered promiscuous mode [ 200.697543][ T7126] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 200.705166][ T7126] Cannot create hsr debugfs directory [ 200.715786][ T7245] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.727570][ T7245] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.735313][ T7245] device bridge_slave_0 entered promiscuous mode [ 200.743963][ T7343] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.751473][ T7343] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.759717][ T7343] device bridge_slave_0 entered promiscuous mode [ 200.778517][ T2649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.788583][ T2649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.803556][ T2649] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.810744][ T2649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.822953][ T2649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 200.844646][ T7245] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.852045][ T7245] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.860573][ T7245] device bridge_slave_1 entered promiscuous mode [ 200.878692][ T7343] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.885754][ T7343] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.898239][ T7343] device bridge_slave_1 entered promiscuous mode [ 200.937771][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 200.946441][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.956450][ T2516] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.963592][ T2516] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.971997][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.981627][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.014637][ T7343] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.042846][ T7245] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.058255][ T7245] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.073579][ T7343] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.083486][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.094423][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.103739][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.162514][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.171994][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.181655][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.190566][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.199915][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.209217][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.233438][ T7245] team0: Port device team_slave_0 added [ 201.245307][ T7245] team0: Port device team_slave_1 added [ 201.263960][ T7343] team0: Port device team_slave_0 added [ 201.287887][ T6849] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.313457][ T7343] team0: Port device team_slave_1 added [ 201.343593][ T7245] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 201.351147][ T7245] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.378369][ T7245] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 201.417038][ T7245] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 201.424029][ T7245] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.450744][ T7245] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 201.467463][ T7343] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 201.474445][ T7343] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.502243][ T7343] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 201.544468][ T7343] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 201.551745][ T7343] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 201.578858][ T7343] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 201.652404][ T7025] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 201.704435][ T7025] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 201.769835][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 201.779353][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 201.850834][ T7245] device hsr_slave_0 entered promiscuous mode [ 201.907755][ T7245] device hsr_slave_1 entered promiscuous mode [ 201.947081][ T7245] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 201.954638][ T7245] Cannot create hsr debugfs directory [ 201.965371][ T6985] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.974813][ T6849] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.983580][ T7025] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 202.091106][ T7343] device hsr_slave_0 entered promiscuous mode [ 202.137402][ T7343] device hsr_slave_1 entered promiscuous mode [ 202.187537][ T7343] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 202.195113][ T7343] Cannot create hsr debugfs directory [ 202.209552][ T7025] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 202.286281][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.294179][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.354075][ T6985] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.384434][ T7126] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 202.455230][ T7126] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 202.500536][ T7126] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 202.553158][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.563018][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.572029][ T2516] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.579180][ T2516] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.586714][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 202.596103][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 202.616127][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.624676][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.633857][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.643615][ T2516] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.650759][ T2516] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.677034][ T7126] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 202.740432][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.749643][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.811217][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.820507][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.829557][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.838506][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.846890][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 202.855374][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 202.864251][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.872288][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 202.881155][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 202.917948][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 202.926321][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 202.954359][ T6849] device veth0_vlan entered promiscuous mode [ 203.004584][ T6849] device veth1_vlan entered promiscuous mode [ 203.022461][ T6985] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 203.034107][ T6985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 203.044423][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 203.054546][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.064981][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.123050][ T7245] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 203.171135][ T7245] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 203.211176][ T7245] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 203.260142][ T7245] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 203.326640][ T7025] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.382331][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 203.391430][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 203.401354][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 203.410864][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 203.419329][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 203.428852][ T6849] device veth0_macvtap entered promiscuous mode [ 203.440667][ T6985] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 203.449753][ T7343] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 203.534551][ T7343] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 203.577607][ T6849] device veth1_macvtap entered promiscuous mode [ 203.595224][ T7343] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 203.649567][ T7343] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 203.690400][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 203.698527][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 203.706307][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.715137][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.740718][ T7025] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.795073][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 203.804900][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 203.829906][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.842031][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.851025][ T2652] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.858168][ T2652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.868420][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.879986][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.888456][ T2652] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.895483][ T2652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.904699][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.916139][ T6849] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 203.941472][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 203.955199][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 203.964651][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.977529][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 204.012689][ T6849] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 204.039042][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 204.048745][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 204.060638][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 204.069222][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 204.079417][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 204.088441][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 204.096698][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 204.106217][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 204.115250][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 204.124084][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.133734][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 204.142014][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 204.150496][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 204.163524][ T6985] device veth0_vlan entered promiscuous mode [ 204.204858][ T7025] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 204.217598][ T7025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 204.281954][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 204.293735][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 204.314739][ T6985] device veth1_vlan entered promiscuous mode [ 204.330394][ T7126] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.427862][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 204.436132][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 204.445360][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 23:14:52 executing program 0: [ 204.482414][ T7245] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.560139][ T6985] device veth0_macvtap entered promiscuous mode [ 204.584062][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 204.592233][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 23:14:52 executing program 0: [ 204.617982][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.625959][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 204.657632][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 204.684524][ T7025] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.702766][ T7126] 8021q: adding VLAN 0 to HW filter on device team0 23:14:52 executing program 0: [ 204.725797][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 204.756416][ T7245] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.781759][ T6985] device veth1_macvtap entered promiscuous mode [ 204.795881][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 23:14:52 executing program 0: [ 204.827941][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 23:14:52 executing program 0: [ 204.898682][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 204.915713][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 204.926731][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.937008][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 23:14:52 executing program 0: [ 204.959090][ T2652] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.966175][ T2652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 204.981531][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 204.990486][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 204.999935][ T2652] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.007026][ T2652] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.028044][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.040944][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.051902][ T2652] bridge0: port 2(bridge_slave_1) entered blocking state 23:14:52 executing program 0: [ 205.059061][ T2652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.068507][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.080465][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.091478][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.117479][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.126136][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.156964][ T2625] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.164148][ T2625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.198955][ T6985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 205.217189][ T6985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.238838][ T6985] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 205.257303][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.266027][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 205.286135][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 205.296398][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.320523][ T7343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 205.340574][ T6985] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 205.352184][ T6985] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.367899][ T6985] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 205.375246][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.384940][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.393875][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.402949][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.412074][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 205.420852][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 205.429692][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.439499][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 205.448305][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 205.462792][ T7025] device veth0_vlan entered promiscuous mode [ 205.489653][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.500262][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 205.508437][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 205.516068][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.525255][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.533737][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.543005][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.555554][ T7245] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 205.569483][ T7245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.585627][ T7343] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.605209][ T7025] device veth1_vlan entered promiscuous mode [ 205.613982][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 205.623678][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.631991][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.640710][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.649763][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.658023][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.677517][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.686085][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.696418][ T2625] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.703531][ T2625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.712585][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.721783][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.731616][ T2625] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.738726][ T2625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.746309][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.758761][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.808666][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.822180][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.832042][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.841116][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.849706][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.859147][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.867624][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.876306][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.886975][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.899435][ T7126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.968058][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.975924][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 205.984811][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 206.097403][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.119393][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 23:14:53 executing program 1: [ 206.181595][ T7245] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.228583][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 206.236125][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 206.257864][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.266445][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.286864][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.295807][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.310247][ T7343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 206.331340][ T7025] device veth0_macvtap entered promiscuous mode [ 206.348603][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 206.357721][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 206.386175][ T7126] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.408146][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 206.422485][ T7025] device veth1_macvtap entered promiscuous mode [ 206.483511][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 206.493813][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 206.502381][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 206.514706][ T7343] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.538824][ T7025] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.554158][ T7025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.565486][ T7025] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 206.576224][ T7025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.588493][ T7025] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 206.602660][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 206.612161][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.621087][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 206.630753][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 206.673137][ T7025] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.684471][ T7025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.703050][ T7025] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 206.713641][ T7025] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.726894][ T7025] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 206.736043][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 206.748893][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 206.760535][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 206.772512][ T38] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 206.793873][ T7126] device veth0_vlan entered promiscuous mode [ 206.832831][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 206.841301][ T2655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 206.901625][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 206.913600][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 206.926026][ T7126] device veth1_vlan entered promiscuous mode [ 206.981170][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 206.992993][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 207.003108][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.012682][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 207.022010][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 207.032604][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 207.043461][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 207.123941][ T7245] device veth0_vlan entered promiscuous mode [ 207.145681][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 207.159127][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready 23:14:54 executing program 2: [ 207.184479][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 207.232543][ T7343] device veth0_vlan entered promiscuous mode [ 207.258679][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 207.266598][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 207.282163][ T7245] device veth1_vlan entered promiscuous mode [ 207.303770][ T7343] device veth1_vlan entered promiscuous mode [ 207.341434][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 207.349968][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 207.360983][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 207.370964][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 207.390828][ T7126] device veth0_macvtap entered promiscuous mode [ 207.432412][ T7126] device veth1_macvtap entered promiscuous mode [ 207.483368][ T2596] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 207.492282][ T2596] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 207.501108][ T2596] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 207.512911][ T2596] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 207.522581][ T2596] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 207.531631][ T2596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 207.545255][ T7245] device veth0_macvtap entered promiscuous mode [ 207.565328][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 207.577030][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 207.586548][ T2625] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 207.605361][ T7245] device veth1_macvtap entered promiscuous mode [ 207.613249][ T7126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.629070][ T7126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.641150][ T7126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.653748][ T7126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.667037][ T7126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.680280][ T7126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.692164][ T7126] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 207.703584][ T7343] device veth0_macvtap entered promiscuous mode [ 207.718961][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 207.727050][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 207.735941][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 207.745591][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 207.760478][ T7126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 207.773271][ T7126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.783727][ T7126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 207.794418][ T7126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.804317][ T7126] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 207.814897][ T7126] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.826553][ T7126] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 207.839219][ T7343] device veth1_macvtap entered promiscuous mode [ 207.854568][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 207.862740][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 207.876422][ T2652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 207.920145][ T7245] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.931402][ T7245] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.942462][ T7245] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.952953][ T7245] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.963855][ T7245] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.974320][ T7245] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 207.984302][ T7245] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 207.994952][ T7245] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.008454][ T7245] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 208.087966][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 208.096817][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 208.111627][ T7245] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 208.122179][ T7245] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.133468][ T7245] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 208.144596][ T7245] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.154929][ T7245] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 208.166961][ T7245] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.176842][ T7245] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 208.189249][ T7245] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.201089][ T7245] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 208.209178][ T7343] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 208.223647][ T7343] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.234907][ T7343] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 208.246498][ T7343] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.256401][ T7343] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 208.267029][ T7343] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.276914][ T7343] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 208.287636][ T7343] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.297636][ T7343] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 208.308137][ T7343] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.321468][ T7343] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 208.370765][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 208.387127][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 208.406801][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 208.415801][ T2650] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 23:14:56 executing program 3: [ 208.444596][ T7343] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 208.478324][ T7343] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.497759][ T7343] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 208.517661][ T7343] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.547390][ T7343] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 208.567388][ T7343] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.577212][ T7343] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 208.599534][ T7343] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.609987][ T7343] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 208.620809][ T7343] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 208.633289][ T7343] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 208.710049][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 208.720032][ T2516] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:14:56 executing program 4: 23:14:56 executing program 5: 23:14:56 executing program 0: 23:14:56 executing program 1: 23:14:56 executing program 2: 23:14:56 executing program 3: 23:14:56 executing program 4: 23:14:56 executing program 3: 23:14:56 executing program 0: 23:14:56 executing program 1: 23:14:56 executing program 4: 23:14:56 executing program 5: 23:14:56 executing program 2: 23:14:57 executing program 2: 23:14:57 executing program 4: 23:14:57 executing program 3: 23:14:57 executing program 5: 23:14:57 executing program 1: 23:14:57 executing program 0: 23:14:57 executing program 5: 23:14:57 executing program 2: 23:14:57 executing program 4: 23:14:57 executing program 3: 23:14:57 executing program 1: 23:14:57 executing program 0: 23:14:57 executing program 5: 23:14:57 executing program 3: 23:14:57 executing program 4: 23:14:57 executing program 2: 23:14:57 executing program 1: 23:14:57 executing program 0: 23:14:57 executing program 5: 23:14:57 executing program 3: 23:14:57 executing program 4: 23:14:57 executing program 1: 23:14:57 executing program 2: 23:14:57 executing program 5: 23:14:57 executing program 0: 23:14:57 executing program 3: 23:14:57 executing program 1: 23:14:57 executing program 4: 23:14:57 executing program 2: 23:14:57 executing program 5: 23:14:57 executing program 0: 23:14:57 executing program 3: 23:14:57 executing program 4: 23:14:57 executing program 1: 23:14:57 executing program 2: 23:14:57 executing program 5: 23:14:57 executing program 0: 23:14:57 executing program 3: 23:14:58 executing program 4: 23:14:58 executing program 2: 23:14:58 executing program 1: 23:14:58 executing program 5: 23:14:58 executing program 0: 23:14:58 executing program 3: 23:14:58 executing program 4: 23:14:58 executing program 2: 23:14:58 executing program 1: 23:14:58 executing program 5: 23:14:58 executing program 0: 23:14:58 executing program 4: 23:14:58 executing program 2: 23:14:58 executing program 3: 23:14:58 executing program 5: 23:14:58 executing program 1: 23:14:58 executing program 0: 23:14:58 executing program 4: 23:14:58 executing program 2: 23:14:58 executing program 3: 23:14:58 executing program 5: 23:14:58 executing program 1: 23:14:58 executing program 4: 23:14:58 executing program 0: 23:14:58 executing program 5: 23:14:58 executing program 3: 23:14:58 executing program 1: 23:14:58 executing program 2: 23:14:58 executing program 4: 23:14:58 executing program 0: 23:14:58 executing program 3: 23:14:58 executing program 5: 23:14:58 executing program 2: 23:14:58 executing program 1: 23:14:58 executing program 0: 23:14:58 executing program 4: 23:14:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bc0}, {{@in6=@private2, 0x0, 0x2b}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, 0xe8) 23:14:58 executing program 5: 23:14:58 executing program 0: 23:14:59 executing program 1: 23:14:59 executing program 2: 23:14:59 executing program 4: 23:14:59 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000001fc0)=[{{0x0, 0x0, 0x0}, 0x1}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x7a00000000000000) 23:14:59 executing program 0: r0 = socket(0x11, 0x2, 0x0) close(r0) close(r0) 23:14:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents64(r0, &(0x7f0000000080)=""/167, 0xa7) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57, 0x39}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x24) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 23:14:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') preadv(r2, &(0x7f0000000580)=[{&(0x7f0000000000)=""/166, 0xa6}, {&(0x7f0000000180)=""/200, 0xc8}], 0x2, 0x0) 23:14:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x2000000000000107, 0x1, &(0x7f00000000c0)="010000000200060000071a80000001cc", 0x10) close(r0) 23:14:59 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000001fc0)=[{{0x0, 0x0, 0x0}, 0x1}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev\x00') preadv(r2, &(0x7f00000017c0), 0x1b4, 0x7a00000000000000) 23:14:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000100)=ANY=[@ANYBLOB="5c0000001400f94b000000000000000000000000000000000001000000000000ffffff7f000000000000aaf4d2490fff544d3e01ad9f3d20bc83f6f243cdf94265e18c49d91cfb4e5685a6200a"], 0x5c}}, 0x0) 23:14:59 executing program 1: io_setup(0x1ff, &(0x7f00000004c0)=0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 23:14:59 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x6, &(0x7f0000000000)) [ 211.553718][ T8282] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 23:14:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/keys\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000000)=""/11, 0xb}], 0x1, 0x64e2) 23:14:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000100)=""/156) 23:14:59 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:14:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x2000000000000107, 0x1, &(0x7f00000000c0)="010000000200060000071a80000001cc", 0x10) close(r0) 23:14:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, &(0x7f0000000040)) 23:15:02 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) 23:15:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) 23:15:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:02 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd(0x0) 23:15:02 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000040)="240000001e005f031400fffffffffff8070037b2b3448647a0e09658dc000208000800ff", 0xfdd6) 23:15:02 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x84000, 0x0) 23:15:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_GROUP_FWD_MASK={0x6, 0x9, 0xf634}]}}}]}, 0x3c}}, 0x0) 23:15:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2}) 23:15:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_tcp_int(r0, 0x6, 0xa, 0x0, &(0x7f0000000100)=0xffffffffffffff5e) 23:15:02 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000240)={@local, @ipv4={[0x0, 0x0, 0x8], [], @empty}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r5}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000000)={'wg1\x00', r5}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x20c300e2}) 23:15:02 executing program 2: getrandom(&(0x7f0000000680)=""/8, 0x8, 0x2) 23:15:02 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/59, 0x3b}], 0x1, &(0x7f0000000240)=[{0x0}, {&(0x7f00000000c0)=""/33, 0x21}], 0x2, 0x0) 23:15:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) [ 214.926156][ T8361] ptrace attach of "/root/syz-executor.1"[6985] was attempted by "/root/syz-executor.1"[8361] 23:15:02 executing program 4: 23:15:02 executing program 1: 23:15:02 executing program 3: 23:15:02 executing program 2: 23:15:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:02 executing program 2: ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5409, 0x0) 23:15:03 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000001fc0)=[{{0x0, 0x0, 0x0}, 0x1}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/dev\x00') preadv(r2, &(0x7f00000017c0), 0x1b4, 0x0) 23:15:03 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_adjtime(0x6, 0x0) 23:15:03 executing program 4: r0 = socket(0x10, 0x80002, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 23:15:03 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001080)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup(r2) ioctl$TUNSETPERSIST(r3, 0x400454ca, 0x400000) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@broadcast]}) 23:15:03 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:03 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:03 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x0, 0x4, 0x1, 0x0, r0}, 0x2c) 23:15:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 23:15:03 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:03 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) 23:15:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmmsg(r0, &(0x7f0000006840)=[{{&(0x7f00000000c0)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}], 0x1, 0xd0) 23:15:03 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:03 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r3, 0x80247008, 0x0) 23:15:03 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xa) 23:15:03 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x4}}}, @IFLA_LINK={0x8}]}, 0x3c}}, 0x0) 23:15:03 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=ANY=[@ANYBLOB="2800000014002101000000000000000002"], 0x28}}, 0x0) 23:15:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000018100000", @ANYRES32, @ANYBLOB="000069a19818bd7a70e2000000000000"], &(0x7f0000000180)='syzkaller\x00', 0xe2, 0x1000, &(0x7f0000002700)=""/4096}, 0x48) 23:15:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:03 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001080)='/dev/net/tun\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KDGKBLED(r1, 0x4b64, 0x0) 23:15:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') [ 215.878732][ T8438] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 23:15:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x2, 0x7d, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x7, &(0x7f0000000280)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r2}, @map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000180)='syzkaller\x00', 0xe2, 0x1000, &(0x7f0000002700)=""/4096}, 0x48) 23:15:03 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@multicast, @broadcast, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, {0x12, 0x0, 0x0, @multicast2}}}}}, 0x0) 23:15:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "00010000000000000100007c00"}) r1 = syz_open_pts(r0, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000240)='security.capability\x00', &(0x7f0000000280)=@v2, 0x14, 0x0) [ 216.046273][ T27] audit: type=1804 audit(1590275703.777:2): pid=8453 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/30/file0" dev="sda1" ino=15806 res=1 23:15:03 executing program 1: open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x0, 0x0) 23:15:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:03 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000680)=""/8, 0x8, 0x2) [ 216.148577][ T27] audit: type=1804 audit(1590275703.827:3): pid=8456 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/30/file0" dev="sda1" ino=15806 res=1 23:15:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) fchmod(r0, 0x0) 23:15:04 executing program 1: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1) syz_open_procfs(0x0, 0x0) 23:15:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) 23:15:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:04 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@multicast, @broadcast, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, {0x12}}}}}, 0x0) 23:15:04 executing program 1: clone(0x2000000024000300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x1, 0x2) [ 216.357373][ T27] audit: type=1804 audit(1590275704.097:4): pid=8470 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/31/file0" dev="sda1" ino=15809 res=1 23:15:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f0000000000)=0xfff, 0x4) 23:15:04 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@multicast, @broadcast, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}, {0x0, 0x0, 0x0, @multicast2}}}}}, 0x0) 23:15:04 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 23:15:04 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000540)=[{{&(0x7f0000000140)=@hci={0x1f, 0x0, 0x3}, 0x80, 0x0}}], 0x1, 0x0) 23:15:04 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:04 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETSW(r0, 0x5409, 0x0) [ 216.652983][ T27] audit: type=1804 audit(1590275704.387:5): pid=8498 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/32/file0" dev="sda1" ino=15834 res=1 23:15:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:04 executing program 2: process_vm_writev(0x0, &(0x7f00000002c0)=[{0x0}, {0x0}, {&(0x7f0000000180)=""/58, 0x3a}, {&(0x7f00000001c0)=""/6}, {&(0x7f0000000240)=""/104}], 0x3, 0x0, 0x64, 0x0) 23:15:04 executing program 4: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x3c1, 0x3, 0x430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x360, 0x360, 0x360, 0x360, 0x360, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x250, 0x278, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}, {'veth1_to_hsr\x00', {0x0, 0x0, 0x22c, 0x0, 0x0, 0x1ab618fe, 0x800}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x278a0d2977943b20) 23:15:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) epoll_create(0x0) 23:15:04 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_bridge\x00', &(0x7f0000000080)=@ethtool_test}) [ 216.847549][ T27] audit: type=1804 audit(1590275704.587:6): pid=8514 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/33/file0" dev="sda1" ino=15823 res=1 23:15:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:04 executing program 2: process_vm_readv(0x0, &(0x7f0000000140)=[{&(0x7f0000000180)=""/67, 0x43}], 0x1, 0x0, 0x0, 0x0) 23:15:04 executing program 1: io_setup(0x1ff, &(0x7f00000004c0)=0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 23:15:04 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000180)={0x0, 0x0, 0x1000, 0x5, 0x2, "e7cbcd506c155917942fc3f8dddcc24dca7cdd"}) 23:15:04 executing program 3: io_setup(0x1ff, &(0x7f00000004c0)=0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) io_submit(r0, 0x1, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 23:15:04 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 23:15:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @private1, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0e60062, r3}) 23:15:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:05 executing program 2: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x5be275e6f7aa116d) 23:15:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f0000000380)=[{&(0x7f0000000340)=""/59, 0x3b}], 0x1, &(0x7f0000000240)=[{&(0x7f00000003c0)=""/63, 0x3f}, {0x0}], 0x2, 0x0) 23:15:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:05 executing program 3: creat(&(0x7f0000000000)='./bus\x00', 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x1) 23:15:05 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'bridge0\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000140)={0x1}, 0x18) io_setup(0x0, 0x0) 23:15:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:05 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/cpuinfo\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/11, 0xb}], 0x1, 0x64e2) [ 217.492654][ T8569] ptrace attach of "/root/syz-executor.4"[7245] was attempted by "/root/syz-executor.4"[8569] [ 217.507797][ T27] audit: type=1804 audit(1590275705.248:7): pid=8571 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir144334385/syzkaller.2wxNwP/29/bus" dev="sda1" ino=15827 res=1 23:15:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@private0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200a2, r3}) 23:15:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') [ 217.591339][ T8576] ptrace attach of "/root/syz-executor.4"[7245] was attempted by "/root/syz-executor.4"[8576] [ 217.604459][ T8580] IPVS: sync thread started: state = MASTER, mcast_ifn = bridge0, syncid = 0, id = 0 [ 217.604735][ T8578] IPVS: stopping master sync thread 8580 ... [ 217.638498][ T8578] IPVS: stopping master sync thread 8582 ... [ 217.645416][ T8582] IPVS: sync thread started: state = MASTER, mcast_ifn = bridge0, syncid = 0, id = 0 [ 217.660613][ T27] audit: type=1804 audit(1590275705.278:8): pid=8571 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir144334385/syzkaller.2wxNwP/29/bus" dev="sda1" ino=15827 res=1 23:15:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000011039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) sendmmsg(r0, &(0x7f0000006840)=[{{&(0x7f00000000c0)=@isdn, 0x80, 0x0}}], 0x1, 0x0) 23:15:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:05 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0xfffffffc, 0x0, 0x0, "04c3f8dddcca4dca004000"}) 23:15:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_buf(r1, 0x29, 0x30, 0x0, 0x0) 23:15:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:05 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@random="0100", @random="011000ff00", @val, {@ipv4}}, 0x0) 23:15:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x0, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:05 executing program 1: mknod(&(0x7f0000000000)='./bus\x00', 0x8000800080008002, 0x8) open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) 23:15:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket(0x2, 0x2, 0x0) connect$unix(r1, &(0x7f0000001140)=ANY=[@ANYBLOB="8202adfdffffffff"], 0x10) dup2(r1, r0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) r2 = dup(r0) sendto$inet6(r2, &(0x7f0000000040), 0xfcec, 0x0, 0x0, 0x0) 23:15:05 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/164, 0xa4}], 0x1) 23:15:05 executing program 2: r0 = socket(0x1e, 0x4003, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 23:15:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x0, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x0, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:05 executing program 1: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0x4}}]}, 0x30}}, 0x0) 23:15:05 executing program 3: 23:15:05 executing program 4: 23:15:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) [ 218.256571][ T27] audit: type=1804 audit(1590275705.998:9): pid=8630 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/40/file0" dev="sda1" ino=15812 res=1 23:15:06 executing program 2: 23:15:06 executing program 3: 23:15:06 executing program 4: 23:15:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:06 executing program 1: mknod(&(0x7f0000000040)='./bus\x00', 0x8007, 0x828a5) open$dir(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x0) 23:15:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:06 executing program 2: [ 218.467555][ T27] audit: type=1804 audit(1590275706.198:10): pid=8648 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/41/file0" dev="sda1" ino=15823 res=1 23:15:06 executing program 3: 23:15:06 executing program 4: 23:15:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:06 executing program 1: 23:15:06 executing program 4: 23:15:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:06 executing program 2: 23:15:06 executing program 3: [ 218.735847][ T27] audit: type=1804 audit(1590275706.449:11): pid=8664 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/42/file0" dev="sda1" ino=15847 res=1 23:15:06 executing program 2: 23:15:06 executing program 1: 23:15:06 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:06 executing program 4: 23:15:06 executing program 1: 23:15:06 executing program 2: 23:15:06 executing program 3: 23:15:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:06 executing program 4: 23:15:06 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:06 executing program 1: 23:15:06 executing program 2: 23:15:06 executing program 3: 23:15:06 executing program 4: 23:15:06 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:07 executing program 2: 23:15:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:07 executing program 3: 23:15:07 executing program 1: 23:15:07 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:07 executing program 4: 23:15:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x0, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:07 executing program 2: 23:15:07 executing program 1: 23:15:07 executing program 3: 23:15:07 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:07 executing program 4: 23:15:07 executing program 1: 23:15:07 executing program 2: 23:15:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x0, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:07 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:07 executing program 4: 23:15:07 executing program 3: 23:15:07 executing program 1: 23:15:07 executing program 2: 23:15:07 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x0, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x0, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:07 executing program 1: 23:15:07 executing program 2: 23:15:07 executing program 4: 23:15:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:07 executing program 3: 23:15:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x0, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:07 executing program 1: 23:15:07 executing program 2: 23:15:08 executing program 4: 23:15:08 executing program 3: 23:15:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x0, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:08 executing program 2: 23:15:08 executing program 1: 23:15:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x0, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:08 executing program 3: 23:15:08 executing program 4: 23:15:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:08 executing program 1: 23:15:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x0, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:08 executing program 3: 23:15:08 executing program 2: 23:15:08 executing program 4: 23:15:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x0, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:08 executing program 1: 23:15:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:08 executing program 2: 23:15:08 executing program 3: 23:15:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x0, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:08 executing program 4: 23:15:08 executing program 1: 23:15:08 executing program 3: 23:15:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:08 executing program 4: 23:15:08 executing program 2: 23:15:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x0, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:08 executing program 1: 23:15:08 executing program 3: 23:15:08 executing program 2: 23:15:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') [ 221.057825][ T27] kauditd_printk_skb: 10 callbacks suppressed [ 221.057839][ T27] audit: type=1804 audit(1590275708.790:22): pid=8797 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/53/file0" dev="sda1" ino=15858 res=1 23:15:08 executing program 1: 23:15:08 executing program 4: 23:15:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x0, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:08 executing program 3: 23:15:09 executing program 2: [ 221.200660][ T27] audit: type=1804 audit(1590275708.930:23): pid=8804 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/54/file0" dev="sda1" ino=15812 res=1 23:15:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:09 executing program 4: 23:15:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:09 executing program 1: 23:15:09 executing program 2: [ 221.410146][ T27] audit: type=1804 audit(1590275709.140:24): pid=8817 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/55/file0" dev="sda1" ino=15865 res=1 23:15:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:09 executing program 3: 23:15:09 executing program 4: 23:15:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 23:15:09 executing program 1: 23:15:09 executing program 2: [ 221.616433][ T27] audit: type=1804 audit(1590275709.340:25): pid=8831 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/56/file0" dev="sda1" ino=15874 res=1 23:15:09 executing program 3: 23:15:09 executing program 1: 23:15:09 executing program 4: 23:15:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r1 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 23:15:09 executing program 4: 23:15:09 executing program 2: 23:15:09 executing program 3: 23:15:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 221.836574][ T27] audit: type=1804 audit(1590275709.570:26): pid=8841 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/57/file0" dev="sda1" ino=15873 res=1 23:15:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:09 executing program 1: 23:15:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:09 executing program 2: 23:15:09 executing program 4: 23:15:09 executing program 1: 23:15:09 executing program 3: [ 222.050660][ T27] audit: type=1804 audit(1590275709.780:27): pid=8854 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/58/file0" dev="sda1" ino=15806 res=1 23:15:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:09 executing program 2: 23:15:09 executing program 4: 23:15:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) 23:15:09 executing program 1: 23:15:09 executing program 3: creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'bridge0\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x1}, 0x18) [ 222.268276][ T27] audit: type=1804 audit(1590275710.001:28): pid=8864 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/59/file0" dev="sda1" ino=15866 res=1 23:15:10 executing program 2: 23:15:10 executing program 4: 23:15:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:10 executing program 1: 23:15:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000080)}, 0x20) [ 222.365711][ T8873] IPVS: sync thread started: state = MASTER, mcast_ifn = bridge0, syncid = 0, id = 0 [ 222.365715][ T8872] IPVS: stopping master sync thread 8873 ... 23:15:10 executing program 2: 23:15:10 executing program 1: [ 222.434041][ T27] audit: type=1804 audit(1590275710.171:29): pid=8878 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/60/file0" dev="sda1" ino=15870 res=1 [ 222.445085][ T8880] IPVS: stopping master sync thread 8881 ... [ 222.465190][ T8881] IPVS: sync thread started: state = MASTER, mcast_ifn = bridge0, syncid = 0, id = 0 23:15:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in6=@mcast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@mcast1, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 23:15:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0, &(0x7f0000000080)}, 0x20) 23:15:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(0x0, 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:10 executing program 3: r0 = gettid() ptrace$setopts(0x4206, r0, 0x3, 0x0) 23:15:10 executing program 2: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000400)="600084e802000a00b10cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="ee9f84a43eccaf1315bb397d00c1b6dd820dd13916181dba620938cb30f1c21afe3d926298b25834e890092d642cafe5db21ba9494febcf66079b722e73be3a8708a3624250f9f59fbbe942997c6c1e83a34e5779e8a4f40fdb6ffe59ffe4903500d3cd8c8f3ed19ad176daf94cf7fcaf2922f8aab3becc60c8d39ddf43cd6d2e9301da3caa35719f25a83478559e0e891dcb756ee22964d03f37561f5797490a0b93506482822075ba96db35a440d046e44eb4a79986b518281609003b6fae04a18be9a83ce7efa2ab80f75c90d78f0b4179d674376db1f7ae8745641adcde0d245722744bcea2fac9445014ee2293985119573ffcc0c22eb0769de1e9e5db53aa3378a4426503010a7c6247265838211527a0132ccf883ee08a6ea1a785e47ce16663f1c744af49200d5f3bc326e7d9089a5f17d0ad05f06e48c205f9b6d087ba7d3b6745e65700c009572a65b4bfbf6687821bc723b61b5abe7357e68a9b0640bfb9c01000080000000000e840ecf379c576c05757d44b19de0e2aa364c42156219a72cc943a60f0410891ed134f35f5ff9b4cf3abbcb984436322358a7c9393724860d87253981f9e79dbeb789577ead0ede31e19a2b114a0e4d82b3e1023dd28b6382e67e3246d2912e55cf9928da32c1027cef7c6c610ea8fce149a7af20224b4e028601936ef9a78d80ff5567084ec128766e822d6124186d82e760128dd7de2653939d353c12f96deff3a28b022c784bd37df7f76640bcbcb01a4676d58b3e9c2baae66230e5f54a37527e8129d161b0c06f25648c55a7e5b2db528053c3e3864f41728b7935e575568ad114eb8c811bf19e07a398babbc64fbeab842688554783ed1551949a791e33799e59a34b6bdabc3458c379c735198292e5a272187449249d2c8a9aa58f3835a3e1716083bb0464cbe140d1587a21e4ec2ae1f3ad81134df55903ffb8e173646352915a2c706709cf46538978224c0d6dc437cbfc37abfbd1b76feb5ca3aeb1ac8cbd40d5ba896f79ee8f76b0809f59b86862648774d2ace98b825e7a465b5dd80e491965971e7797aba3968441c77717a24ca41efb160c030cfc8e", 0x309, 0x34f9}], 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, 0x0) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 23:15:10 executing program 1: 23:15:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0, &(0x7f0000000080)}, 0x20) 23:15:10 executing program 4: [ 222.718693][ T27] audit: type=1800 audit(1590275710.451:30): pid=8896 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=15878 res=0 [ 222.736160][ T8896] MINIX-fs: mounting unchecked file system, running fsck is recommended 23:15:10 executing program 3: 23:15:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(0x0, 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') [ 222.773573][ C0] hrtimer: interrupt took 30816 ns 23:15:10 executing program 4: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x10, 0x46d, 0xc70e, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000000780)={0x0, 0x0, 0xc, &(0x7f0000000100)={0x5, 0xf, 0xc, 0x1, [@ext_cap={0x7}]}}) 23:15:10 executing program 1: setreuid(0xee00, 0x0) setreuid(0xee00, 0x0) 23:15:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, 0x0, &(0x7f0000000080)}, 0x20) 23:15:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(0x0, 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), 0x0}, 0x20) 23:15:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) 23:15:10 executing program 2: statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 23:15:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), 0x0}, 0x20) 23:15:10 executing program 3: r0 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$unlink(0x9, 0x0, r1) 23:15:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') [ 223.218098][ T7025] minix_free_inode: bit 1 already cleared [ 223.242751][ T2515] usb 5-1: new high-speed USB device number 2 using dummy_hcd 23:15:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f0000000080), 0x0}, 0x20) [ 223.485665][ T2515] usb 5-1: Using ep0 maxpacket: 16 [ 223.702959][ T2515] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 223.922370][ T2515] usb 5-1: New USB device found, idVendor=046d, idProduct=c70e, bcdDevice= 0.40 [ 223.931438][ T2515] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 223.943490][ T2515] usb 5-1: Product: syz [ 223.962265][ T2515] usb 5-1: Manufacturer: syz [ 223.966941][ T2515] usb 5-1: SerialNumber: syz [ 224.024585][ T2515] usbhid 5-1:1.0: couldn't find an input interrupt endpoint [ 224.231557][ T38] usb 5-1: USB disconnect, device number 2 [ 225.021718][ T2516] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 225.291494][ T2516] usb 5-1: Using ep0 maxpacket: 16 [ 225.521537][ T2516] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 225.731812][ T2516] usb 5-1: New USB device found, idVendor=046d, idProduct=c70e, bcdDevice= 0.40 [ 225.740938][ T2516] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 225.749382][ T2516] usb 5-1: Product: syz [ 225.754032][ T2516] usb 5-1: Manufacturer: syz [ 225.758772][ T2516] usb 5-1: SerialNumber: syz [ 225.813874][ T2516] usbhid 5-1:1.0: couldn't find an input interrupt endpoint 23:15:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) dup2(r3, r0) 23:15:13 executing program 3: r0 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000080)={r0}, &(0x7f00000000c0)={'enc=', 'raw', ' hash=', {'wp384-generic\x00'}}, 0x0, 0x0) 23:15:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:13 executing program 5: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgrcv(r0, 0x0, 0x106e, 0x3, 0x0) msgsnd(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="01"], 0xc6, 0x0) 23:15:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) 23:15:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 225.938449][ T2516] usb 5-1: USB disconnect, device number 3 23:15:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="c00000000001190500000300610000000a0000003c0001002c0001001400030016f8bad33edad6b8000000000000000014000400fe8002000000000000000000000000bb0c00020005000100000000003c0002000c0002000500010000000000"], 0xc0}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETCHAIN(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x8}, 0x0) 23:15:13 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) 23:15:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') [ 226.137561][ T8998] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.4'. [ 226.176118][ T8998] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.4'. 23:15:14 executing program 3: r0 = socket$inet6(0xa, 0x805, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'team_slave_1\x00', &(0x7f0000000300)=@ethtool_flash={0x33, 0x0, './file0\x00'}}) 23:15:14 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000280)={0x2, 0x0, @dev}, 0x72) 23:15:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2a000400) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 23:15:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(0x0, 0x0, 0x0) fremovexattr(r2, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:14 executing program 3: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_DO_IT(0xffffffffffffffff, 0xab03) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000600)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) 23:15:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x68) 23:15:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000004c0)="d800000018008109e00f80ecdb4cb9040a040080fe7a7c05e87c55a1bc000500b8000699030000000500150007008178a800050040003cc00200001203ac040000d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb72addb1cf998e91643a5ee4ce1b14d6d930dfe1d9d322fe04fc940000000000003e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a9230", 0xd8}], 0x1}, 0x0) 23:15:14 executing program 4: mq_getsetattr(0xffffffffffffffff, 0x0, 0x0) 23:15:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f0000001780)=[{&(0x7f0000000580)="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", 0x1f7, 0x9}], 0x0, 0x0) 23:15:14 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b2b, &(0x7f0000000040)='wlan1\x00') 23:15:14 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 23:15:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount(0x0, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) 23:15:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=@known='system.posix_acl_access\x00') [ 226.944752][ T27] audit: type=1804 audit(1590275714.683:31): pid=9041 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/70/file0" dev="sda1" ino=15901 res=1 23:15:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x2a000400) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) [ 227.000131][ T9045] FAT-fs (loop3): invalid media value (0xc9) [ 227.008292][ T9045] FAT-fs (loop3): Can't find a valid FAT filesystem 23:15:14 executing program 1: semop(0x0, &(0x7f0000000080)=[{}, {}], 0x2) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000240)={{0x3}}) 23:15:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000140)=@known='system.posix_acl_access\x00') 23:15:14 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=@newqdisc={0x148, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "1c834dc8d5bc9b9bc62464758194b64f6be64fb5d43514d0919ac0cdbccb1eb75c09ac53d1c2d9b8f2b23fb325a384998dd4b402b94396af290631b55f3f169000e08abf7daa2f376e27792fb5820b2720eed1213d1219dff97ed3a9e0b4a2f0c9d8c21705c85b2cdb6c4dc12ec3a779140d38579c481957a2ee0148348d2447c591913cecc5bf1293081ffcbbf7dfa706346ac3b770dd981a309b19663c94a9d40a2be122eaeff0589dee3e3280430c2912ee8fcf98497b6bedefb5b532079e8d4af2d1117901fa146cb2d5370bb824da5f28d7dbba595724182a1a1a64efe379df2d4bef6e141059cd59ff6d59af8336e6900b7c7f9350d785810dc0939c2f"}, @TCA_RED_PARMS={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}]}}]}, 0x148}}, 0x0) [ 227.081582][ T9045] FAT-fs (loop3): invalid media value (0xc9) [ 227.087782][ T9045] FAT-fs (loop3): Can't find a valid FAT filesystem [ 227.108271][ T27] audit: type=1804 audit(1590275714.773:32): pid=9051 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/71/file0" dev="sda1" ino=15892 res=1 23:15:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000180), 0x4) 23:15:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, 0x0) 23:15:15 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000d40)=ANY=[@ANYBLOB="5300000044a6aeabc81e1520000000000000001000fff64017db9820000000000000d403ffff633b27e59aa146"], 0x14f) 23:15:15 executing program 3: r0 = syz_usb_connect(0x0, 0x2d, &(0x7f00000008c0)=ANY=[@ANYBLOB="1201fe0109003c0800040042ef420000000109021b00017600230009040000010209bd0007058107"], 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x2, 0x36, &(0x7f0000000500)=ANY=[], 0x0) 23:15:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r3, 0x0, 0x0}, 0x10) [ 227.291768][ T27] audit: type=1800 audit(1590275714.823:33): pid=9057 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15895 res=0 [ 227.354828][ C1] sd 0:0:1:0: [sg0] tag#963 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 227.365202][ C1] sd 0:0:1:0: [sg0] tag#963 CDB: Test Unit Ready [ 227.371670][ C1] sd 0:0:1:0: [sg0] tag#963 CDB[00]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 227.381227][ C1] sd 0:0:1:0: [sg0] tag#963 CDB[10]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 227.390768][ C1] sd 0:0:1:0: [sg0] tag#963 CDB[20]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 227.400347][ C1] sd 0:0:1:0: [sg0] tag#963 CDB[30]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 227.409844][ C1] sd 0:0:1:0: [sg0] tag#963 CDB[40]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 227.419377][ C1] sd 0:0:1:0: [sg0] tag#963 CDB[50]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 227.428930][ C1] sd 0:0:1:0: [sg0] tag#963 CDB[60]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 227.438463][ C1] sd 0:0:1:0: [sg0] tag#963 CDB[70]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 227.438669][ T27] audit: type=1800 audit(1590275714.893:34): pid=9063 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15895 res=0 [ 227.447973][ C1] sd 0:0:1:0: [sg0] tag#963 CDB[80]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 227.448005][ C1] sd 0:0:1:0: [sg0] tag#963 CDB[90]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 227.448032][ C1] sd 0:0:1:0: [sg0] tag#963 CDB[a0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 227.448059][ C1] sd 0:0:1:0: [sg0] tag#963 CDB[b0]: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 227.448086][ C1] sd 0:0:1:0: [sg0] tag#963 CDB[c0]: 00 00 00 00 00 00 00 00 [ 227.573692][ T27] audit: type=1804 audit(1590275714.953:35): pid=9071 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/72/file0" dev="sda1" ino=15887 res=1 [ 227.633886][ T27] audit: type=1804 audit(1590275715.343:36): pid=9086 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/73/file0" dev="sda1" ino=15896 res=1 23:15:15 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 23:15:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000001800), &(0x7f0000001840)=0xc) 23:15:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) dup(0xffffffffffffffff) clone(0x2820100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x288, 0xf8, 0xf8, 0x0, 0xf8, 0x0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x48], 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x5]}, {0xffffffffffffffff}}}}, {{@ip={@remote, @loopback, 0x0, 0x0, '\x00', 'rose0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e8) 23:15:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)={0x1c, 0x2, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 23:15:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, 0x0) [ 227.840304][ T38] usb 4-1: new high-speed USB device number 2 using dummy_hcd 23:15:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 227.938348][ T27] audit: type=1804 audit(1590275715.673:37): pid=9101 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/74/file0" dev="sda1" ino=15908 res=1 [ 227.942016][ T9102] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING 23:15:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fremovexattr(r2, 0x0) [ 228.090154][ T38] usb 4-1: Using ep0 maxpacket: 8 23:15:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000000)={0x1}, 0x8, 0x0) 23:15:15 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x92&\xbc\x1a\xd2\xfa\xdf\xce\xcb\xf7\xbb \xb7\rk\xb6\x13\xdbX\xed\a\xca\x00'/35, 0x5) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) [ 228.163544][ T27] audit: type=1804 audit(1590275715.904:38): pid=9113 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir743775666/syzkaller.zif00M/75/file0" dev="sda1" ino=15896 res=1 23:15:16 executing program 0: syz_emit_ethernet(0x300cce, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaa000000000000810000008100000086dd600000000008"], 0x0) [ 228.210869][ T38] usb 4-1: config 118 has an invalid descriptor of length 0, skipping remainder of the config [ 228.240378][ T38] usb 4-1: config 118 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 228.306981][ T38] usb 4-1: config 118 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 228.389958][ T38] usb 4-1: New USB device found, idVendor=0400, idProduct=4200, bcdDevice=42.ef [ 228.409908][ T38] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 228.481282][ T38] hub 4-1:118.0: bad descriptor, ignoring hub [ 228.510468][ T38] hub: probe of 4-1:118.0 failed with error -5 [ 228.563942][ T38] cdc_wdm 4-1:118.0: cdc-wdm0: USB WDM device [ 228.801983][ T2655] usb 4-1: USB disconnect, device number 2 [ 229.169618][ T2515] usb 4-1: new full-speed USB device number 3 using dummy_hcd [ 229.529511][ T2515] usb 4-1: config 118 has an invalid descriptor of length 0, skipping remainder of the config [ 229.539834][ T2515] usb 4-1: config 118 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 229.551473][ T2515] usb 4-1: config 118 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 229.562045][ T2515] usb 4-1: New USB device found, idVendor=0400, idProduct=4200, bcdDevice=42.ef [ 229.571363][ T2515] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 229.620553][ T2515] hub 4-1:118.0: bad descriptor, ignoring hub [ 229.626739][ T2515] hub: probe of 4-1:118.0 failed with error -5 [ 229.645764][ T2515] cdc_wdm 4-1:118.0: cdc-wdm0: USB WDM device [ 229.761148][ T0] NOHZ: local_softirq_pending 08 [ 229.959412][ T2655] usb 4-1: USB disconnect, device number 3 [ 230.401072][ T0] NOHZ: local_softirq_pending 08 [ 230.598959][ T2625] usb 4-1: new high-speed USB device number 4 using dummy_hcd [ 230.838743][ T2625] usb 4-1: Using ep0 maxpacket: 8 [ 230.958740][ T2625] usb 4-1: config 118 has an invalid descriptor of length 0, skipping remainder of the config [ 230.969542][ T2625] usb 4-1: config 118 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 230.981031][ T2625] usb 4-1: config 118 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 230.991102][ T2625] usb 4-1: New USB device found, idVendor=0400, idProduct=4200, bcdDevice=42.ef [ 231.000282][ T2625] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 23:15:18 executing program 3: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000400)="600084e802000a00b10cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f00000002c0)=""/246) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 23:15:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000850700"/20, @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) 23:15:18 executing program 0: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x200000000, 0x2, &(0x7f0000000000)=[{&(0x7f0000000400)="600084e802000a00b10cda40ff1ad5c98f13", 0x12, 0x400}, {&(0x7f0000000640)="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", 0x309, 0x34f9}], 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, 0x0) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 23:15:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 23:15:18 executing program 4: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) msgctl$IPC_SET(0x0, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) 23:15:18 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, 0x0, 0xffdc) [ 231.052524][ T2625] usb 4-1: can't set config #118, error -71 [ 231.084266][ T2625] usb 4-1: USB disconnect, device number 4 [ 231.123644][ T9178] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 231.139122][ T27] audit: type=1800 audit(1590275718.885:39): pid=9179 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=15928 res=0 [ 231.205647][ T27] audit: type=1800 audit(1590275718.945:40): pid=9188 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15933 res=0 [ 231.259523][ T9179] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 231.262718][ T9178] 8021q: adding VLAN 0 to HW filter on device bond1 [ 231.271801][ T9188] MINIX-fs: mounting unchecked file system, running fsck is recommended 23:15:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r4, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc) bind$netlink(r3, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc) dup3(r2, r3, 0x0) 23:15:19 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="4400000035333f670ab905b607d942eb26060000001ce5ce009476d3bcecdc771e78088a6b4c231a0b30fdee5e9ddb09989a8886dcd5a6c5e6f2d6c711272ab6e537c34c260e4f7fa8f01898aedcb9968fbcd99bebce9903d58c03", @ANYRES16, @ANYBLOB="010000000000000000000900000030000380080001000000000014000200726f736530000000000000000000000008000500e000"], 0x44}}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) ftruncate(r1, 0x2008002) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r2, 0x800, 0x70bd29, 0x25dfdbff, {{}, {}, {0x20, 0x17, {0x0, 0x3, @l2={'ib', 0x3a, 'veth0_to_batadv\x00'}}}}, ["", "", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040800}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x9}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x200fff) [ 231.436715][ T9178] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 23:15:19 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x28001) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 23:15:19 executing program 1: keyctl$join(0x1, &(0x7f0000000200)={'syz', 0x1}) 23:15:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$TIPC_MCAST_REPLICAST(0xffffffffffffffff, 0x10f, 0x86) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f0000000640)="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", 0x10000, 0x80, 0x0, 0xfffffffffffffd64) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000880)=ANY=[@ANYRES32=0x0, @ANYBLOB], 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x6, 0x0, 0xb5}, 0x10) 23:15:19 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000100)=@req={0x0, 0xffffffff}, 0x10) [ 231.674062][ T6849] minix_free_inode: bit 1 already cleared 23:15:19 executing program 3: r0 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) 23:15:19 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="4400000035333f670ab905b607d942eb26060000001ce5ce009476d3bcecdc771e78088a6b4c231a0b30fdee5e9ddb09989a8886dcd5a6c5e6f2d6c711272ab6e537c34c260e4f7fa8f01898aedcb9968fbcd99bebce9903d58c03", @ANYRES16, @ANYBLOB="010000000000000000000900000030000380080001000000000014000200726f736530000000000000000000000008000500e0000001"], 0x44}}, 0x0) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000240)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) ftruncate(r1, 0x2008002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x9) sendfile(r0, r1, 0x0, 0x200fff) r2 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="cd", 0x1, 0xfffffffffffffffd) keyctl$clear(0x7, r2) keyctl$revoke(0x3, r2) 23:15:19 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3c) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@get={0x1, &(0x7f0000000140)=""/143, 0xff}) 23:15:19 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ttyS3\x00', 0x0, 0x0) pwritev(r0, 0x0, 0x0, 0x0) [ 232.014481][ T7126] minix_free_inode: bit 1 already cleared [ 232.076110][ T27] kauditd_printk_skb: 1 callbacks suppressed [ 232.076121][ T27] audit: type=1800 audit(1590275719.815:42): pid=9267 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15892 res=0 23:15:19 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_HELLO_TIME={0x8}]}}}]}, 0x3c}}, 0x0) 23:15:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() move_pages(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 23:15:20 executing program 3: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'macvlan0\x00', 0x0}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONT(r0, 0x5602, &(0x7f0000000000)) [ 232.243168][ T27] audit: type=1800 audit(1590275719.926:43): pid=9243 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=15922 res=0 23:15:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, 0x2, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924a17, 0x0) 23:15:20 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c0000001000850700"/20, @ANYRES32, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) 23:15:20 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fcntl$lock(r0, 0xb, 0x0) [ 232.595671][ T9294] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 232.746998][ T27] audit: type=1800 audit(1590275720.486:44): pid=9270 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15892 res=0 [ 232.852369][ T9294] 8021q: adding VLAN 0 to HW filter on device bond1 [ 232.902483][ T9335] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 232.929975][ T9335] bond2 (uninitialized): Released all slaves 23:15:20 executing program 4: syz_open_dev$hiddev(&(0x7f00000000c0)='/dev/usb/hiddev#\x00', 0x0, 0x0) r0 = syz_open_dev$hiddev(0x0, 0x0, 0x0) syz_open_dev$hiddev(0x0, 0x0, 0x0) ioctl$HIDIOCGFIELDINFO(r0, 0x4004480f, &(0x7f0000000000)) 23:15:20 executing program 5: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) recvmsg(r0, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000180)=""/27, 0x1b}], 0x1}, 0x0) 23:15:20 executing program 2: syz_open_dev$hidraw(&(0x7f0000000700)='/dev/hidraw#\x00', 0x0, 0x0) r0 = syz_open_dev$hidraw(0x0, 0x0, 0x0) ioctl$HIDIOCGRAWINFO(r0, 0x40305828, &(0x7f0000000000)=""/249) 23:15:20 executing program 1: syz_open_dev$hiddev(&(0x7f00000000c0)='/dev/usb/hiddev#\x00', 0x0, 0x0) r0 = syz_open_dev$hiddev(0x0, 0x0, 0x0) ioctl$HIDIOCGFIELDINFO(r0, 0x80044801, &(0x7f0000000000)) 23:15:20 executing program 3: syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x0, 0x1}, {0x60, 0x2}}) syz_open_dev$hidraw(0x0, 0x0, 0x101) r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x7d, 0x92, 0x7f, 0x40, 0x1209, 0x2323, 0xc348, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x72, 0x45, 0x8a}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f00000007c0)={0x84, &(0x7f00000002c0)={0x0, 0x0, 0x4, "cde83a01"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000540)={0x2c, &(0x7f0000000380), &(0x7f0000000480)={0x0, 0xa, 0x1, 0x7}, &(0x7f00000004c0)={0x0, 0x8, 0x1, 0x1}, &(0x7f0000000880)={0x20, 0x1, 0x1, "ef"}, &(0x7f0000000500)={0x20, 0x3, 0x1, 0x6}}) 23:15:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, 0x2, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924a17, 0x0) 23:15:20 executing program 5: r0 = syz_open_dev$hidraw(&(0x7f0000000700)='/dev/hidraw#\x00', 0x0, 0x0) read$hidraw(r0, 0x0, 0x0) 23:15:20 executing program 1: r0 = syz_usb_connect_ath9k(0x3, 0x92, &(0x7f0000000240)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0xc0c, &(0x7f0000002a00)=ANY=[@ANYBLOB="050c004e83e89102ec8bde087a6bfede66e17d55dc48fbfc69ce1831b8406d7232f1bd2c043cbe8f6a601dedfbd83e6611185ff626d0a8b9d77a17bff4509b9a9a3c6d35337fec002551d9e831788ad98b8a00a8abaf61da2c595735722218b055a947cc9d0a300500865a338b822f390661bacca766015278856e6f67e61b893ce71b9a3aa3f097848b4a2ec886a5f97c47d76541f0ddf1aa6de26d3c9b9741b157ea6ce05a7a289662c252707b503de4e2271acc418aefd1c2b610c2cf0d2d8569025fdd09cbbcad3f7d3f7e8f9781db43ba3a529485ac8eaacc1105b37f14ccea22f82c5f048da7eb637d7862064c10c2b61835401f79f8a50e78bd95bd4cbbb57cce8e54e0ef934b32fa75663af10d9dd12467882ecb68cbdb055948f11dd04c9e7ffc97916b19a87df9f530a88821b847a5409901570563aca7e0ceecf54dde0cd1dcd9936020a7364edc687adad30ce25828cb0d6810d2e0fa6d1eb8faf98aadb101bd583bb35c2b93250f1bb3cd4f95a43fdd5670e59a7d5a3b97a20800fec97ab01818f196a7ed035235ccf84db12deafce7f72d5a7f8f168cfa071e6804db014bf4168efbbd332d1bd6d02d7bc3d23dd3835906784936a10e872af2eacd9613a79368ce7d5402de4f662778261ed7055e9b6d6e97da91609d23e4c9335d9de63a7df1ade3bce7a532bbf853c62f269f7941981626b8fa1c2e8d0269309034ff82893c9f7ca84bbfd46f4935710f74d551ee9e63b173ddbacfb5f1a75d307a3e0bcfb6c8ee0efd8fdb3c0380bfb506d73e457af8c2263bd00ea10fd274f294b770e87ecfe10ac215a12de112698c67c3a6ef72e214e07ca6ca3766d81d355af35830d9d76640bacdfaf3eedb5a656cfd1edc76df8afafdbac20acc8de4d493814da48b7b9ae1fe6cc0d1028779327afeb3215ff4ef4a58d2f06cae67e153eecf6734bbe7616ae9e81d7e3367c18e16d392a968bf39ab1e0e59742d069f9ddc82927dca25a383793ca294e15e7d6dfcd019084d3475e4555456d4d596e00c39614245b607a93bcb29e5286e1391b9039663825556efd39ad9509f9e658f62c66850d02b04f7813223b3914f54daace072e465b1576cbd333b91972559f7411ca25bbaf1fe40bb3e9a680f333025ecc7fb1a4e8af11a8293a91e8609158572341ba429687224212ac977fa058c4bd6f9e0c8329e9705222a3b0e463c59d0ff4ab47f5b6b407168c16c3a1669604e83704c00f501fd3fef6f8535c6cef334a25789ce6b7bf6dc218b69d36b87c582157c1ba205eb30bc33e25671247eaa67471e704b922d30d1c8deb9f397a2fc4349cdc9a37317130f2d7851f8ef5e2dd5df4611cc1d571ac1f6045ac1b59fc12bafb88f50e1126f6480d9ea223c123c99150f05d018d1c8e58efc47ebfec2d8e915d932aef473a0039032f88364b8849f8bc022ff7a1050132301b5af21cc1a29619f9aebaad6a44d2e2340aadd833a2171bf87054c342fab6f9b82a1b90f4b78cf467a3dc82889d8d21cdcbe4dd8668ec2d302780cfc6ead0228c66516d9d044ac11ae5c3c3f8e2a1f3e59567963351d7fd67c6a04d21b3f50e2feaa577bad6844d49ba31dbf1db34f2390222bbdc791c8c27b1cb7bdf00c3c7e4bc239468ea93b7a95cf48643d1c17f2990ae33dfcb817cced0421d5cd3b7e4983835236e736cf0bc55fbe7542114e6fa9f1596fc0329e3d26f97c4b7d54cafb7344e6cbb99341ec65ed43fde214beb1c6648d438496be300633db5dad5063ed9abc25c38b6e1414c3272f0dc1123e61ecb39965a32bd8e540666adbd50bed785077b7cc7912b65f53cb683949fc32315a29dc276cb705e43117b6cf7a28c76ac5d58c3c01a71e41d9905381a91301c4f257774fef58b23088c0f3cfd1c4a4fb01052c60692092593685ce62ec4247db7865047c69320b14627f884137105d43f1eba6cd3ee1fdf2bae11c5c3ed8728c7395d0b173ee85e63056941bffd8f2e98ba0555ce3b458c3ddcaa7a8d8739fe59cd1cc4ecc00de561ebf37bb885e47e169930f7088d3b1f89420a3b8daf065ba57ca40ac06e680838a21cbfee6aad2baa9bf5ab9bd44a2ea3e1cfb7a8a6dc34f3039f6daff5bebcbabd0683ad9049f288532ec53c69913dad30c1f0b1ae032b95fbe3acf2bd38d845f555460de89f1f854845696a9edf92189b47e7deb02833f7040d6e5a15959c72c712282fb40008cf310c99e521c709535132a2534fb02b18c01e8c8d517b72311f1621b67381049aff0194f390531e4df7d3494d362f7fa060000b000f5e1b459b0951f760f43fd8a99321ea6cbd1a5000d562d8e65339dedcf6fe0efafa184f707154b08ad74f52e2ca51b2942350023f87f1ef4d1f4cfa7d878bceba5875b3ce9c71556da9b654ab3ab9c9278128cb35bffc6e6a89ca137e3f7458d08aa2e6399f3bef82bd26465af466d144bbb1c27a8e0e8b236cd63ddd57d224b86061e06f5daec86c6ec0e126a7fa1833bd6819af434a557f1f639326870e80bde6501def4e1ed46982ab63db2f42106fadf52e41ecb97722cf89ae9adf316c8472a1f9b05fffcd2b5fdf683570b9079e236beb4706e0596baf1c7f180544d34114c76c81070d77697e89c6db2c57437ea2b7a4a41fe232ea69afdfc4955bd7b12eb724b4958099fc1da4715373137c3b655357fc1eadf0180419e2667c19fd5acb003bcb6dcd05656cff8737a0b70880df17a154a89bf5f0a72664ca57c9574db73bec117c851e399cdf5d4d439e2dc7dffbee00a4cb4589eb614cb4e3014ce9d8c750b3c9c36d643ec8e8cdeb136278afb640f7ff532976ab745fa3560ba5c9a31ec73bcc3dfc0a51f5903333160d6a349e4e9ad9eb25f25ac88c0deb84ba26192f440d2afbd039ed260cd41d8f8bcbdd6fa2182acbcdeac539881fd5efb08877e6a73af1db14144e7a25a4467b15a6b32683b977f8a6996052e3097320beb64ade18f1caa480936e277f9ddd41ae647ec2083e81c8bb8a851475aa782f047c56e8bd09fa2ddac1f9eee8152dfffaa74b47426c9c7430b23004b87ec1cd3901d7d81a6a243e61f1c3534afef0514bb4541e516e7db11cb58075cfa5c43e1874031036b7766f0f86f53215766f4b69ba5bf523bf5ab9cb4db364c5b928439d7bd31586f7629c2c49c9b41aefd6cd7dfa0428c82626a2b9b09e1da5dfbbea0e6c80ff26c25cafedf0b60e5729f5189fd929b55e5f3dab8b1b474c7327cef1c065eff86ceb0c3f48dfb8bf73c8b7b4bc3b5ee454f3f989666a03f0a43c586650166eb39941540a4e7b010b830c76b7346c4a4a6125497cfe70fa8c477d766b2376189395e1583055155a51798b039b546c2e547d6c4c20139007014df69c6dff94c48ca1465d66323e25f8ff94fc988eb261752a99b361409a5ba879c7569a846d594507a26c599f8081a84a3937c95b5c7dc31f115a7daa011e327b5033c3a2507bc0af687be52a8b4f4750ebfd07acbb3ba7b446a9b9497926d4f6bad236fc886180b9b93fe4b5d8e234c848dca48ef2df3b11a5955456b053ac1a86f9c42838fa4ff23a34e435f32c0816a025554696c47add742243df5e52a085272ad8aee35c56570505c6dad45bd517faa499b6b5ecc99051ce0901a651b93430f57456d9f4ae8502bfa82ec756ed9522fcce8f5fbadf0fccbfbb88a47d70f9ef60aed9081c80d78b01862d63357750769acf7a8373d56814572e7fcc8e32bfdde85f651fbdc17d8b625198581c6a00c603d56b862829dcf466a4cc121b4107664e08c584bd2106a918b01c64c7859f14715cb0427c313783dcfe7fab02e30fe364a1bd59e68f962a96b4e9c5db1118388dd04891e2282112840f3131277fafafb4f1d90b0173f393e8a1be64748b43580eea24baccee47cfb3ed463d70a6e5ddaab38a0605b666cae99535d3f7561a139e9b1ae835888c574bbe71e70fe1889c7fcb1984af487dedaad9ca3e6dd995b74c9137ea4d06b25c28c51184af99988cc80db20a5368aca5e8b56badd29b72e84be54b2447fea2bddae5cec171078bb2c8cc7a795e175ffef3720838827e2708368aa3f1a7e5aa8ce960b3c8ee50ce9cf9c28e7c53e9b50d7b7ea7bdc5056071323aaf055deb7f41b10729cbf92051e0664b21ce866e016a402dd1e64e98809da7f8d660865212f94a8f8cb9196b410a3df9996348801b5bfec32b75f259db19be56b000183d515cffa558be42adeaa7f00109e96b18197ffffff7f000000003ca5c97636595a89f59fe7199c3e578ce72552fb51ed6fbd1d640cf3f3a378cc766499fdcf1288e17e3eb5361522429da0aefb38e08745c9efedede8a9"]) syz_open_dev$hidraw(0x0, 0x0, 0x180041) r1 = syz_open_dev$hidraw(0x0, 0x0, 0x12d43d) write$hidraw(r1, &(0x7f0000000000)="3a0ac17e00595345e24ea72cf22da8cf6bd8605cc6dd64", 0x800000) r2 = syz_open_dev$hidraw(0x0, 0x0, 0x12d43d) r3 = syz_open_dev$hidraw(0x0, 0x0, 0x2) read$hidraw(r3, &(0x7f0000001080)=""/228, 0xe4) write$hidraw(r3, 0x0, 0x0) read$hidraw(r3, &(0x7f0000000080)=""/4096, 0x20001080) ioctl$HIDIOCSFEATURE(r3, 0xc0404806, &(0x7f0000000040)="0e7af4530b280d5804b260891802f8702925bffaf5c5de17d08dc340ceacb3b1020d3f879d4cd776e642701c3ed7146dccb3e92df6b56e01ee55ad153b4c05ce5406ac643edf4bddf7b6d9b4c96cf723bd636818a4f08401f03beb9cb42be136f904244d280c") write$hidraw(r2, &(0x7f0000000000)="3a0ac17e00595345e24ea72cf22da8cf6bd8605cc6dd64", 0x800000) r4 = syz_open_dev$evdev(&(0x7f0000001180)='/dev/input/event#\x00', 0x40, 0x0) ioctl$EVIOCGID(r4, 0x80084502, &(0x7f00000011c0)=""/181) 23:15:20 executing program 2: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000a40)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_open_dev$hidraw(&(0x7f0000000700)='/dev/hidraw#\x00', 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\"s'], 0x0}, 0x0) r1 = syz_open_dev$hidraw(0x0, 0x0, 0x0) ioctl$HIDIOCGRDESC(r1, 0x90044802, &(0x7f0000000a80)=ANY=[@ANYBLOB="01000004"]) 23:15:20 executing program 5: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0xc0c, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"]) syz_open_dev$hidraw(0x0, 0x0, 0xf4359e530c4d109b) 23:15:20 executing program 4: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000a40)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000140, 0x926, 0x3333, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_open_dev$hidraw(&(0x7f0000000700)='/dev/hidraw#\x00', 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\"s'], 0x0}, 0x0) r1 = syz_open_dev$hidraw(0x0, 0x0, 0x0) ioctl$HIDIOCGRAWINFO(r1, 0x80044801, &(0x7f0000000000)=""/249) 23:15:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, 0x2, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924a17, 0x0) [ 233.417624][ T2649] usb 4-1: new high-speed USB device number 5 using dummy_hcd [ 233.511896][ T2650] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 233.527513][ T2515] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 233.527677][ T2625] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 233.557776][ T2655] usb 5-1: new high-speed USB device number 4 using dummy_hcd 23:15:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, 0x2, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) r2 = socket(0x10, 0x80002, 0xc) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924a17, 0x0) [ 233.808029][ T2649] usb 4-1: New USB device found, idVendor=1209, idProduct=2323, bcdDevice=c3.48 [ 233.821622][ T2649] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 233.845298][ T2649] usb 4-1: config 0 descriptor?? [ 233.928956][ T2655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 233.937405][ T2625] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 233.955058][ T2625] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 233.962736][ T2655] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 233.973056][ T2625] usb 3-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 233.984283][ T2625] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 234.010594][ T2625] usb 3-1: config 0 descriptor?? [ 234.014073][ T2655] usb 5-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 234.082653][ T2655] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 234.104249][ T2655] usb 5-1: config 0 descriptor?? [ 234.107450][ T2650] usb 6-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 234.127944][ T2515] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 234.136113][ T2650] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 234.141479][ T2515] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 234.170961][ T2515] usb 2-1: Product: syz [ 234.172771][ T2650] usb 6-1: Product: syz 23:15:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, 0x2, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924a17, 0x0) [ 234.180835][ T2515] usb 2-1: Manufacturer: syz [ 234.189695][ T2515] usb 2-1: SerialNumber: syz [ 234.220576][ T2650] usb 6-1: Manufacturer: syz [ 234.232672][ T2650] usb 6-1: SerialNumber: syz 23:15:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, 0x2, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924a17, 0x0) 23:15:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, 0x2, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924a17, 0x0) [ 234.509234][ T2625] keytouch 0003:0926:3333.0001: fixing up Keytouch IEC report descriptor [ 234.531184][ T2625] input: HID 0926:3333 as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/0003:0926:3333.0001/input/input5 [ 234.618525][ T2655] keytouch 0003:0926:3333.0002: fixing up Keytouch IEC report descriptor [ 234.665488][ T2655] input: HID 0926:3333 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0926:3333.0002/input/input6 [ 234.704779][ T2625] keytouch 0003:0926:3333.0001: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.2-1/input0 [ 234.783218][ T2625] usb 3-1: USB disconnect, device number 2 [ 234.792370][ T2655] keytouch 0003:0926:3333.0002: input,hidraw1: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.4-1/input0 [ 234.861396][ T2655] usb 5-1: USB disconnect, device number 4 [ 234.939705][ T2625] ================================================================== [ 234.948012][ T2625] BUG: KASAN: use-after-free in __mutex_lock+0x1033/0x13c0 [ 234.955217][ T2625] Read of size 8 at addr ffff8880941cc158 by task kworker/1:3/2625 [ 234.963099][ T2625] [ 234.965435][ T2625] CPU: 1 PID: 2625 Comm: kworker/1:3 Not tainted 5.7.0-rc6-next-20200522-syzkaller #0 [ 234.974978][ T2625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.985046][ T2625] Workqueue: usb_hub_wq hub_event [ 234.990070][ T2625] Call Trace: [ 234.993368][ T2625] dump_stack+0x18f/0x20d [ 234.997704][ T2625] ? __mutex_lock+0x1033/0x13c0 [ 235.002558][ T2625] ? __mutex_lock+0x1033/0x13c0 [ 235.007419][ T2625] print_address_description.constprop.0.cold+0xd3/0x413 [ 235.014443][ T2625] ? cdev_device_del+0x69/0x80 [ 235.019208][ T2625] ? evdev_disconnect+0x3d/0xb0 [ 235.024069][ T2625] ? __input_unregister_device+0x1b0/0x430 [ 235.029878][ T2625] ? input_unregister_device+0xb4/0xf0 [ 235.035342][ T2625] ? hidinput_disconnect+0x15e/0x3d0 [ 235.040620][ T2625] ? vprintk_func+0x97/0x1a6 [ 235.045193][ T2625] ? __mutex_lock+0x1033/0x13c0 [ 235.050036][ T2625] kasan_report.cold+0x1f/0x37 [ 235.054808][ T2625] ? __mutex_lock+0x1033/0x13c0 [ 235.059663][ T2625] __mutex_lock+0x1033/0x13c0 [ 235.064348][ T2625] ? evdev_cleanup+0x21/0x190 [ 235.069025][ T2625] ? print_usage_bug+0x240/0x240 [ 235.073958][ T2625] ? trace_hardirqs_off+0x50/0x220 [ 235.079060][ T2625] ? mutex_trylock+0x2c0/0x2c0 [ 235.083857][ T2625] ? mark_held_locks+0x9f/0xe0 [ 235.088622][ T2625] ? kfree+0x1eb/0x2b0 [ 235.092696][ T2625] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 235.098681][ T2625] ? kfree_const+0x51/0x60 [ 235.103110][ T2625] ? evdev_cleanup+0x21/0x190 [ 235.107783][ T2625] evdev_cleanup+0x21/0x190 [ 235.112285][ T2625] evdev_disconnect+0x45/0xb0 [ 235.116958][ T2625] __input_unregister_device+0x1b0/0x430 [ 235.122602][ T2625] input_unregister_device+0xb4/0xf0 [ 235.127914][ T2625] hidinput_disconnect+0x15e/0x3d0 [ 235.133033][ T2625] ? kernfs_remove_by_name_ns+0x62/0xb0 [ 235.138589][ T2625] hid_disconnect+0x13f/0x1a0 [ 235.143273][ T2625] hid_device_remove+0x186/0x240 [ 235.148212][ T2625] ? hid_compare_device_paths+0xc0/0xc0 [ 235.153759][ T2625] device_release_driver_internal+0x231/0x500 [ 235.159822][ T2625] bus_remove_device+0x2dc/0x4a0 [ 235.164740][ T2625] device_del+0x481/0xd30 [ 235.169113][ T2625] ? device_link_add_missing_supplier_links+0x370/0x370 [ 235.176064][ T2625] ? mark_held_locks+0x9f/0xe0 [ 235.180842][ T2625] ? _raw_spin_unlock_irq+0x1f/0x80 [ 235.186049][ T2625] hid_destroy_device+0xe1/0x150 [ 235.190992][ T2625] usbhid_disconnect+0x9f/0xe0 [ 235.195758][ T2625] usb_unbind_interface+0x1bd/0x8a0 [ 235.200969][ T2625] ? __pm_runtime_idle+0xd1/0x320 [ 235.205991][ T2625] ? usb_autoresume_device+0x60/0x60 [ 235.211288][ T2625] device_release_driver_internal+0x432/0x500 [ 235.217395][ T2625] bus_remove_device+0x2dc/0x4a0 [ 235.222341][ T2625] device_del+0x481/0xd30 [ 235.226680][ T2625] ? device_link_add_missing_supplier_links+0x370/0x370 [ 235.233614][ T2625] ? usb_remove_ep_devs+0x3e/0x80 [ 235.238643][ T2625] ? remove_intf_ep_devs+0x13f/0x1d0 [ 235.243934][ T2625] usb_disable_device+0x211/0x690 [ 235.248971][ T2625] usb_disconnect+0x284/0x8d0 [ 235.253647][ T2625] hub_event+0x17ca/0x38f0 [ 235.258059][ T2625] ? hub_port_debounce+0x260/0x260 [ 235.263188][ T2625] ? usermodehelper_read_trylock+0xf0/0x2d0 [ 235.269064][ T2625] ? debug_smp_processor_id+0x2f/0x185 [ 235.274506][ T2625] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 235.280028][ T2625] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 235.286006][ T2625] process_one_work+0x965/0x16a0 [ 235.290936][ T2625] ? lock_release+0x800/0x800 [ 235.295602][ T2625] ? pwq_dec_nr_in_flight+0x310/0x310 [ 235.300952][ T2625] ? rwlock_bug.part.0+0x90/0x90 [ 235.305907][ T2625] worker_thread+0x7ab/0xe20 [ 235.310494][ T2625] ? process_one_work+0x16a0/0x16a0 [ 235.315670][ T2625] kthread+0x3b5/0x4a0 [ 235.319723][ T2625] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 235.325427][ T2625] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 235.331140][ T2625] ret_from_fork+0x24/0x30 [ 235.335567][ T2625] [ 235.337885][ T2625] Allocated by task 2625: [ 235.342222][ T2625] save_stack+0x1b/0x40 [ 235.346375][ T2625] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 235.352007][ T2625] kmem_cache_alloc_trace+0x153/0x7d0 [ 235.357377][ T2625] evdev_connect+0x80/0x4d0 [ 235.361880][ T2625] input_attach_handler+0x194/0x200 [ 235.367067][ T2625] input_register_device.cold+0xf5/0x246 [ 235.372687][ T2625] hidinput_connect+0x4f8f/0xdb30 [ 235.377687][ T2625] hid_connect+0x96b/0xbc0 [ 235.382098][ T2625] hid_hw_start+0xa2/0x130 [ 235.386515][ T2625] hid_device_probe+0x397/0x3f0 [ 235.391360][ T2625] really_probe+0x281/0x6d0 [ 235.395839][ T2625] driver_probe_device+0xfe/0x1d0 [ 235.400849][ T2625] __device_attach_driver+0x1c2/0x220 [ 235.406216][ T2625] bus_for_each_drv+0x162/0x1e0 [ 235.411101][ T2625] __device_attach+0x21a/0x360 [ 235.415873][ T2625] bus_probe_device+0x1e4/0x290 [ 235.420699][ T2625] device_add+0xaf1/0x1900 [ 235.425098][ T2625] hid_add_device+0x33c/0x9a0 [ 235.429758][ T2625] usbhid_probe+0xac8/0xff0 [ 235.434240][ T2625] usb_probe_interface+0x305/0x7a0 [ 235.439329][ T2625] really_probe+0x281/0x6d0 [ 235.443847][ T2625] driver_probe_device+0xfe/0x1d0 [ 235.448846][ T2625] __device_attach_driver+0x1c2/0x220 [ 235.454253][ T2625] bus_for_each_drv+0x162/0x1e0 [ 235.459088][ T2625] __device_attach+0x21a/0x360 [ 235.463830][ T2625] bus_probe_device+0x1e4/0x290 [ 235.468672][ T2625] device_add+0xaf1/0x1900 [ 235.473085][ T2625] usb_set_configuration+0xec5/0x1740 [ 235.478457][ T2625] usb_generic_driver_probe+0x9d/0xe0 [ 235.483807][ T2625] usb_probe_device+0xc6/0x1f0 [ 235.488558][ T2625] really_probe+0x281/0x6d0 [ 235.493058][ T2625] driver_probe_device+0xfe/0x1d0 [ 235.498082][ T2625] __device_attach_driver+0x1c2/0x220 [ 235.503479][ T2625] bus_for_each_drv+0x162/0x1e0 [ 235.508322][ T2625] __device_attach+0x21a/0x360 [ 235.513066][ T2625] bus_probe_device+0x1e4/0x290 [ 235.517904][ T2625] device_add+0xaf1/0x1900 [ 235.522312][ T2625] usb_new_device.cold+0x753/0x103d [ 235.527524][ T2625] hub_event+0x1eca/0x38f0 [ 235.531920][ T2625] process_one_work+0x965/0x16a0 [ 235.536940][ T2625] worker_thread+0x96/0xe20 [ 235.541437][ T2625] kthread+0x3b5/0x4a0 [ 235.545497][ T2625] ret_from_fork+0x24/0x30 [ 235.549885][ T2625] [ 235.552208][ T2625] Freed by task 2625: [ 235.556173][ T2625] save_stack+0x1b/0x40 [ 235.560318][ T2625] __kasan_slab_free+0xf7/0x140 [ 235.565158][ T2625] kfree+0x109/0x2b0 [ 235.569045][ T2625] device_release+0x71/0x200 [ 235.573612][ T2625] kobject_put+0x1c8/0x2f0 [ 235.578015][ T2625] cdev_device_del+0x69/0x80 [ 235.582599][ T2625] evdev_disconnect+0x3d/0xb0 [ 235.587289][ T2625] __input_unregister_device+0x1b0/0x430 [ 235.592897][ T2625] input_unregister_device+0xb4/0xf0 [ 235.598195][ T2625] hidinput_disconnect+0x15e/0x3d0 [ 235.603310][ T2625] hid_disconnect+0x13f/0x1a0 [ 235.607983][ T2625] hid_device_remove+0x186/0x240 [ 235.612905][ T2625] device_release_driver_internal+0x231/0x500 [ 235.618949][ T2625] bus_remove_device+0x2dc/0x4a0 [ 235.623874][ T2625] device_del+0x481/0xd30 [ 235.628195][ T2625] hid_destroy_device+0xe1/0x150 [ 235.633114][ T2625] usbhid_disconnect+0x9f/0xe0 [ 235.637855][ T2625] usb_unbind_interface+0x1bd/0x8a0 [ 235.643042][ T2625] device_release_driver_internal+0x432/0x500 [ 235.649094][ T2625] bus_remove_device+0x2dc/0x4a0 [ 235.654011][ T2625] device_del+0x481/0xd30 [ 235.658327][ T2625] usb_disable_device+0x211/0x690 [ 235.663354][ T2625] usb_disconnect+0x284/0x8d0 [ 235.668022][ T2625] hub_event+0x17ca/0x38f0 [ 235.672420][ T2625] process_one_work+0x965/0x16a0 [ 235.677343][ T2625] worker_thread+0x7ab/0xe20 [ 235.681924][ T2625] kthread+0x3b5/0x4a0 [ 235.685969][ T2625] ret_from_fork+0x24/0x30 [ 235.690358][ T2625] [ 235.692667][ T2625] The buggy address belongs to the object at ffff8880941cc000 [ 235.692667][ T2625] which belongs to the cache kmalloc-2k of size 2048 [ 235.706714][ T2625] The buggy address is located 344 bytes inside of [ 235.706714][ T2625] 2048-byte region [ffff8880941cc000, ffff8880941cc800) [ 235.720054][ T2625] The buggy address belongs to the page: [ 235.725667][ T2625] page:ffffea0002507300 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 [ 235.734747][ T2625] flags: 0xfffe0000000200(slab) [ 235.739584][ T2625] raw: 00fffe0000000200 ffffea00024e40c8 ffffea0002535108 ffff8880aa000e00 [ 235.748146][ T2625] raw: 0000000000000000 ffff8880941cc000 0000000100000001 0000000000000000 [ 235.756700][ T2625] page dumped because: kasan: bad access detected [ 235.763082][ T2625] [ 235.765386][ T2625] Memory state around the buggy address: [ 235.770991][ T2625] ffff8880941cc000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 235.779044][ T2625] ffff8880941cc080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 235.787100][ T2625] >ffff8880941cc100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 235.795145][ T2625] ^ [ 235.802073][ T2625] ffff8880941cc180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 235.810113][ T2625] ffff8880941cc200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 235.818160][ T2625] ================================================================== [ 235.826203][ T2625] Disabling lock debugging due to kernel taint [ 235.847059][ T2625] Kernel panic - not syncing: panic_on_warn set ... [ 235.853659][ T2625] CPU: 1 PID: 2625 Comm: kworker/1:3 Tainted: G B 5.7.0-rc6-next-20200522-syzkaller #0 [ 235.864592][ T2625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.874658][ T2625] Workqueue: usb_hub_wq hub_event [ 235.879669][ T2625] Call Trace: [ 235.882957][ T2625] dump_stack+0x18f/0x20d [ 235.887290][ T2625] ? __mutex_lock+0xf50/0x13c0 [ 235.892049][ T2625] panic+0x2e3/0x75c [ 235.895945][ T2625] ? __warn_printk+0xf3/0xf3 [ 235.900535][ T2625] ? preempt_schedule_common+0x5e/0xc0 [ 235.905989][ T2625] ? __mutex_lock+0x1033/0x13c0 [ 235.910832][ T2625] ? __mutex_lock+0x1033/0x13c0 [ 235.915682][ T2625] ? preempt_schedule_thunk+0x16/0x18 [ 235.921070][ T2625] ? trace_hardirqs_on+0x55/0x230 [ 235.926086][ T2625] ? __mutex_lock+0x1033/0x13c0 [ 235.930928][ T2625] ? __mutex_lock+0x1033/0x13c0 [ 235.935770][ T2625] end_report+0x4d/0x53 [ 235.939921][ T2625] kasan_report.cold+0xd/0x37 [ 235.944736][ T2625] ? __mutex_lock+0x1033/0x13c0 [ 235.949580][ T2625] __mutex_lock+0x1033/0x13c0 [ 235.954265][ T2625] ? evdev_cleanup+0x21/0x190 [ 235.958937][ T2625] ? print_usage_bug+0x240/0x240 [ 235.963863][ T2625] ? trace_hardirqs_off+0x50/0x220 [ 235.968950][ T2625] ? mutex_trylock+0x2c0/0x2c0 [ 235.973689][ T2625] ? mark_held_locks+0x9f/0xe0 [ 235.978440][ T2625] ? kfree+0x1eb/0x2b0 [ 235.982495][ T2625] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 235.988467][ T2625] ? kfree_const+0x51/0x60 [ 235.992874][ T2625] ? evdev_cleanup+0x21/0x190 [ 235.997522][ T2625] evdev_cleanup+0x21/0x190 [ 236.002000][ T2625] evdev_disconnect+0x45/0xb0 [ 236.006652][ T2625] __input_unregister_device+0x1b0/0x430 [ 236.012281][ T2625] input_unregister_device+0xb4/0xf0 [ 236.017552][ T2625] hidinput_disconnect+0x15e/0x3d0 [ 236.022647][ T2625] ? kernfs_remove_by_name_ns+0x62/0xb0 [ 236.028175][ T2625] hid_disconnect+0x13f/0x1a0 [ 236.032827][ T2625] hid_device_remove+0x186/0x240 [ 236.037744][ T2625] ? hid_compare_device_paths+0xc0/0xc0 [ 236.043280][ T2625] device_release_driver_internal+0x231/0x500 [ 236.049328][ T2625] bus_remove_device+0x2dc/0x4a0 [ 236.054240][ T2625] device_del+0x481/0xd30 [ 236.058569][ T2625] ? device_link_add_missing_supplier_links+0x370/0x370 [ 236.065491][ T2625] ? mark_held_locks+0x9f/0xe0 [ 236.070243][ T2625] ? _raw_spin_unlock_irq+0x1f/0x80 [ 236.075434][ T2625] hid_destroy_device+0xe1/0x150 [ 236.080621][ T2625] usbhid_disconnect+0x9f/0xe0 [ 236.085400][ T2625] usb_unbind_interface+0x1bd/0x8a0 [ 236.090587][ T2625] ? __pm_runtime_idle+0xd1/0x320 [ 236.095599][ T2625] ? usb_autoresume_device+0x60/0x60 [ 236.100871][ T2625] device_release_driver_internal+0x432/0x500 [ 236.106914][ T2625] bus_remove_device+0x2dc/0x4a0 [ 236.111826][ T2625] device_del+0x481/0xd30 [ 236.116132][ T2625] ? device_link_add_missing_supplier_links+0x370/0x370 [ 236.123040][ T2625] ? usb_remove_ep_devs+0x3e/0x80 [ 236.128041][ T2625] ? remove_intf_ep_devs+0x13f/0x1d0 [ 236.133302][ T2625] usb_disable_device+0x211/0x690 [ 236.138316][ T2625] usb_disconnect+0x284/0x8d0 [ 236.142972][ T2625] hub_event+0x17ca/0x38f0 [ 236.147372][ T2625] ? hub_port_debounce+0x260/0x260 [ 236.152457][ T2625] ? usermodehelper_read_trylock+0xf0/0x2d0 [ 236.158327][ T2625] ? debug_smp_processor_id+0x2f/0x185 [ 236.163763][ T2625] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 236.169295][ T2625] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 236.175249][ T2625] process_one_work+0x965/0x16a0 [ 236.180251][ T2625] ? lock_release+0x800/0x800 [ 236.184905][ T2625] ? pwq_dec_nr_in_flight+0x310/0x310 [ 236.190252][ T2625] ? rwlock_bug.part.0+0x90/0x90 [ 236.195177][ T2625] worker_thread+0x7ab/0xe20 [ 236.199746][ T2625] ? process_one_work+0x16a0/0x16a0 [ 236.204918][ T2625] kthread+0x3b5/0x4a0 [ 236.208964][ T2625] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 236.214662][ T2625] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 236.220357][ T2625] ret_from_fork+0x24/0x30 [ 236.225862][ T2625] Kernel Offset: disabled [ 236.230191][ T2625] Rebooting in 86400 seconds..