[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.115' (ECDSA) to the list of known hosts. 2020/03/27 01:32:39 fuzzer started syzkaller login: [ 68.268461][ T7028] as (7028) used greatest stack depth: 23248 bytes left 2020/03/27 01:32:41 dialing manager at 10.128.0.26:37557 2020/03/27 01:32:41 syscalls: 2997 2020/03/27 01:32:41 code coverage: enabled 2020/03/27 01:32:41 comparison tracing: enabled 2020/03/27 01:32:41 extra coverage: enabled 2020/03/27 01:32:41 setuid sandbox: enabled 2020/03/27 01:32:41 namespace sandbox: enabled 2020/03/27 01:32:41 Android sandbox: enabled 2020/03/27 01:32:41 fault injection: enabled 2020/03/27 01:32:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/03/27 01:32:41 net packet injection: enabled 2020/03/27 01:32:41 net device setup: enabled 2020/03/27 01:32:41 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/03/27 01:32:41 devlink PCI setup: PCI device 0000:00:10.0 is not available 01:35:13 executing program 0: ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000000)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x480b01, 0x0) ioctl$SOUND_PCM_READ_BITS(r0, 0x80045005, &(0x7f0000000080)) memfd_create(&(0x7f00000000c0)='\x00', 0x2) getsockname$tipc(0xffffffffffffffff, &(0x7f0000000100)=@id, &(0x7f0000000140)=0x10) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0xd, 0x2, {{0x1, 0x3, 0x5}, 0x42b0}}, 0x18) sendmsg$AUDIT_GET(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x10, 0x3e8, 0x800, 0x70bd26, 0x25dfdbfb, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x8000) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000340)={0xa00000, 0x3, 0x1d4, r0, 0x0, &(0x7f0000000300)={0x9a0908, 0x7f, [], @p_u32=&(0x7f00000002c0)=0x4bd}}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000380)={0x13}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) r3 = getpgrp(0xffffffffffffffff) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000400)={0xfffffff7, 0x8, {r3}, {}, 0xb9, 0x5}) setxattr$trusted_overlay_upper(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.upper\x00', &(0x7f00000004c0)={0x0, 0xfb, 0x6a, 0x0, 0x3, "76702b9d28793c222d0e9bd740789775", "e2c5354f60df7082da9cb40383a0376101a3633025389c322a45198b76e86e84cec44f1ee8f3d7f3aa80a64c53e9fd755c30701115384a1f48279f5c65b52f4b4e063147e72cbbcaaa3e70e6ca9c84b8ade64e3512"}, 0x6a, 0x2) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x80080, 0x0) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000002840)=0x0, &(0x7f0000002880)=0x4) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f00000028c0)=r6) clock_gettime(0x0, &(0x7f0000002940)={0x0, 0x0}) sendmsg$can_bcm(r1, &(0x7f0000002a40)={&(0x7f0000002900)={0x1d, r6}, 0x10, &(0x7f0000002a00)={&(0x7f0000002980)={0x2, 0x200, 0xfffffffd, {0x0, 0x2710}, {r7, r8/1000+30000}, {0x1, 0x0, 0x0, 0x1}, 0x1, @can={{0x0, 0x0, 0x1, 0x1}, 0x1, 0x1, 0x0, 0x0, "9717d7deab5a1093"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0xc884) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000002a80)={0x0, 0x3, 0x2, 0xbbe, r4}) [ 221.005825][ T27] audit: type=1400 audit(1585272913.805:8): avc: denied { execmem } for pid=7045 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 221.141833][ T7046] IPVS: ftp: loaded support on port[0] = 21 01:35:14 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x1, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x2, 0x11, 0x4, 0x3, 0x29, 0x0, 0x70bd2c, 0x25dfdbfe, [@sadb_spirange={0x2, 0x10, 0x4d6, 0x4d6}, @sadb_x_sa2={0x2, 0x13, 0x0, 0x0, 0x0, 0x70bd2c, 0x3507}, @sadb_x_sec_ctx={0x13, 0x18, 0x1, 0x3, 0x8c, "14226d394d6ceed4a3867310ee17224f4e9e383bba4ed12f5f48cfea64c679f111da75e844dd9fa98435bfadd2fdb92bc4f5a142b5b1438a42fcb3c7a09f2c81837c5f82682344f8f09550cf07e33d5ece6ee7060e9c2c4d268ecec0b8c1af2e7618551103e5509a7b0a553d801460fe329ffd453c1fa5a9fb1e58ea4611952a24bb1c56773eb9738456927b"}, @sadb_x_filter={0x5, 0x1a, @in6=@mcast2, @in=@broadcast, 0x1, 0x10, 0x14}, @sadb_address={0x3, 0x5, 0x6c, 0xa0, 0x0, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x3, 0x0, 0x6e6bb9, 0x1, {0x6, 0x3c, 0xd9, 0x0, 0x0, 0x9, 0x0, @in=@multicast2, @in=@loopback}}]}, 0x148}}, 0x20010010) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000240)={0x8000, 0x0, 0xc87388d286c24f49, r0}) write$binfmt_elf32(r1, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x3f, 0x5, 0x0, 0x101, 0x3, 0x6, 0xe64b, 0x353, 0x38, 0x15c, 0x866, 0x7fff, 0x20, 0x1, 0xf6bb, 0x414d, 0x5}, [{0x6474e551, 0x7, 0x1, 0x7fffffff, 0x7f, 0x5, 0x6, 0x3}], "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", [[], [], [], [], []]}, 0x1558) r2 = dup2(0xffffffffffffffff, r0) ioctl$SOUND_MIXER_READ_VOLUME(r2, 0x80044d1d, &(0x7f0000001800)) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001840)) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001880)='/dev/dlm-monitor\x00', 0x2001, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r3, 0x80845663, &(0x7f00000018c0)={0x0, @reserved}) write$binfmt_script(r2, &(0x7f0000001980)={'#! ', './file0', [{}, {0x20, '!]#'}, {0x20, '+'}, {0x20, '/dev/ubi_ctrl\x00'}, {0x20, '/dev/dlm-monitor\x00'}, {0x20, 'cpuset)vmnet1mime_typeselfselinux'}], 0xa, "162e323cf42e149b5d7a29bf0bc812a4fc79505c9d9912a4b2dd9128fd76bd4786fadd556cf32fe6f56666707dd8a6ead032f20af61154874f652b6ea7daef4d26e74b6b2d4195ba29cfcbede1c9b09afb099cb16b82b00a8db50ec6a65cda59f6fdf8037b84f65538baa160b3a2d567f52359cf2f33bb23e6cf50977cb0756ff96ca4a014f7b6d08c2196e474baa3196be1"}, 0xe7) sendmsg$SOCK_DESTROY(r0, &(0x7f0000001c00)={&(0x7f0000001a80)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000001bc0)={&(0x7f0000001ac0)={0xf0, 0x15, 0x1, 0x70bd2b, 0x25dfdbfb, {0x15, 0x3f}, [@INET_DIAG_REQ_BYTECODE={0x94, 0x1, "02a96d7b19c03dcdd7181783ef9da23bbb89e48e03c4e2f1c34bdf2e251e74ca0f791753839613d0395c5160e36890aa23b91188bfc0eddf4813c4241fd780c4169919fa9e6c9179bf63ecdad2784237e6b279581dce2c30b96b03793d743452ffc08fee56442f739e6d6f6216d331a0b1b3083425f1e95f0adfe3489c66dd4abb2aab159a9a00d634c56b4150651fb2"}, @INET_DIAG_REQ_BYTECODE={0x26, 0x1, "00530f88239b827af618b3faff6156fa3e65a7d49c9397bafe816a89201dc3ce0ddc"}, @INET_DIAG_REQ_BYTECODE={0x20, 0x1, "800aebd9d848a17e6c324d0e02ff35e18dd1e61cd0dacb0023d10331"}]}, 0xf0}, 0x1, 0x0, 0x0, 0x800}, 0x40000) pipe2$9p(&(0x7f0000001c40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) fsetxattr$security_capability(r4, &(0x7f0000001c80)='security.capability\x00', &(0x7f0000001cc0)=@v2={0x2000000, [{0x7fffffff, 0x8}, {0x4, 0xff}]}, 0x14, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001d00)='/dev/vcs\x00', 0x8e000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000001d40)) openat$vsock(0xffffffffffffff9c, &(0x7f0000001d80)='/dev/vsock\x00', 0x170881, 0x0) r6 = syz_open_dev$audion(&(0x7f0000001dc0)='/dev/audio#\x00', 0x80000001, 0x102) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000001e40)='batadv\x00') sendmsg$BATADV_CMD_SET_VLAN(r6, &(0x7f0000001f00)={&(0x7f0000001e00)={0x10, 0x0, 0x0, 0xc1008000}, 0xc, &(0x7f0000001ec0)={&(0x7f0000001e80)={0x24, r7, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0xa0}, 0x800) [ 221.315145][ T7046] chnl_net:caif_netlink_parms(): no params data found [ 221.504294][ T7046] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.516664][ T7166] IPVS: ftp: loaded support on port[0] = 21 [ 221.524628][ T7046] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.534105][ T7046] device bridge_slave_0 entered promiscuous mode [ 221.544636][ T7046] bridge0: port 2(bridge_slave_1) entered blocking state 01:35:14 executing program 2: r0 = socket(0x5, 0x40e, 0x9) fsetxattr(r0, &(0x7f0000000000)=@random={'os2.', 'trusted\x00'}, &(0x7f0000000040)='^$\x00', 0x3, 0x1) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000000c0), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x3) syz_genetlink_get_family_id$smc(&(0x7f0000000100)='SMC_PNETID\x00') writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000140)="9592ee51bae35adcd417afa99b7bdc637d162d2e7c6fe4eb69a9704531ed5c98efb9e41672b20b47e12ee9078e36e3564a029001d65816e0cb8683ea6b304d7dfcf298494c", 0x45}], 0x1) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000240)={0x80000000, 0x5, 0x4, 0x2, 0x6, {r2, r3/1000+30000}, {0x5, 0x0, 0x2, 0x3f, 0x0, 0x2, "834dd6c3"}, 0x7f, 0x1, @userptr=0x7ff, 0x1ee, 0x0, 0xffffffffffffffff}) accept4$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0}, &(0x7f0000000540)=0x14, 0x0) r6 = fcntl$getown(r1, 0x9) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f00000005c0)={0x9d0000, 0x7, 0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000580)={0x0, 0x0, [], @value64=0x3ff}}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r4, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x38, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x2}}, @NL80211_ATTR_PID={0x8, 0x52, r6}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r7}]}, 0x38}, 0x1, 0x0, 0x0, 0x20048800}, 0x80) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000700)={0x172, 0x1, 0x4, 0x1000000, 0xfff, {}, {0x1, 0xc, 0xff, 0x3f, 0x3, 0x6, '\x00?n&'}, 0x80, 0x1, @planes=&(0x7f00000006c0)={0x2, 0x6, @userptr=0x3, 0x9}, 0x8, 0x0, 0xffffffffffffffff}) sendmsg$FOU_CMD_ADD(r8, &(0x7f0000000840)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x28, 0x0, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @empty}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x20000000) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0x80c41, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x4010, r9, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f00000008c0)={0xc7, 0x3, 0x4, 0x0, 0xfff, {0x0, 0x2710}, {0x3, 0x2, 0xff, 0x4, 0x3, 0x1, "c50c5322"}, 0x1, 0x1, @offset=0x60f, 0x9f2f, 0x0, 0xffffffffffffffff}) sendmmsg$sock(r10, &(0x7f0000001340)=[{{&(0x7f0000000940)=@nfc={0x27, 0x0, 0x2, 0x2}, 0x80, &(0x7f0000000d40)=[{&(0x7f00000009c0)="8bb4ac863fef6264af0944e156b2456ddefd8644faf729465d470945c9dbd5d973f9acd68212aaedf7f51d051d9da3559e1a8d96ba072a21cd8dc613c98b53bbd9ce4331e18d91f422eb4856116153b1f0992be984dfc3d233d722cb3b07e4bc74e3cf96ce05fd6511615ce66a87695aab6711dda6efa5b277dec27adb84f3114c93fe08ebe3b440a8fde442c6aa158b25ad5167935772711a33943a9ef9a3607b53e0037d5bd57c0dae855e0d31aa2a66194330bbd3cb8626d783a2761c8f3afb7ff2fc9fe487e484b1852edca1b6993e72e954d38326", 0xd7}, {&(0x7f0000000ac0)="ae89a7f3f1f8cc2525cabeb90b121ef3ab4c2fe5170002dcc0c41c93512791cc3e5fe09bb9573966b7bb998cc987ead25a404ee0b2e89a0706f8cbfb9f4e70b163fd5106b9813dd764a3754b27c056f77d48db79c50acaa4d89ff95bc85587f8358b2bbc9c4ecdb781dc1f767b34514e17bb05f145ac8478cee38f18d8b4da8cc3cdb5ebad8e35b1454c4f291f2c", 0x8e}, {&(0x7f0000000b80)="715d73dedd976db0d51ff6dbb06cf163e46ea882dbb14934467e970c050f32546027223713b8297d", 0x28}, {&(0x7f0000000bc0)="2c23f3828b12002c923988a98ec236ad4cecf95a4cbbd209d462523d6b9c709dfbdcb4c4924c2740ae8014ff9fde776ef4611061a2a6ac262ff7d1079f476dcf329eb25ad0ee2de7b81c92d980e73cfa7869481998aa07f8a305e62eb5638dce1b89b0b3b02367c8f5782d3b8e8f29df58ad8551c4a039e9b998e5048ef58f324fd2daf541216f90dc1bf45f145a1b69ce30070338a822f2033db90068150dbfec0d9c22082f612c581e2aa56d8a812dd70d773dbd0efee6e5c0df276956e33684c9cff191de5c2cc9d06130fe0dd2f27d88bd1f6e1980fa598b8cbcf63f44786f7d737554f24c324d51d6444333e7c9e4d3a68af78181", 0xf7}, {&(0x7f0000000cc0)="f63ee0ee4da8b9da92d5451deb7bde11e2fb5b5f6e66eb4e0e3cd89d7353de83d3", 0x21}, {&(0x7f0000000d00)="a2f98080c31b2688c2b7c5494622d439a16d", 0x12}], 0x6, &(0x7f0000000dc0)=[@mark={{0x14, 0x1, 0x24, 0xf75}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffffffffff69}}], 0x30}}, {{&(0x7f0000000e00)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e24, @multicast1}}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000e80)="41143eae6b939ddd5437a3aa591e58c73133bf624b29373611be5412f35b92706c4a63f4667e8408f33abcc923b417d7002eda1616d3845f231dc225291b8ddeb4e7de4138e7bfb58ddf9c13eacf62dfcb26ce18d20a00476e3714782c5bfaeb6a891dd35569d9b69d9ea9b83e1f2697e202e3acbe6f9b2931dfbe0f1563d86829c9097241ed39211cc020397c9763f15f6b8b6b38c574f0bd306b123d17f6aee33d8eaf1e6bccdc15233e1e60cad8781bff65c9dd0a28aa914b0f3127628ab0dfea77461bc5dbd1098d8921e213341900e23bc125eb8fec8d83fca1945db7f6f8f330", 0xe3}, {&(0x7f0000000f80)="fea1f419a5576d4ca31b6c5bdeda21309d943403a062b3f0a508b0e5815745045c27a99dc32c7cfb8758a577c18b9b65eeea982741770cac5cc463a2d0ba3fffedc98239fe0292085b324ee3b8575677df26aea061ecc0f5bcb71f6efd0cb5c92e554e51057b42bcf40ec5f0e256aa", 0x6f}, {&(0x7f0000001000)="5f94d83f19d1fe174258f5eaa182bdb16ad60009f05997897b93687580daba9e56d78863502323b58d7235327f9864dd4ba06f9b2a09c3ecc34433d7a248f172c93eb223773697cb066d2b7779d5e87d1f1e5cc43068bd", 0x57}, {&(0x7f0000001080)="6b66bc96a989ea140924de40f142cffe36e992adfbb989ee78d802899388bdb2dcf4ced8e549eb8a88e2ad6fcf2b58445bab3e9860e3dedab649f26ba1fb2adfbc1451c5faf523762aa278638b830aba0497b4b406e3b1207e7f7495ec00671f4b6da65440", 0x65}, {&(0x7f0000001100)="f1a1af50af1a6b4770410b5e8114725bdf06c152ce30fe050fd3c77d0f", 0x1d}, {&(0x7f0000001140)="ca995b792e38781c00dac2964abba4d94099674bc6cc414a900ee75060cbece89478590c9f3522039f4de9485e558f033e315e7198304a01bb4013d9b8cf6fbfe8f46483ca03d3de87cff405e2add913a0ac1768fa24e3", 0x57}, {&(0x7f00000011c0)="0604f887fb0dc699b7b7e877d4a1856bbe62fd7f5165529cf3d91562f2d486fd81791d57b5349788202b5327ec5638c0cf964c462893cc484405d7d444b2abf5582ed72d9947fd8e3bdaf1bc", 0x4c}, {&(0x7f0000001240)="1de208f901090bc4057910602f96e4b09370b3891e1349ecf461e91a8539b98fdb801da1", 0x24}], 0x8, &(0x7f0000001300)=[@mark={{0x14, 0x1, 0x24, 0xeb}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x30}}], 0x2, 0x20040000) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000001400)={0x7, 0x101, 0x200}) [ 221.551800][ T7046] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.560436][ T7046] device bridge_slave_1 entered promiscuous mode [ 221.594495][ T7046] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 221.624007][ T7046] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 221.703048][ T7046] team0: Port device team_slave_0 added [ 221.730816][ T7046] team0: Port device team_slave_1 added [ 221.802245][ T7046] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 221.811597][ T7046] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 221.839210][ T7046] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 01:35:14 executing program 3: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000040)={{0x2, @name="779d9e75387a3db3ad64b8b0d055df815a6eebd76a6500c7bf678b12141a1584"}, "125586319a2e6788ed112b368a2c86dca9a69173004e519b60515a87f4c7e2b7"}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000004, 0x40010, r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x400, 0x0) write$UHID_SET_REPORT_REPLY(r2, &(0x7f00000001c0)={0xe, {0xa, 0x7, 0x40, 0xb2, "d29625960598e0d5a14cfd71c79fcf559c2b7f2d3643cbd2ed7cda5a7a5bcec9b8ef21f39ecfb004b4a3147fbc2df1aad2cf9ae760d9cc963dba7b306e3de1359417bb0577f372f942a9a1d5203cccb9b6d05ec3f0dc30b899cb316e7d38f0445a16a057913e7f608dd82072e60f20d046bd7d8a5a2028c75e5d6e568af1a7033e19d17b4b26a77c9a90ce9799fc438b8fa021228e12faa48711606f0db573660eb7fb8cd4c768c2d8c0efbb080c28c70300"}}, 0xbe) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000540)={0x7, 'geneve1\x00', {0x80000001}, 0x101}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000600)={0xa00000, 0x8, 0x6, 0xffffffffffffffff, 0x0, &(0x7f00000005c0)={0x9909cb, 0x8, [], @p_u32=&(0x7f0000000580)=0xffff}}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000640)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000680)=0x10) r5 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/nvme-fabrics\x00', 0x80002, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r5, 0x81785501, &(0x7f0000000700)=""/111) syz_mount_image$cifs(&(0x7f0000000780)='cifs\x00', &(0x7f00000007c0)='./file0\x00', 0x80000001, 0x7, &(0x7f0000000cc0)=[{&(0x7f0000000800)="1837f73be887e5b3c65ab54d1d14f3632e874ada7ecc9315bdce7aea8157caac7e091ec9d0619ae329b4f9c059aeeb77a088e797712dda221c9c5981473ac820bc38eb97b2161148d1c52949325bb9ae23670ccebe3fc0f677ddc26bec0e6a2a582cde5c3fffcb6a885c578cc7b068bad6e011fb2cd55e24bad92135a01b5e22bedbfc43dde1426fc85360f82640611b5d0451b278adabedbf68df7c92ea884012d59469ed9df59c7e655a1c1e4527d03221ca461a2b5cf684b5f3", 0xbb, 0x55}, {&(0x7f00000008c0)="e4c135ca49d29e23b8bde160bb866fe24051a13864d01e70bc06d22b841195ad492bf8b37a84deeed8ae0baa17cac77815117963b1a5928a0bd7e8dff1b5336633e2e3defd521f2e2d609c6982f251c04f228b66027a0d87e443aaf8fb0f5dec277c3e5bb58c241715008401f04adb0b46aabc153ff77eb1b07ba28947518c9b3b86ac964f0e462b51e22128fa88cf29522d468085b2fabe61ee6030a196614e785f14e0324396793c4ad15b0789e57728706d49a378a1b1a368", 0xba, 0xa7}, {&(0x7f0000000980)="4534dbaa67f31ea6b943e7a35ba14b38cd6070579e11f8bbad420580ec42464545ea03f36e1cb40d16530d7a1b7b4e0c0251f1cb69d319d1fb989be4a30609e66403ac7cf7acf27d", 0x48, 0x6}, {&(0x7f0000000a00)="660ba7340266e734a5ae38304b6e29766039c201e1ae8a11413d5aed37733b5a9748f3801e33455dced7ed2b49c56d83a91c2b26445ec89665792f3899a64a62cb64229916152dd6e2704c7d7eaf8d97d09867ca0bbc2155ba4fb93d3ddce138de544c0b912414132581e0f1f28144d0d3d563b20b6920b78c4f996fb903b5d2d406f4e555f5f1599d3a60f2c4b7b037e10dda3b0018d254518fb8eb71e01b0c75d1af", 0xa3, 0x2f}, {&(0x7f0000000ac0)="52b5d8c25497fd9c38fb608edfa883e0edb2ccad6f64e18d5df1a2bc3f62f12f7f5671b293", 0x25, 0x3}, {&(0x7f0000000b00)="a6df144ed43f2b023cbc22ac6fe07d87de65433169b91b47b9955fa97e93193cd4a7dcaa961179652ea13d25e21c120a153c07b24bdee806132f5f082d29a7485003b28ae3c41bd46320a1a27d749912525412ef57251130f616ae4e9d3d786d2e00f9b87164f0ca7a2dd21fd26d578cfd9cb011f27e67802c1437c1bcced30f379df7bb5fbf012ecf3569863ac8c3f3813e604fea8608d9ec58d82afa69d21fbd3d4ba8690793bd33847bf53d174009977e05cdd5ece599b1d258141483568ec3202cb2b213da3b9de3", 0xca, 0x3f}, {&(0x7f0000000c00)="16d8985c59672a5ed4c443185407e89a4030996094d7938e7b4ee877031826f9107c29387943bf7228b9aed4c3e539eac158d184b83219bc8d481b775bfb4776769d4c9e3fe36fffb925ab2b4fe2e6ee28a8912989905c0d005b22fb2136cdfd1d49695dc1aa627ce78dd63bb8c35823aa0dec2a21d3749fb6a63e2162f592093376260b61194d2395109928a629a5618d0bd3731d3348087ab770574a68", 0x9e, 0x6}], 0x2ac7054, &(0x7f0000000d80)='/dev/null\x00') syz_mount_image$vfat(&(0x7f0000000dc0)='vfat\x00', &(0x7f0000000e00)='./file0\x00', 0x4, 0x8, &(0x7f00000012c0)=[{&(0x7f0000000e40)="956dd78b3cda5fabbf5405aea682c7b69e731f4eb0fdd46b6f2a425a38ff109dab613faaaad405ad93a5e33a16cb0689dbf2b9d13aadb335f0f8d8573ed5e8d98cc17469336a3b469ae56ea00353b196b21332fc0d8038a5c81daa0872fe462bae79080865c50d54", 0x68}, {&(0x7f0000000ec0)="33e756b8581311931c2dd1f5b2239f470b41de81547e208ef846fcbbb0dbc9b9aeebd01616cd268cefd9d92f937a1bb588a2017f9ebe2a66fe5940a109c8420ae1de72a129471d3bf992758e20070b6cd7cb46261a2cb392f1870dd1ac2cf1457131efd5dd9c786ca3bd6b29897510bf65ef9001bc35fdebdc7663cfec547d70f9b107465d99820934b3becdd72c5a43cb83bdd457d7b6d02e7534d5adf6a2f163dafa5ea2066aac7e7e2cac92ab4333d8a81cdb", 0xb4}, {&(0x7f0000000f80)="fd5191d6f6ccfc6a626e7adf3d8be85c68d7bb552c567362fa93be9285dd3059cbf8147b2190439454329db8e53183b226773782587f6b9ef9cbaddfd84d", 0x3e, 0x3ff}, {&(0x7f0000000fc0)="c25343a6484df617a00297bd1588ca0b7fb211c03e7067e070ea49b90b39873bda3e152c12ae0a462f73bfc802c2c92b14088f5a8d99b5a888aef378b30676e0738537d1d7e7f44675b8fc040fb8807e2a11e10cb71df51f3ea1dd03edfa957f5d70afab89c1934ca908f2e2f9ef63bb9b4d9688fff5543094a6e24cce336a73dcba238fa99da183b48531e2e786a36fd812a776e6a69f454de77400d1bcd0d65730f28a1fbe4be6e68b1f15bd3dcfbf536835d08445fb95fc8c804a5fe7e4f15e3eaa2b4e0e6fbdcc41770f00a539f685a0c4d60c1687c0ad366e089782", 0xde, 0x9}, {&(0x7f00000010c0)="6b7c3b70216cf0c0e4b6fe1b20910cfd64a4858960ccfafe38f7f38beca9c9814b4877fba6ab37dc2fd5591e6dfe17acf6e09bfbdb1962c49e64bcc551edbe7473605fb9c7281fa2e5c649b0447280675849efb5cf77137a9875dc5d10150f923362d2539120f1bedfb5efe97ceafdde2ca39a60e581e6b843a0d6378325f3a0d34ac614f0c47c4af83c7400b2eecf3a81078f085ae3bc9ca8da33d1b11a", 0x9e, 0x2}, {&(0x7f0000001180)="20fd0156d66bf27a784ef6a7f7e224be4d74ecc8651611015ac4b2e03915d36eee7f6da98817fd", 0x27, 0x5a6}, {&(0x7f00000011c0)="5b2e6fbe943105ae3d280266be8601910a", 0x11, 0x1}, {&(0x7f0000001200)="172a84d28cb895f47ffa56413ce23946e041c9468e8562c84b630682edf11a5086cde1b1111d170ee124bfb15cbd26fbb97be2d1311b0c0f2ed7e114ce2b676ffe177386754d37822ea82c40bc8de8dd5538df3c04d2966f8f1a12c6b7580f7f4452a4b92ab1dca44132295b9ee2e12b6598dbfb152d07f96bf90414d628bef5e8dfecae468b5db21bb6be77432c23334ad443449df7a2966f834f1f894844636307b4bbb05eaacf", 0xa8, 0x7}], 0x64001, &(0x7f0000001380)={[{@shortname_mixed='shortname=mixed'}, {@uni_xlate='uni_xlate=1'}], [{@dont_hash='dont_hash'}, {@seclabel='seclabel'}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/vcsu\x00', 0x8000, 0x0) ioctl$TIOCSPTLCK(r6, 0x40045431, &(0x7f0000001400)) r7 = syz_genetlink_get_family_id$smc(&(0x7f0000001480)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r1, &(0x7f0000001580)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001540)={&(0x7f00000014c0)={0x50, r7, 0x8, 0x70bd28, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dummy0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) ioctl$VIDIOC_G_ENC_INDEX(0xffffffffffffffff, 0x8818564c, &(0x7f00000015c0)) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, &(0x7f0000001e00)={@null, @null, 0x2, 0x56}) [ 221.905855][ T7046] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 221.913334][ T7046] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 221.949624][ T7046] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 221.987191][ T7166] chnl_net:caif_netlink_parms(): no params data found [ 222.002421][ T7263] IPVS: ftp: loaded support on port[0] = 21 [ 222.099750][ T7046] device hsr_slave_0 entered promiscuous mode [ 222.173502][ T7046] device hsr_slave_1 entered promiscuous mode 01:35:15 executing program 4: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x17, 0xa4dc, 0x8, "b4de52e2ef711d339ce104458c77cd4e97774474922833d1e685a2e3e84196f4"}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10000, 0x18) bind$bt_l2cap(r0, &(0x7f0000000080)={0x1f, 0x8001, @none, 0x400, 0x2}, 0xe) msgctl$MSG_INFO(0xffffffffffffffff, 0xc, &(0x7f00000000c0)=""/4) msgget$private(0x0, 0x555) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x50880, 0x0) sendmsg$AUDIT_USER(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xc4, 0x3ed, 0x800, 0x70bd2c, 0x25dfdbff, "da6d7b8e0d5ae1019050af55d62381d2b6bf77bac543512e54172a8c18f50c9181d6bac7979de1c05955ae0bb7e9664867e6a106d9d4d3f3bcada48a0664687bb0646f704791ac93cf13d12223a304a71ca93f4353de469355f9bc5817ac39fc7ed4c8ff688337b2c8c11009f81390850973462e6cd9bb8418127dbbd563c5a093c142089b3d10a9ea3d7974b14f2b3d209f3a8450a2a2dff7de72c732c664ab2cf2971117944b279f7bd11d8fb3aca43de8e2", ["", ""]}, 0xc4}, 0x1, 0x0, 0x0, 0x40}, 0x200048c4) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$sock_rose_SIOCDELRT(r2, 0x890c, &(0x7f0000000340)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x6, @null, @bpq0='bpq0\x00', 0x3, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r3 = accept4$x25(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000400)=0x12, 0x0) ioctl$SIOCX25SENDCALLACCPT(r3, 0x89e9) r4 = semget$private(0x0, 0x2, 0x454) semctl$SEM_INFO(r4, 0x4, 0x13, &(0x7f0000000440)=""/61) ioctl$SIOCRSSCAUSE(0xffffffffffffffff, 0x89e1, &(0x7f0000000480)=0x101) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000004c0)=0x4) r6 = socket(0x3d, 0x1, 0x6f8a) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r6, &(0x7f0000000640)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x70, r7, 0x4, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1ff}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x10001}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffff7f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffff7f}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000}, 0x1) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) [ 222.345296][ T7317] IPVS: ftp: loaded support on port[0] = 21 01:35:15 executing program 5: bind$can_j1939(0xffffffffffffffff, &(0x7f0000000000)={0x1d, 0x0, 0x1, {0x3}}, 0x18) r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x104000) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{0xff, 0xff, 0x0, 0x81}, 'syz1\x00', 0x9}) ioctl$SNDCTL_DSP_SETTRIGGER(0xffffffffffffffff, 0x40045010, &(0x7f0000000100)=0x5) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.effective_mems\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x8) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000001c0)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x30000, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) accept4$inet6(r3, &(0x7f0000000240)={0xa, 0x0, 0x0, @local}, &(0x7f0000000280)=0x1c, 0x80000) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$TIOCCONS(r4, 0x541d) r5 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcsu\x00', 0x200000, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000340)=0xfffffffffffffff7) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsu\x00', 0x52340, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r6, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x48, 0x140d, 0x400, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x4004091}, 0x1) ioctl$SNDCTL_DSP_GETCAPS(r5, 0x8004500f, &(0x7f0000000500)) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580)='nl80211\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000006c0)=0xe8) sendmsg$NL80211_CMD_GET_MPATH(r2, &(0x7f0000000780)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x3c, r7, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0xfffffff9, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_MAC={0xa, 0x6, @random="3edabb5b95dd"}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40014}, 0x800) [ 222.579721][ T7358] IPVS: ftp: loaded support on port[0] = 21 [ 222.625635][ T7166] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.636197][ T7166] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.647604][ T7166] device bridge_slave_0 entered promiscuous mode [ 222.701618][ T7166] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.722776][ T7166] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.730607][ T7166] device bridge_slave_1 entered promiscuous mode [ 222.815370][ T7166] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 222.883880][ T7166] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 222.961070][ T7448] IPVS: ftp: loaded support on port[0] = 21 [ 223.028975][ T7166] team0: Port device team_slave_0 added [ 223.049744][ T7263] chnl_net:caif_netlink_parms(): no params data found [ 223.066738][ T7166] team0: Port device team_slave_1 added [ 223.074661][ T7317] chnl_net:caif_netlink_parms(): no params data found [ 223.127769][ T7046] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 223.180755][ T7046] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 223.230160][ T7046] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 223.317301][ T7166] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 223.324539][ T7166] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.350485][ T7166] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 223.362596][ T7046] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 223.434984][ T7166] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 223.441973][ T7166] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 223.469046][ T7166] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 223.650011][ T7317] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.658601][ T7317] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.667953][ T7317] device bridge_slave_0 entered promiscuous mode [ 223.706221][ T7166] device hsr_slave_0 entered promiscuous mode [ 223.742981][ T7166] device hsr_slave_1 entered promiscuous mode [ 223.802674][ T7166] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 223.810521][ T7166] Cannot create hsr debugfs directory [ 223.827001][ T7358] chnl_net:caif_netlink_parms(): no params data found [ 223.836959][ T7317] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.846973][ T7317] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.855686][ T7317] device bridge_slave_1 entered promiscuous mode [ 223.870890][ T7263] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.880687][ T7263] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.889264][ T7263] device bridge_slave_0 entered promiscuous mode [ 223.935397][ T7263] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.943556][ T7263] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.951324][ T7263] device bridge_slave_1 entered promiscuous mode [ 224.005552][ T7317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.018023][ T7317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.077459][ T7263] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.104617][ T7317] team0: Port device team_slave_0 added [ 224.146313][ T7263] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.183876][ T7317] team0: Port device team_slave_1 added [ 224.235139][ T7263] team0: Port device team_slave_0 added [ 224.266547][ T7358] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.274291][ T7358] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.282022][ T7358] device bridge_slave_0 entered promiscuous mode [ 224.293691][ T7263] team0: Port device team_slave_1 added [ 224.299527][ T7358] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.307689][ T7358] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.315980][ T7358] device bridge_slave_1 entered promiscuous mode [ 224.364038][ T7317] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 224.371028][ T7317] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 224.399145][ T7317] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 224.414537][ T7317] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 224.421519][ T7317] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 224.448809][ T7317] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 224.470094][ T7448] chnl_net:caif_netlink_parms(): no params data found [ 224.485371][ T7358] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.497469][ T7358] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.518851][ T7263] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 224.526117][ T7263] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 224.559098][ T7263] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 224.609859][ T7263] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 224.620576][ T7263] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 224.647458][ T7263] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 224.716143][ T7317] device hsr_slave_0 entered promiscuous mode [ 224.742707][ T7317] device hsr_slave_1 entered promiscuous mode [ 224.822383][ T7317] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 224.829954][ T7317] Cannot create hsr debugfs directory [ 224.863144][ T7358] team0: Port device team_slave_0 added [ 224.869015][ T7166] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 224.918860][ T7166] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 225.036114][ T7263] device hsr_slave_0 entered promiscuous mode [ 225.092798][ T7263] device hsr_slave_1 entered promiscuous mode [ 225.132328][ T7263] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 225.139903][ T7263] Cannot create hsr debugfs directory [ 225.151082][ T7358] team0: Port device team_slave_1 added [ 225.164889][ T7166] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 225.227251][ T7166] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 225.299569][ T7358] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 225.307283][ T7358] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.334484][ T7358] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 225.348449][ T7358] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 225.355917][ T7358] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 225.382336][ T7358] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 225.445731][ T7448] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.458332][ T7448] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.467200][ T7448] device bridge_slave_0 entered promiscuous mode [ 225.477421][ T7448] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.485814][ T7448] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.494292][ T7448] device bridge_slave_1 entered promiscuous mode [ 225.541186][ T7046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.596922][ T7358] device hsr_slave_0 entered promiscuous mode [ 225.642728][ T7358] device hsr_slave_1 entered promiscuous mode [ 225.672349][ T7358] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 225.679942][ T7358] Cannot create hsr debugfs directory [ 225.714134][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.723391][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.734367][ T7448] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.752653][ T7046] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.803564][ T7448] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 225.878326][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.895189][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.907057][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.914319][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.924789][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 225.970279][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.979435][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.989416][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.996612][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.013686][ T7448] team0: Port device team_slave_0 added [ 226.036256][ T7448] team0: Port device team_slave_1 added [ 226.078144][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.099463][ T7448] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 226.106693][ T7448] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.136031][ T7448] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 226.153153][ T7448] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 226.160141][ T7448] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 226.187743][ T7448] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 226.212417][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.221129][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.230599][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.239331][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.248402][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.257067][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 226.266119][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.276981][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 226.296764][ T7317] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 226.341197][ T7317] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 226.400297][ T7317] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 226.464482][ T7317] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 226.494644][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.505108][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.523105][ T7046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 226.576149][ T7448] device hsr_slave_0 entered promiscuous mode [ 226.622473][ T7448] device hsr_slave_1 entered promiscuous mode [ 226.662134][ T7448] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 226.669746][ T7448] Cannot create hsr debugfs directory [ 226.743405][ T7263] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 226.777517][ T7263] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 226.811221][ T7263] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 226.867666][ T7166] 8021q: adding VLAN 0 to HW filter on device bond0 [ 226.905445][ T7263] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 226.985495][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 226.994540][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.012114][ T7166] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.047596][ T7358] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 227.105305][ T7358] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 227.153903][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 227.161420][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 227.195373][ T7046] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 227.205075][ T7358] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 227.245840][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.255892][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.264479][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.271554][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.310230][ T7358] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 227.345953][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.354904][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.364728][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.373890][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.380974][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.420923][ T7317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.429346][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.438605][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.490979][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.500179][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.509428][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.520023][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.528103][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 227.542490][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 227.551234][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.560341][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 227.570346][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 227.605358][ T7317] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.622631][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 227.631142][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 227.647325][ T7166] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 227.663906][ T7166] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 227.721216][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 227.730064][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 227.742102][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.756499][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.765073][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.772217][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.780164][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.789355][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.798093][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.805256][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.813238][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.852397][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.860361][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.896743][ T7263] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.906805][ T7448] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 227.957114][ T7448] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 228.015800][ T7448] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 228.075050][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.084284][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.093282][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.102308][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.110676][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.119867][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.128720][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 228.137322][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 228.177720][ T7448] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 228.213959][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.225563][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 228.234684][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 228.246439][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 228.254227][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.262005][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.270301][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.293199][ T7263] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.304426][ T7317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.319126][ T7046] device veth0_vlan entered promiscuous mode [ 228.333520][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.341559][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.358613][ T7166] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 228.380528][ T7358] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.388072][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.397746][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.409472][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.416609][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.424866][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.471500][ T7046] device veth1_vlan entered promiscuous mode [ 228.487368][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 228.497086][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.506671][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.515925][ T2719] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.523045][ T2719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.543409][ T7358] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.574287][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 228.585587][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.594854][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.603680][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.612651][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.656888][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 228.667191][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 228.677999][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 228.686686][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 228.695638][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 228.703836][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.711310][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.720998][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.730057][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.737219][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.745534][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.754546][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.764053][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 228.772420][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 228.780136][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.788485][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.806550][ T7317] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 228.824094][ T7166] device veth0_vlan entered promiscuous mode [ 228.842949][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 228.853057][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 228.862270][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.870843][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.880213][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.887331][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.895548][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.904555][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.913403][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.922010][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.935531][ T7046] device veth0_macvtap entered promiscuous mode [ 228.966883][ T7263] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 228.980700][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.991078][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.003378][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.027438][ T7046] device veth1_macvtap entered promiscuous mode [ 229.036356][ T7166] device veth1_vlan entered promiscuous mode [ 229.055849][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.065153][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.074827][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.117918][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.126583][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.135990][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.147547][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.156624][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.178274][ T7046] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 229.194234][ T7046] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 229.206899][ T7358] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 229.220294][ T7358] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.230977][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.240003][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.248857][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 229.259067][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 229.268337][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 229.278315][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 229.287450][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 229.296671][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 229.374678][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 229.384094][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 229.394029][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.402052][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.419369][ T7166] device veth0_macvtap entered promiscuous mode [ 229.438010][ T7166] device veth1_macvtap entered promiscuous mode [ 229.449410][ T7263] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.525853][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 229.533801][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 229.542405][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 229.551224][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 229.560462][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 229.573476][ T7317] device veth0_vlan entered promiscuous mode [ 229.582618][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 229.590788][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.599670][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.779919][ T7448] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.800656][ T7317] device veth1_vlan entered promiscuous mode [ 229.823789][ T7358] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.849366][ T7166] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 01:35:22 executing program 0: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x700, 0x0) getdents64(r0, &(0x7f0000000340)=""/230, 0xe6) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0x2, &(0x7f0000001240)="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", 0x3f6) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1051}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[]}}, 0x4000884) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x40, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x40140921, &(0x7f0000001200)={0x0, 0x8, 0x3, 0x0}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x80000001, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000040)={0x18, 0x7, 0x2, {{0xb, '/proc/self\x00'}, 0x9}}, 0x18) [ 229.872385][ T7166] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 229.901996][ T7166] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 229.965286][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 229.975373][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 229.988258][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 230.000011][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 230.010458][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 230.020047][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 230.045124][ T7166] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 230.125986][ T7166] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 230.126599][ T8305] md: could not open unknown-block(8,3). [ 230.154587][ T8305] md: md_import_device returned -6 [ 230.159333][ T7166] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 230.179578][ T7448] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.219865][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 230.235002][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 230.245569][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 230.258363][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 01:35:23 executing program 0: r0 = open(&(0x7f00000002c0)='./file0\x00', 0x700, 0x0) getdents64(r0, &(0x7f0000000340)=""/230, 0xe6) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0x2, &(0x7f0000001240)="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", 0x3f6) gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1051}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[]}}, 0x4000884) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x40, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r2, 0x40140921, &(0x7f0000001200)={0x0, 0x8, 0x3, 0x0}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) splice(r3, 0x0, r4, 0x0, 0x80000001, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000040)={0x18, 0x7, 0x2, {{0xb, '/proc/self\x00'}, 0x9}}, 0x18) [ 230.320329][ T7263] device veth0_vlan entered promiscuous mode [ 230.364850][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 230.382788][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 230.397303][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 230.427629][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 230.459469][ T2719] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.466705][ T2719] bridge0: port 1(bridge_slave_0) entered forwarding state 01:35:23 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) [ 230.476564][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 230.485725][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 230.517434][ T7317] device veth0_macvtap entered promiscuous mode 01:35:23 executing program 0: r0 = epoll_create(0x2000000001fffffd) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x5421, &(0x7f0000000080)) [ 230.577119][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 230.587724][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 230.599100][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 230.611048][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 230.625991][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 230.645731][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 230.657845][ T2719] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.665019][ T2719] bridge0: port 2(bridge_slave_1) entered forwarding state 01:35:23 executing program 0: mknod(&(0x7f0000000140)='./bus\x00', 0x80008005, 0x5200) r0 = open$dir(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) poll(&(0x7f0000000180)=[{r0, 0x8216bab25f0ae83d}], 0x1, 0x0) [ 230.679276][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 230.692570][ T7263] device veth1_vlan entered promiscuous mode 01:35:23 executing program 0: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2902657f7f"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) [ 230.819089][ T7317] device veth1_macvtap entered promiscuous mode [ 230.838231][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 230.848979][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 01:35:23 executing program 0: shmget(0x1, 0x2000, 0x0, &(0x7f0000b5f000/0x2000)=nil) [ 230.864013][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 230.877107][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.888448][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.905833][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.918914][ T2719] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.051803][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 231.060770][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.088678][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 231.103461][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.122782][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 231.141986][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 01:35:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) eventfd(0x0) r4 = dup3(r3, r1, 0x0) ioctl$KVM_IRQFD(r4, 0x4020ae76, &(0x7f0000000080)) [ 231.154236][ T7448] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.178747][ T7317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 231.203719][ T7317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.219035][ T7317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 231.233270][ T8350] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 231.249789][ T7317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.264609][ T7317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 231.320087][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 231.330585][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 231.348667][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 231.369392][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 231.420984][ T7317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 231.448144][ T7317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.464453][ T7317] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 231.478517][ T7317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.498352][ T7317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 231.528688][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 231.539554][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 231.556442][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 231.567573][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 231.582277][ T7263] device veth0_macvtap entered promiscuous mode [ 231.599469][ T7358] device veth0_vlan entered promiscuous mode [ 231.638202][ T7448] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.658255][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 231.669475][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 231.693422][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 231.712626][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 231.720378][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 231.740989][ T7263] device veth1_macvtap entered promiscuous mode [ 231.770480][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 231.784396][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 231.802955][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 231.870350][ T7358] device veth1_vlan entered promiscuous mode [ 231.950797][ T7263] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 231.964639][ T7263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 231.976667][ T7263] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 231.988046][ T7263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.000163][ T7263] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 232.010770][ T7263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.023760][ T7263] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 232.035886][ T7263] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 232.046463][ T7263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.056778][ T7263] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 232.067351][ T7263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.077792][ T7263] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 232.088364][ T7263] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.099670][ T7263] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 232.160946][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 232.169434][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 232.191724][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 232.200390][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 232.209831][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 232.221426][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 232.260849][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 232.278789][ T2715] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 232.372042][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 232.380874][ T46] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 232.396700][ T7358] device veth0_macvtap entered promiscuous mode [ 232.526713][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 232.546536][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 232.566644][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 232.582339][ T7358] device veth1_macvtap entered promiscuous mode [ 232.589783][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 232.604644][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 232.616940][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.643107][ T7448] device veth0_vlan entered promiscuous mode [ 232.678216][ T7358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 01:35:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x0) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socket(0x0, 0x0, 0x0) io_setup(0x441, &(0x7f00000002c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 01:35:25 executing program 0: munmap(&(0x7f0000001000/0x2000)=nil, 0x2000) r0 = shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil) shmat(r0, &(0x7f0000001000/0x2000)=nil, 0x0) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) mlock(&(0x7f0000000000/0x4000)=nil, 0x4000) [ 232.701498][ T7358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.719058][ T7358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 232.744460][ T7358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.763564][ T7358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 232.847829][ T27] audit: type=1804 audit(1585272925.647:9): pid=8399 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir981398104/syzkaller.afkX5P/1/bus" dev="sda1" ino=15759 res=1 [ 232.850994][ T7358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.913223][ T7358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 232.951001][ T7358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 232.983322][ T7358] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 232.997946][ T7448] device veth1_vlan entered promiscuous mode [ 234.918086][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 234.933214][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 234.946327][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 234.968611][ T7358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 235.011695][ T7358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.045471][ T7358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 235.062378][ T7358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.079223][ T7358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 235.097007][ T7358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.107851][ T7358] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 235.127558][ T7358] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.157256][ T7358] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 235.183492][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 235.205816][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 235.290383][ T8276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 235.309857][ T8276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 235.389698][ T7448] device veth0_macvtap entered promiscuous mode [ 235.485350][ T7448] device veth1_macvtap entered promiscuous mode [ 235.562629][ T7448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 01:35:28 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000280)) sched_setaffinity(0x0, 0xfffffffffffffff5, &(0x7f0000000000)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x4}, [{}, {0x2, 0x1, r0}], {0x4, 0x2}, [{}], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) chdir(&(0x7f0000000100)='./file0\x00') lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getgroups(0x2, &(0x7f0000000540)=[0x0, 0x0]) [ 235.610900][ T7448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.640610][ T7448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 235.666403][ T7448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.698962][ T7448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 235.730602][ T7448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.740455][ T7448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 235.810558][ T7448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.830912][ T7448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 235.850531][ T7448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 235.875280][ T7448] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 235.923345][ T8276] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 235.933002][ T8276] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 235.943893][ T8276] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 235.953696][ T8276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 235.971057][ C0] hrtimer: interrupt took 27772 ns [ 235.985602][ T7448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.007419][ T7448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.026189][ T7448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.038460][ T7448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.081098][ T7448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.116205][ T7448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.126459][ T7448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.145219][ T7448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.163574][ T7448] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 236.177717][ T7448] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 236.195759][ T7448] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 236.206883][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 236.228129][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 01:35:29 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x12) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 01:35:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_IRQFD(r1, 0xc018aec0, &(0x7f0000000000)) 01:35:29 executing program 3: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c000000090000000200000001000005030000000b0000000100000002000000070000000000000201000000080000000000000905000000060000000000000e03000000000000000c000000000000070000000000000000000000000044f9c1c6250a870dbaab3ca6956bd412bb2a9e317a369e739d5fabf4"], &(0x7f0000000000)=""/249, 0x6d, 0xf9, 0x8}, 0x20) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syncfs(r0) 01:35:29 executing program 1: set_mempolicy(0x4003, &(0x7f0000000140)=0x101, 0x2) modify_ldt$write(0x1, &(0x7f0000000000), 0x10) clone3(&(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x50) 01:35:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 01:35:29 executing program 2: set_mempolicy(0x4003, &(0x7f0000000140)=0x101, 0x2) modify_ldt$write(0x1, &(0x7f0000000000), 0x10) [ 236.735652][ T8429] BPF:[1] UNION [ 236.751017][ T8429] BPF:size=3 vlen=1 [ 236.763120][ T8429] BPF: [ 236.773570][ T8429] BPF:Invalid name 01:35:29 executing program 3: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c000000090000000200000001000005030000000b0000000100000002000000070000000000000201000000080000000000000905000000060000000000000e03000000000000000c000000000000070000000000000000000000000044f9c1c6250a870dbaab3ca6956bd412bb2a9e317a369e739d5fabf4"], &(0x7f0000000000)=""/249, 0x6d, 0xf9, 0x8}, 0x20) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syncfs(r0) [ 236.793932][ T8429] BPF: [ 236.793932][ T8429] [ 236.801281][ T8430] BPF:[1] UNION [ 236.805141][ T8430] BPF:size=3 vlen=1 [ 236.813791][ T8430] BPF: 01:35:29 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 236.845027][ T8430] BPF:Invalid name [ 236.861722][ T8430] BPF: [ 236.861722][ T8430] 01:35:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000015000/0x3000)=nil}) 01:35:29 executing program 5: r0 = openat$ipvs(0xffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r1 = socket$phonet(0x23, 0x2, 0x1) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) [ 236.949633][ T8449] BPF:[1] UNION [ 236.960889][ T8449] BPF:size=3 vlen=1 [ 236.978101][ T8449] BPF: [ 236.994123][ T8449] BPF:Invalid name 01:35:29 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000001c0)={0x10010005, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3000000}) 01:35:29 executing program 3: [ 237.008368][ T8449] BPF: [ 237.008368][ T8449] 01:35:29 executing program 2: 01:35:29 executing program 0: 01:35:29 executing program 4: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB='/dev/nbd8'], &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='jfs\x00', 0x0, 0x0) 01:35:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(0xffffffffffffffff, r0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='syscall\x00') sendfile(r3, r4, 0x0, 0x800000bf) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0x8, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_TYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x804) sendfile(r1, r2, 0x0, 0x20000102000007) 01:35:30 executing program 5: r0 = openat$ipvs(0xffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r1 = socket$phonet(0x23, 0x2, 0x1) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) dup2(r0, r1) 01:35:30 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$BLKIOOPT(r0, 0x401070cd, 0x0) 01:35:30 executing program 0: [ 237.281778][ T2628] block nbd8: Attempted send on invalid socket [ 237.288904][ T2628] blk_update_request: I/O error, dev nbd8, sector 64 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 237.315648][ T2628] block nbd8: Attempted send on invalid socket [ 237.321978][ T2628] blk_update_request: I/O error, dev nbd8, sector 120 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 01:35:30 executing program 0: 01:35:30 executing program 4: 01:35:30 executing program 2: 01:35:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(0xffffffffffffffff, r0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='syscall\x00') sendfile(r3, r4, 0x0, 0x800000bf) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0x8, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_TYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x804) sendfile(r1, r2, 0x0, 0x20000102000007) 01:35:30 executing program 5: 01:35:30 executing program 2: 01:35:30 executing program 4: 01:35:30 executing program 0: 01:35:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(0xffffffffffffffff, r0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='syscall\x00') sendfile(r3, r4, 0x0, 0x800000bf) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0x8, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_TYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x804) sendfile(r1, r2, 0x0, 0x20000102000007) 01:35:30 executing program 0: 01:35:30 executing program 5: 01:35:30 executing program 4: 01:35:30 executing program 2: 01:35:30 executing program 5: 01:35:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(0xffffffffffffffff, r0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='syscall\x00') sendfile(r3, r4, 0x0, 0x800000bf) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0x8, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_TYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x804) sendfile(r1, r2, 0x0, 0x20000102000007) 01:35:30 executing program 0: 01:35:30 executing program 5: 01:35:31 executing program 4: 01:35:31 executing program 2: 01:35:31 executing program 0: 01:35:31 executing program 3: 01:35:31 executing program 5: 01:35:31 executing program 4: 01:35:31 executing program 2: 01:35:31 executing program 0: 01:35:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(0xffffffffffffffff, r0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='syscall\x00') sendfile(r3, r4, 0x0, 0x800000bf) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0x8, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_TYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x804) sendfile(r1, r2, 0x0, 0x20000102000007) 01:35:31 executing program 5: 01:35:31 executing program 3: 01:35:31 executing program 0: 01:35:31 executing program 4: 01:35:31 executing program 2: 01:35:31 executing program 5: 01:35:31 executing program 3: 01:35:31 executing program 0: 01:35:31 executing program 4: 01:35:31 executing program 5: 01:35:31 executing program 3: 01:35:32 executing program 1: 01:35:32 executing program 2: 01:35:32 executing program 4: 01:35:32 executing program 0: 01:35:32 executing program 5: 01:35:32 executing program 3: 01:35:32 executing program 2: 01:35:32 executing program 5: 01:35:32 executing program 3: 01:35:32 executing program 0: 01:35:32 executing program 4: 01:35:32 executing program 1: 01:35:32 executing program 5: 01:35:32 executing program 3: 01:35:32 executing program 2: 01:35:32 executing program 0: 01:35:32 executing program 4: 01:35:32 executing program 1: 01:35:32 executing program 3: 01:35:32 executing program 2: 01:35:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = inotify_init1(0x0) readv(r1, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000000)=""/162, 0xa2}], 0x2) 01:35:32 executing program 0: 01:35:32 executing program 1: 01:35:32 executing program 4: 01:35:32 executing program 2: 01:35:32 executing program 3: 01:35:32 executing program 0: 01:35:32 executing program 4: 01:35:32 executing program 2: 01:35:32 executing program 1: 01:35:32 executing program 3: 01:35:32 executing program 0: 01:35:33 executing program 5: 01:35:33 executing program 4: 01:35:33 executing program 2: 01:35:33 executing program 1: 01:35:33 executing program 3: 01:35:33 executing program 0: 01:35:33 executing program 3: 01:35:33 executing program 0: 01:35:33 executing program 4: 01:35:33 executing program 2: 01:35:33 executing program 1: 01:35:33 executing program 5: 01:35:33 executing program 2: 01:35:33 executing program 4: 01:35:33 executing program 0: 01:35:33 executing program 1: 01:35:33 executing program 3: 01:35:33 executing program 5: 01:35:33 executing program 2: 01:35:33 executing program 1: 01:35:33 executing program 3: 01:35:33 executing program 0: 01:35:33 executing program 4: 01:35:33 executing program 5: 01:35:33 executing program 1: 01:35:34 executing program 3: 01:35:34 executing program 4: 01:35:34 executing program 0: 01:35:34 executing program 2: 01:35:34 executing program 3: 01:35:34 executing program 5: 01:35:34 executing program 1: 01:35:34 executing program 2: 01:35:34 executing program 4: 01:35:34 executing program 3: 01:35:34 executing program 0: 01:35:34 executing program 5: 01:35:34 executing program 2: 01:35:34 executing program 1: 01:35:34 executing program 4: 01:35:34 executing program 3: 01:35:34 executing program 0: 01:35:34 executing program 5: 01:35:34 executing program 4: 01:35:34 executing program 2: 01:35:34 executing program 1: 01:35:34 executing program 3: 01:35:34 executing program 0: 01:35:34 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0xfffffe58) fallocate(r0, 0x3, 0x0, 0x8000) fallocate(r0, 0x0, 0x0, 0xfff9) 01:35:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000008105000000000000060000"], &(0x7f0000000340)=""/142, 0x2a, 0x8e, 0x8}, 0x20) 01:35:34 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000000)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 01:35:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2002}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x2) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000540)='ceph\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/102, 0x66) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3ff) lseek(r0, 0x6, 0x1) getdents64(r0, &(0x7f0000000280)=""/53, 0x35) syz_open_dev$tty1(0xc, 0x4, 0x1) uname(&(0x7f00000002c0)=""/193) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') socket(0x1f, 0xa, 0x3) pipe(0x0) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, 0x0, 0x40000000) 01:35:34 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2600cff9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x2, 0x4) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendto$inet(r0, &(0x7f0000000000)="e9", 0x1, 0x0, 0x0, 0x0) 01:35:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c08, 0x0) [ 241.910256][ T8656] BPF:[1] INT (anon) [ 241.946267][ T27] audit: type=1400 audit(1585272934.738:10): avc: denied { sys_admin } for pid=8655 comm="syz-executor.4" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 241.946885][ T8656] BPF:size=5 bits_offset=0 nr_bits=0 encoding=UNKN 01:35:34 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2600cff9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x2, 0x4) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendto$inet(r0, &(0x7f0000000000)="e9", 0x1, 0x0, 0x0, 0x0) [ 242.036554][ T8657] IPVS: ftp: loaded support on port[0] = 21 01:35:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) [ 242.127933][ T8656] BPF: [ 242.145259][ T8656] BPF:Invalid btf_info kind_flag [ 242.175214][ T8656] BPF: [ 242.175214][ T8656] 01:35:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000008105000000000000060000"], &(0x7f0000000340)=""/142, 0x2a, 0x8e, 0x8}, 0x20) [ 242.244590][ T8688] EXT4-fs (loop0): quotafile must be on filesystem root 01:35:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000100)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000000)={[{@fat=@check_strict='check=strict'}]}) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:f']) 01:35:35 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2600cff9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x2, 0x4) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendto$inet(r0, &(0x7f0000000000)="e9", 0x1, 0x0, 0x0, 0x0) [ 242.342630][ T8688] EXT4-fs (loop0): quotafile must be on filesystem root 01:35:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) [ 242.441396][ T8708] BPF:[1] INT (anon) [ 242.453953][ T8668] IPVS: ftp: loaded support on port[0] = 21 [ 242.462304][ T8708] BPF:size=5 bits_offset=0 nr_bits=0 encoding=UNKN [ 242.494174][ T8708] BPF: [ 242.507082][ T8708] BPF:Invalid btf_info kind_flag [ 242.559620][ T8708] BPF: [ 242.559620][ T8708] [ 242.576330][ T183] tipc: TX() has been purged, node left! [ 242.613007][ T8717] EXT4-fs (loop0): quotafile must be on filesystem root 01:35:35 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2600cff9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x2, 0x4) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendto$inet(r0, &(0x7f0000000000)="e9", 0x1, 0x0, 0x0, 0x0) 01:35:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000008105000000000000060000"], &(0x7f0000000340)=""/142, 0x2a, 0x8e, 0x8}, 0x20) 01:35:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) [ 242.884066][ T8742] BPF:[1] INT (anon) [ 242.905588][ T8742] BPF:size=5 bits_offset=0 nr_bits=0 encoding=UNKN [ 242.928830][ T8742] BPF: [ 242.973108][ T8742] BPF:Invalid btf_info kind_flag [ 242.988115][ T8742] BPF: [ 242.988115][ T8742] [ 243.012332][ T8749] EXT4-fs (loop0): quotafile must be on filesystem root 01:35:38 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2600cff9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x2, 0x4) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 01:35:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x3fe) 01:35:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x0) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0xffc00000, 0x1, &(0x7f0000000100)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000000)={[{@fat=@check_strict='check=strict'}]}) mount$overlay(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:f']) 01:35:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000008105000000000000060000"], &(0x7f0000000340)=""/142, 0x2a, 0x8e, 0x8}, 0x20) 01:35:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 01:35:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2002}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x2) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000540)='ceph\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/102, 0x66) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3ff) lseek(r0, 0x6, 0x1) getdents64(r0, &(0x7f0000000280)=""/53, 0x35) syz_open_dev$tty1(0xc, 0x4, 0x1) uname(&(0x7f00000002c0)=""/193) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') socket(0x1f, 0xa, 0x3) pipe(0x0) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, 0x0, 0x40000000) [ 245.813845][ T8783] BPF:[1] INT (anon) [ 245.822673][ T8783] BPF:size=5 bits_offset=0 nr_bits=0 encoding=UNKN [ 245.843376][ T8783] BPF: [ 245.848605][ T8783] BPF:Invalid btf_info kind_flag [ 245.863485][ T8786] EXT4-fs (loop0): quotafile must be on filesystem root [ 245.885394][ T8783] BPF: [ 245.885394][ T8783] 01:35:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x3fe) 01:35:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000008105000000000000060000"], &(0x7f0000000340)=""/142, 0x2a, 0x8e, 0x8}, 0x20) 01:35:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2002}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x2) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000540)='ceph\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/102, 0x66) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3ff) lseek(r0, 0x6, 0x1) getdents64(r0, &(0x7f0000000280)=""/53, 0x35) syz_open_dev$tty1(0xc, 0x4, 0x1) uname(&(0x7f00000002c0)=""/193) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') socket(0x1f, 0xa, 0x3) pipe(0x0) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, 0x0, 0x40000000) 01:35:38 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) [ 246.092834][ T8793] IPVS: ftp: loaded support on port[0] = 21 01:35:38 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) [ 246.136068][ T8800] BPF:[1] INT (anon) [ 246.140254][ T8800] BPF:size=5 bits_offset=0 nr_bits=0 encoding=UNKN [ 246.158146][ T8800] BPF: [ 246.167648][ T8800] BPF:Invalid btf_info kind_flag [ 246.184111][ T8800] BPF: [ 246.184111][ T8800] 01:35:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000008105000000000000060000"], &(0x7f0000000340)=""/142, 0x2a, 0x8e, 0x8}, 0x20) [ 246.246765][ T8802] IPVS: ftp: loaded support on port[0] = 21 [ 246.472949][ T8841] BPF:[1] INT (anon) [ 246.506201][ T8841] BPF:size=5 bits_offset=0 nr_bits=0 encoding=UNKN [ 246.541111][ T8841] BPF: [ 246.556133][ T8841] BPF:Invalid btf_info kind_flag [ 246.579634][ T8841] BPF: [ 246.579634][ T8841] 01:35:39 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2600cff9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x2, 0x4) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 01:35:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 01:35:39 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) dup2(r3, r0) 01:35:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2002}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x2) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000540)='ceph\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/102, 0x66) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3ff) lseek(r0, 0x6, 0x1) getdents64(r0, &(0x7f0000000280)=""/53, 0x35) syz_open_dev$tty1(0xc, 0x4, 0x1) uname(&(0x7f00000002c0)=""/193) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') socket(0x1f, 0xa, 0x3) pipe(0x0) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, 0x0, 0x40000000) 01:35:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r0, r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000008105000000000000060000"], &(0x7f0000000340)=""/142, 0x2a, 0x8e, 0x8}, 0x20) 01:35:39 executing program 4: syz_mount_image$tmpfs(&(0x7f00000001c0)='tmpfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6d706f6c3d7072656665723d72656c61742bafa19417c9653a"]) [ 246.777711][ T8868] BPF:[1] INT (anon) [ 246.792116][ T8866] tmpfs: Bad value for 'mpol' [ 246.799345][ T8868] BPF:size=5 bits_offset=0 nr_bits=0 encoding=UNKN [ 246.805889][ T8868] BPF: [ 246.808660][ T8868] BPF:Invalid btf_info kind_flag [ 246.862913][ T8866] tmpfs: Bad value for 'mpol' [ 246.883995][ T8868] BPF: [ 246.883995][ T8868] [ 246.890587][ T8879] IPVS: ftp: loaded support on port[0] = 21 01:35:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x2) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000540)='keyring\x00', 0x0, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) uname(&(0x7f00000002c0)=""/193) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FITRIM(0xffffffffffffffff, 0x40047211, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="4c020000", @ANYRES16=r0, @ANYBLOB="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"], 0x24c}, 0x1, 0x0, 0x0, 0x20008040}, 0x40090) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000040)={{{@in=@local, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, 0x0}, 0x40000000) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000180)={0x2, 0x2, 0x1}) 01:35:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x2) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000540)='ceph\x00', 0x0, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) uname(&(0x7f00000002c0)=""/193) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') socket(0x0, 0x80002, 0x0) pipe(0x0) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, 0x0}, 0x40000000) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000180)={0x2, 0x2, 0x1}) 01:35:39 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 01:35:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000008105000000000000060000"], &(0x7f0000000340)=""/142, 0x2a, 0x8e, 0x8}, 0x20) [ 247.162507][ T8918] BPF:[1] INT (anon) [ 247.188012][ T8918] BPF:size=5 bits_offset=0 nr_bits=0 encoding=UNKN 01:35:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2002}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x2) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000540)='ceph\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/102, 0x66) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3ff) lseek(r0, 0x6, 0x1) getdents64(r0, &(0x7f0000000280)=""/53, 0x35) syz_open_dev$tty1(0xc, 0x4, 0x1) uname(&(0x7f00000002c0)=""/193) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') socket(0x1f, 0xa, 0x3) pipe(0x0) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, 0x0, 0x40000000) [ 247.228459][ T8918] BPF: [ 247.234867][ T8918] BPF:Invalid btf_info kind_flag [ 247.244269][ T8918] BPF: [ 247.244269][ T8918] 01:35:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000008105000000000000060000"], &(0x7f0000000340)=""/142, 0x2a, 0x8e, 0x8}, 0x20) [ 247.350286][ T8923] IPVS: ftp: loaded support on port[0] = 21 [ 247.417097][ T183] tipc: TX() has been purged, node left! [ 247.423384][ T183] tipc: TX() has been purged, node left! [ 247.461233][ T183] tipc: TX() has been purged, node left! [ 247.496844][ T8939] BPF:[1] INT (anon) [ 247.537464][ T8939] BPF:size=5 bits_offset=0 nr_bits=0 encoding=UNKN [ 247.575370][ T8939] BPF: [ 247.591213][ T8938] IPVS: ftp: loaded support on port[0] = 21 [ 247.595150][ T8939] BPF:Invalid btf_info kind_flag 01:35:40 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2600cff9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000000)=0x2, 0x4) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 01:35:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) [ 247.653727][ T8939] BPF: [ 247.653727][ T8939] 01:35:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000008105000000000000060000"], &(0x7f0000000340)=""/142, 0x2a, 0x8e, 0x8}, 0x20) [ 247.804803][ T8914] IPVS: ftp: loaded support on port[0] = 21 01:35:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) [ 247.852075][ T8923] IPVS: ftp: loaded support on port[0] = 21 [ 247.941281][ T8978] IPVS: ftp: loaded support on port[0] = 21 [ 247.948118][ T8984] BPF:[1] INT (anon) [ 247.952865][ T8984] BPF:size=5 bits_offset=0 nr_bits=0 encoding=UNKN [ 248.003483][ T8984] BPF: [ 248.014553][ T8984] BPF:Invalid btf_info kind_flag [ 248.028682][ T8984] BPF: [ 248.028682][ T8984] 01:35:40 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000008105000000000000060000"], &(0x7f0000000340)=""/142, 0x2a, 0x8e, 0x8}, 0x20) 01:35:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000240)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d270146d0e0206e73ba8c63cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) [ 248.184658][ T9017] BPF:[1] INT (anon) [ 248.188965][ T9017] BPF:size=5 bits_offset=0 nr_bits=0 encoding=UNKN [ 248.195545][ T9017] BPF: [ 248.198379][ T9017] BPF:Invalid btf_info kind_flag [ 248.206307][ T9017] BPF: [ 248.206307][ T9017] 01:35:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x2) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000540)='keyring\x00', 0x0, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) uname(&(0x7f00000002c0)=""/193) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FITRIM(0xffffffffffffffff, 0x40047211, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="4c020000", @ANYRES16=r0, @ANYBLOB="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"], 0x24c}, 0x1, 0x0, 0x0, 0x20008040}, 0x40090) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000040)={{{@in=@local, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000), 0xc, 0x0}, 0x40000000) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000180)={0x2, 0x2, 0x1}) 01:35:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 01:35:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2002}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x2) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000540)='ceph\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/102, 0x66) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3ff) lseek(r0, 0x6, 0x1) getdents64(r0, &(0x7f0000000280)=""/53, 0x35) syz_open_dev$tty1(0xc, 0x4, 0x1) uname(&(0x7f00000002c0)=""/193) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') socket(0x1f, 0xa, 0x3) pipe(0x0) 01:35:44 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000008105000000000000060000"], &(0x7f0000000340)=""/142, 0x2a, 0x8e, 0x8}, 0x20) 01:35:44 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2600cff9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendto$inet(r0, &(0x7f0000000000)="e9", 0x1, 0x0, 0x0, 0x0) 01:35:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], 0x0, 0x205211}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x0, 0x0, @ioapic={0x2000}}) syz_open_dev$vcsu(0x0, 0x0, 0x4000) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40041}, 0x4000000) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 252.008985][ T9085] BPF:[1] INT (anon) [ 252.025490][ T9085] BPF:size=5 bits_offset=0 nr_bits=0 encoding=UNKN [ 252.048149][ T9086] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 252.057684][ T9083] IPVS: ftp: loaded support on port[0] = 21 01:35:44 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2600cff9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendto$inet(r0, &(0x7f0000000000)="e9", 0x1, 0x0, 0x0, 0x0) [ 252.098144][ T9085] BPF: 01:35:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2002}, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x2) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000540)='ceph\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/102, 0x66) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3ff) lseek(r0, 0x6, 0x1) getdents64(r0, &(0x7f0000000280)=""/53, 0x35) syz_open_dev$tty1(0xc, 0x4, 0x1) uname(&(0x7f00000002c0)=""/193) clone(0xc75e43cfae22dd4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') socket(0x1f, 0xa, 0x3) [ 252.165741][ T9085] BPF:Invalid btf_info kind_flag [ 252.222532][ T9085] BPF: [ 252.222532][ T9085] 01:35:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@grpjquota_path={'grpjquota', 0x3d, './file0'}}]}) 01:35:45 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000002000000000000000000008105000000000000060000"], &(0x7f0000000340)=""/142, 0x2a, 0x8e, 0x8}, 0x20) [ 252.501008][ T9136] BPF:[1] INT (anon) 01:35:45 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2600cff9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendto$inet(r0, &(0x7f0000000000)="e9", 0x1, 0x0, 0x0, 0x0) 01:35:45 executing program 2: syz_mount_image$tmpfs(&(0x7f00000001c0)='tmpfs\x00', &(0x7f0000000200)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='mpol=prefer:']) [ 252.546152][ T9136] BPF:size=5 bits_offset=0 nr_bits=0 encoding=UNKN [ 252.582283][ T9137] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 252.613073][ T9136] BPF: [ 252.634298][ T9134] IPVS: ftp: loaded support on port[0] = 21 [ 252.651966][ T9136] BPF:Invalid btf_info kind_flag [ 252.685891][ T9136] BPF: [ 252.685891][ T9136] [ 252.820491][ T1] ================================================================== [ 252.830136][ T1] BUG: KASAN: stack-out-of-bounds in mpol_to_str+0x377/0x3be [ 252.837532][ T1] Write of size 8 at addr ffffc90000c7fb60 by task systemd/1 [ 252.844909][ T1] [ 252.847253][ T1] CPU: 1 PID: 1 Comm: systemd Not tainted 5.6.0-rc7-syzkaller #0 [ 252.854977][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.861811][ T9091] IPVS: ftp: loaded support on port[0] = 21 [ 252.865036][ T1] Call Trace: [ 252.865175][ T1] dump_stack+0x188/0x20d [ 252.865196][ T1] ? mpol_to_str+0x377/0x3be [ 252.883416][ T1] ? mpol_to_str+0x377/0x3be [ 252.888109][ T1] print_address_description.constprop.0.cold+0x5/0x315 [ 252.895074][ T1] ? mpol_to_str+0x377/0x3be [ 252.899685][ T1] ? mpol_to_str+0x377/0x3be [ 252.905008][ T1] __kasan_report.cold+0x1a/0x32 [ 252.910088][ T1] ? mpol_to_str+0x377/0x3be [ 252.914703][ T1] kasan_report+0xe/0x20 [ 252.918973][ T1] check_memory_region+0x128/0x190 [ 252.924104][ T1] mpol_to_str+0x377/0x3be [ 252.928658][ T1] ? mpol_parse_str+0xa00/0xa00 [ 252.933604][ T1] ? seq_vprintf+0x136/0x1a0 [ 252.938301][ T1] shmem_show_options+0x418/0x630 [ 252.943347][ T1] ? shmem_format_huge.part.0+0x10/0x10 [ 252.948907][ T1] ? seq_puts+0xb4/0x130 [ 252.953237][ T1] ? selinux_sb_show_options+0x172/0x580 [ 252.958885][ T1] ? memcpy+0x35/0x50 [ 252.962886][ T1] ? shmem_format_huge.part.0+0x10/0x10 [ 252.968548][ T1] show_mountinfo+0x616/0x900 [ 252.973241][ T1] ? show_vfsmnt+0x3e0/0x3e0 [ 252.977976][ T1] ? m_start+0x221/0x330 [ 252.982231][ T1] seq_read+0x4b9/0x1160 [ 252.986578][ T1] ? seq_open_private+0x40/0x40 [ 252.991490][ T1] __vfs_read+0x76/0x100 [ 252.995779][ T1] vfs_read+0x1ea/0x430 [ 252.999940][ T1] ksys_read+0x127/0x250 [ 253.004179][ T1] ? kernel_write+0x120/0x120 [ 253.009292][ T1] ? trace_hardirqs_off_caller+0x55/0x230 [ 253.015034][ T1] do_syscall_64+0xf6/0x7d0 [ 253.020719][ T1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.026742][ T1] RIP: 0033:0x7f193470892d [ 253.031160][ T1] Code: 2d 2c 00 00 75 10 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 de 9b 01 00 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 27 9c 01 00 48 89 d0 48 83 c4 08 48 3d 01 [ 253.050775][ T1] RSP: 002b:00007ffefd484b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 253.059197][ T1] RAX: ffffffffffffffda RBX: 000055d1c6564950 RCX: 00007f193470892d [ 253.067219][ T1] RDX: 0000000000000400 RSI: 000055d1c6564520 RDI: 0000000000000013 [ 253.075879][ T1] RBP: 0000000000000d68 R08: 00007f193613e500 R09: 00000000000000e0 [ 253.083924][ T1] R10: 000055d1c65648dc R11: 0000000000000293 R12: 00007f19349c3440 [ 253.091894][ T1] R13: 00007f19349c2900 R14: 0000000000000044 R15: 0000000000000000 [ 253.099897][ T1] [ 253.102227][ T1] [ 253.104538][ T1] addr ffffc90000c7fb60 is located in stack of task systemd/1 at offset 40 in frame: [ 253.113977][ T1] mpol_to_str+0x0/0x3be [ 253.118202][ T1] [ 253.120524][ T1] this frame has 1 object: [ 253.125372][ T1] [32, 40) 'nodes' [ 253.125374][ T1] [ 253.131481][ T1] Memory state around the buggy address: [ 253.137219][ T1] ffffc90000c7fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 253.145282][ T1] ffffc90000c7fa80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 253.153336][ T1] >ffffc90000c7fb00: 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f3 f3 f3 00 [ 253.161388][ T1] ^ [ 253.168576][ T1] ffffc90000c7fb80: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 253.176629][ T1] ffffc90000c7fc00: 00 00 00 00 00 00 f3 f3 f3 f3 00 00 00 00 00 00 [ 253.184679][ T1] ================================================================== [ 253.192733][ T1] Disabling lock debugging due to kernel taint [ 253.320348][ T1] Kernel panic - not syncing: panic_on_warn set ... [ 253.326986][ T1] CPU: 1 PID: 1 Comm: systemd Tainted: G B 5.6.0-rc7-syzkaller #0 [ 253.336111][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.346193][ T1] Call Trace: [ 253.349489][ T1] dump_stack+0x188/0x20d [ 253.353860][ T1] panic+0x2e3/0x75c [ 253.357776][ T1] ? add_taint.cold+0x16/0x16 [ 253.362565][ T1] ? preempt_schedule_common+0x5e/0xc0 [ 253.368011][ T1] ? mpol_to_str+0x377/0x3be [ 253.372591][ T1] ? ___preempt_schedule+0x16/0x18 [ 253.377682][ T1] ? trace_hardirqs_on+0x55/0x220 [ 253.382684][ T1] ? mpol_to_str+0x377/0x3be [ 253.387248][ T1] end_report+0x43/0x49 [ 253.391430][ T1] ? mpol_to_str+0x377/0x3be [ 253.395997][ T1] __kasan_report.cold+0xd/0x32 [ 253.400840][ T1] ? mpol_to_str+0x377/0x3be [ 253.405426][ T1] kasan_report+0xe/0x20 [ 253.409652][ T1] check_memory_region+0x128/0x190 [ 253.414759][ T1] mpol_to_str+0x377/0x3be [ 253.419164][ T1] ? mpol_parse_str+0xa00/0xa00 [ 253.423999][ T1] ? seq_vprintf+0x136/0x1a0 [ 253.428572][ T1] shmem_show_options+0x418/0x630 [ 253.433572][ T1] ? shmem_format_huge.part.0+0x10/0x10 [ 253.439093][ T1] ? seq_puts+0xb4/0x130 [ 253.443315][ T1] ? selinux_sb_show_options+0x172/0x580 [ 253.448921][ T1] ? memcpy+0x35/0x50 [ 253.452881][ T1] ? shmem_format_huge.part.0+0x10/0x10 [ 253.458408][ T1] show_mountinfo+0x616/0x900 [ 253.465149][ T1] ? show_vfsmnt+0x3e0/0x3e0 [ 253.469718][ T1] ? m_start+0x221/0x330 [ 253.473982][ T1] seq_read+0x4b9/0x1160 [ 253.478211][ T1] ? seq_open_private+0x40/0x40 [ 253.483038][ T1] __vfs_read+0x76/0x100 [ 253.487257][ T1] vfs_read+0x1ea/0x430 [ 253.491478][ T1] ksys_read+0x127/0x250 [ 253.495835][ T1] ? kernel_write+0x120/0x120 [ 253.500530][ T1] ? trace_hardirqs_off_caller+0x55/0x230 [ 253.506251][ T1] do_syscall_64+0xf6/0x7d0 [ 253.510765][ T1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.516648][ T1] RIP: 0033:0x7f193470892d [ 253.521043][ T1] Code: 2d 2c 00 00 75 10 b8 00 00 00 00 0f 05 48 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 de 9b 01 00 48 89 04 24 b8 00 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 27 9c 01 00 48 89 d0 48 83 c4 08 48 3d 01 [ 253.540643][ T1] RSP: 002b:00007ffefd484b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 [ 253.549047][ T1] RAX: ffffffffffffffda RBX: 000055d1c6564950 RCX: 00007f193470892d [ 253.556996][ T1] RDX: 0000000000000400 RSI: 000055d1c6564520 RDI: 0000000000000013 [ 253.564967][ T1] RBP: 0000000000000d68 R08: 00007f193613e500 R09: 00000000000000e0 [ 253.572927][ T1] R10: 000055d1c65648dc R11: 0000000000000293 R12: 00007f19349c3440 [ 253.580889][ T1] R13: 00007f19349c2900 R14: 0000000000000044 R15: 0000000000000000 [ 253.590240][ T1] Kernel Offset: disabled [ 253.594578][ T1] Rebooting in 86400 seconds..