Warning: Permanently added '10.128.0.75' (ECDSA) to the list of known hosts. 2019/12/01 13:19:55 fuzzer started 2019/12/01 13:19:56 dialing manager at 10.128.0.26:39193 2019/12/01 13:20:01 syscalls: 2592 2019/12/01 13:20:01 code coverage: enabled 2019/12/01 13:20:01 comparison tracing: enabled 2019/12/01 13:20:01 extra coverage: extra coverage is not supported by the kernel 2019/12/01 13:20:01 setuid sandbox: enabled 2019/12/01 13:20:01 namespace sandbox: enabled 2019/12/01 13:20:01 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/01 13:20:01 fault injection: enabled 2019/12/01 13:20:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/01 13:20:01 net packet injection: enabled 2019/12/01 13:20:01 net device setup: enabled 2019/12/01 13:20:01 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/01 13:20:01 devlink PCI setup: PCI device 0000:00:10.0 is not available 13:20:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201eeffffff00090000ff07000080ffffff00000000000000000100000000ffffff81000004800000000a0000000005000000000000000000000000000055aa", 0x40, 0x1c0}]) 13:20:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002800210400"/20, @ANYRES32=r3, @ANYBLOB="ac0c000000000000000000000c0080eb8600000075700000200002001c0002000500000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002a00210300"/20, @ANYRES32=r6, @ANYBLOB="ac0c000000000000000000000c0080eb8600000075700000200002001c0002000500000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) [ 101.453298][ T8173] IPVS: ftp: loaded support on port[0] = 21 [ 101.594811][ T8173] chnl_net:caif_netlink_parms(): no params data found [ 101.621508][ T8176] IPVS: ftp: loaded support on port[0] = 21 [ 101.679123][ T8173] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.688526][ T8173] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.697053][ T8173] device bridge_slave_0 entered promiscuous mode [ 101.718669][ T8173] bridge0: port 2(bridge_slave_1) entered blocking state 13:20:42 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4080, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000001c0)=""/203, 0xcb}], 0x1) [ 101.726494][ T8173] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.734794][ T8173] device bridge_slave_1 entered promiscuous mode [ 101.831401][ T8173] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 101.878337][ T8173] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 101.928060][ T8176] chnl_net:caif_netlink_parms(): no params data found [ 101.939582][ T8173] team0: Port device team_slave_0 added [ 101.963388][ T8173] team0: Port device team_slave_1 added 13:20:43 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_sco(r1, &(0x7f0000000000), 0x8) listen(r1, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) [ 101.990923][ T8176] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.998256][ T8176] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.009158][ T8176] device bridge_slave_0 entered promiscuous mode [ 102.068582][ T8173] device hsr_slave_0 entered promiscuous mode [ 102.096205][ T8173] device hsr_slave_1 entered promiscuous mode [ 102.165073][ T8176] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.185965][ T8176] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.194175][ T8176] device bridge_slave_1 entered promiscuous mode 13:20:43 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000100)=0x51, 0x4) listen(r0, 0x26) recvmmsg(r0, &(0x7f0000002f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) listen(r0, 0x0) shutdown(r0, 0x0) [ 102.220737][ T8179] IPVS: ftp: loaded support on port[0] = 21 [ 102.234215][ T8181] IPVS: ftp: loaded support on port[0] = 21 [ 102.300307][ T8176] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 102.312868][ T8176] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 102.322401][ T8173] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 102.378810][ T8173] netdevsim netdevsim0 netdevsim1: renamed from eth1 13:20:43 executing program 5: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) [ 102.452465][ T8173] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 102.509672][ T8173] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 102.573075][ T8176] team0: Port device team_slave_0 added [ 102.590784][ T8173] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.599045][ T8173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.601162][ T8183] IPVS: ftp: loaded support on port[0] = 21 [ 102.606915][ T8173] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.619351][ T8173] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.630237][ T8176] team0: Port device team_slave_1 added [ 102.641557][ T3694] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.650108][ T3694] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.668269][ T8185] IPVS: ftp: loaded support on port[0] = 21 [ 102.715126][ T8181] chnl_net:caif_netlink_parms(): no params data found [ 102.778731][ T8176] device hsr_slave_0 entered promiscuous mode [ 102.826336][ T8176] device hsr_slave_1 entered promiscuous mode [ 102.876041][ T8176] debugfs: Directory 'hsr0' with parent '/' already present! [ 102.965404][ T8176] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 103.009245][ T8176] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 103.059878][ T8181] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.068389][ T8181] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.077021][ T8181] device bridge_slave_0 entered promiscuous mode [ 103.085252][ T8181] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.093284][ T8181] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.101560][ T8181] device bridge_slave_1 entered promiscuous mode [ 103.109341][ T8176] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 103.158865][ T8176] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 103.258165][ T8179] chnl_net:caif_netlink_parms(): no params data found [ 103.298735][ T8181] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 103.330455][ T8179] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.338830][ T8179] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.349663][ T8179] device bridge_slave_0 entered promiscuous mode [ 103.358961][ T8181] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 103.391314][ T8179] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.398858][ T8179] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.407666][ T8179] device bridge_slave_1 entered promiscuous mode [ 103.431679][ T8181] team0: Port device team_slave_0 added [ 103.441473][ T8181] team0: Port device team_slave_1 added [ 103.465115][ T8183] chnl_net:caif_netlink_parms(): no params data found [ 103.480901][ T8179] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 103.491512][ T8179] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 103.508780][ T8173] 8021q: adding VLAN 0 to HW filter on device bond0 [ 103.553272][ T8179] team0: Port device team_slave_0 added [ 103.574921][ T8179] team0: Port device team_slave_1 added [ 103.639985][ T8181] device hsr_slave_0 entered promiscuous mode [ 103.696336][ T8181] device hsr_slave_1 entered promiscuous mode [ 103.735970][ T8181] debugfs: Directory 'hsr0' with parent '/' already present! [ 103.743652][ T8185] chnl_net:caif_netlink_parms(): no params data found [ 103.762332][ T8183] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.769978][ T8183] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.777933][ T8183] device bridge_slave_0 entered promiscuous mode [ 103.789732][ T8173] 8021q: adding VLAN 0 to HW filter on device team0 [ 103.803408][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 103.811858][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 103.839065][ T8183] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.849293][ T8183] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.857586][ T8183] device bridge_slave_1 entered promiscuous mode [ 103.875062][ T8183] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 103.903321][ T8183] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 103.920088][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 103.933601][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 103.943066][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.950253][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 104.008880][ T8179] device hsr_slave_0 entered promiscuous mode [ 104.076387][ T8179] device hsr_slave_1 entered promiscuous mode [ 104.125980][ T8179] debugfs: Directory 'hsr0' with parent '/' already present! [ 104.153569][ T8185] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.160928][ T8185] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.171440][ T8185] device bridge_slave_0 entered promiscuous mode [ 104.179217][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 104.190024][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 104.199591][ T3694] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.206711][ T3694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 104.214906][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 104.224080][ T3694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 104.252039][ T8183] team0: Port device team_slave_0 added [ 104.263492][ T8183] team0: Port device team_slave_1 added [ 104.269355][ T8185] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.277577][ T8185] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.285335][ T8185] device bridge_slave_1 entered promiscuous mode [ 104.324182][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 104.332866][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 104.341430][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 104.349860][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 104.358374][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 104.369690][ T8181] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 104.441361][ T8181] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 104.506169][ T8185] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 104.515521][ T8179] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 104.558238][ T8179] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 104.599261][ T8176] 8021q: adding VLAN 0 to HW filter on device bond0 [ 104.609781][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 104.618500][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 104.627304][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 104.635512][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 104.644261][ T8181] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 104.740314][ T8183] device hsr_slave_0 entered promiscuous mode [ 104.786379][ T8183] device hsr_slave_1 entered promiscuous mode [ 104.815961][ T8183] debugfs: Directory 'hsr0' with parent '/' already present! [ 104.824932][ T8185] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 104.834403][ T8179] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 104.893697][ T8176] 8021q: adding VLAN 0 to HW filter on device team0 [ 104.902486][ T8173] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 104.912278][ T8181] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 104.938442][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 104.946608][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 104.971033][ T8179] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 105.056239][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 105.064885][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 105.076310][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 105.083523][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 105.092008][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 105.103057][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 105.111520][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 105.118814][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 105.127382][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 105.136170][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 105.146248][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 105.158497][ T8185] team0: Port device team_slave_0 added [ 105.195396][ T8185] team0: Port device team_slave_1 added [ 105.207432][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 105.214961][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 105.225573][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 105.234544][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 105.246133][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 105.254640][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 105.263144][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 105.272537][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 105.280872][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 105.289197][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 105.300049][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 105.308533][ T8183] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 105.358182][ T8183] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 105.409829][ T8173] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.419222][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 105.435751][ T8183] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 105.479779][ T8183] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 105.599321][ T8185] device hsr_slave_0 entered promiscuous mode [ 105.656271][ T8185] device hsr_slave_1 entered promiscuous mode [ 105.726037][ T8185] debugfs: Directory 'hsr0' with parent '/' already present! [ 105.747032][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 105.754541][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 105.789263][ T8176] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 105.824830][ T8185] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 105.849887][ T8185] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 105.910571][ T8185] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 105.989703][ T8185] netdevsim netdevsim5 netdevsim3: renamed from eth3 13:20:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002800210400"/20, @ANYRES32=r3, @ANYBLOB="ac0c000000000000000000000c0080eb8600000075700000200002001c0002000500000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002a00210300"/20, @ANYRES32=r6, @ANYBLOB="ac0c000000000000000000000c0080eb8600000075700000200002001c0002000500000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) [ 106.095304][ T8181] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.097535][ T8198] Dev loop0: unable to read RDB block 1 [ 106.108971][ T8198] loop0: unable to read partition table [ 106.115238][ T8198] loop0: partition table beyond EOD, truncated [ 106.121976][ T8198] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 106.164724][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.176722][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.187818][ T8181] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.203697][ T8183] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.214230][ T8179] 8021q: adding VLAN 0 to HW filter on device bond0 13:20:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201eeffffff00090000ff07000080ffffff00000000000000000100000000ffffff81000004800000000a0000000005000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 106.280605][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.303972][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.316643][ T2938] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.323740][ T2938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.339770][ T8179] 8021q: adding VLAN 0 to HW filter on device team0 13:20:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002800210400"/20, @ANYRES32=r3, @ANYBLOB="ac0c000000000000000000000c0080eb8600000075700000200002001c0002000500000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002a00210300"/20, @ANYRES32=r6, @ANYBLOB="ac0c000000000000000000000c0080eb8600000075700000200002001c0002000500000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) [ 106.374060][ T8183] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.382982][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.397034][ T8210] Dev loop0: unable to read RDB block 1 [ 106.402685][ T8210] loop0: unable to read partition table [ 106.421777][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.430066][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.436120][ T8210] loop0: partition table beyond EOD, truncated [ 106.442080][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.449070][ T8210] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 106.461272][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.469771][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.477002][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.484929][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 106.493655][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 106.502622][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 106.511360][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.519759][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 106.528029][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 106.554411][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 13:20:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201eeffffff00090000ff07000080ffffff00000000000000000100000000ffffff81000004800000000a0000000005000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 106.578729][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.587890][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.600216][ T8190] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.607878][ T8190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.616422][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.625207][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.633781][ T8190] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.640979][ T8190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.656374][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 106.670600][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 13:20:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000000000a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002800210400"/20, @ANYRES32=r3, @ANYBLOB="ac0c000000000000000000000c0080eb8600000075700000200002001c0002000500000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="500000002a00210300"/20, @ANYRES32=r6, @ANYBLOB="ac0c000000000000000000000c0080eb8600000075700000200002001c0002000500000000000800010062706600040002000400060000ff156569735843de8b4c1ef779b8d8f7bf7afb33e23753792aafde2698ebe5f83bc5b1d2c1df41944400193870e465324b63063fc06b6d0e583c75ba0a6d8da2ca131e39aeef0f"], 0x50}}, 0x0) [ 106.699173][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.711100][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 106.723649][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.735466][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 106.747752][ T8224] Dev loop0: unable to read RDB block 1 [ 106.749786][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.762310][ T8224] loop0: unable to read partition table [ 106.764297][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 106.782546][ T8224] loop0: partition table beyond EOD, truncated [ 106.782637][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 106.804253][ T8190] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.811670][ T8190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.812033][ T8224] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 106.825471][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 106.839198][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.847786][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 106.857073][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 106.865942][ T8190] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.872998][ T8190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.880713][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 106.890037][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 106.899113][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 106.908291][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 106.917230][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 106.925577][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 106.936474][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.945413][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 106.967308][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 106.977427][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 106.986321][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 106.995114][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.004396][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.012798][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.021210][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.030021][ T2938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.055210][ T8181] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 13:20:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="0201eeffffff00090000ff07000080ffffff00000000000000000100000000ffffff81000004800000000a0000000005000000000000000000000000000055aa", 0x40, 0x1c0}]) 13:20:48 executing program 1: pipe2(&(0x7f0000000680), 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, &(0x7f0000000200)={0x0, r1+30000000}, &(0x7f0000000300)={0x0}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 107.087057][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.135674][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.163311][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 107.172026][ C1] hrtimer: interrupt took 34439 ns [ 107.187770][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.197293][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.205641][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.214508][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.232498][ T8183] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.257932][ T8242] Dev loop0: unable to read RDB block 1 [ 107.263554][ T8242] loop0: unable to read partition table [ 107.284148][ T8242] loop0: partition table beyond EOD, truncated [ 107.284317][ T8181] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.303132][ T8242] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 107.313660][ T8183] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.321357][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 107.329515][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 107.337724][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 107.345624][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 107.355539][ T8185] 8021q: adding VLAN 0 to HW filter on device bond0 [ 107.410150][ T8179] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.426595][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 107.434152][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 107.447087][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 107.454896][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 107.476824][ T8185] 8021q: adding VLAN 0 to HW filter on device team0 13:20:48 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x100a}}) [ 107.504644][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 107.523691][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 107.562415][ T8190] bridge0: port 1(bridge_slave_0) entered blocking state [ 107.570360][ T8190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 107.587531][ T8212] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 107.602920][ T8212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 107.632918][ T8212] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 107.662148][ T8212] bridge0: port 2(bridge_slave_1) entered blocking state [ 107.669404][ T8212] bridge0: port 2(bridge_slave_1) entered forwarding state 13:20:48 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4080, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000001c0)=""/203, 0xcb}], 0x1) [ 107.701172][ T8212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 107.721178][ T8212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 107.743653][ T8212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 107.753135][ T8212] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 107.769495][ T8212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 107.781748][ T8212] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 107.835553][ T8185] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 107.854477][ T8185] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 107.876340][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 107.884665][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 107.895562][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 107.907426][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 107.919340][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 107.931101][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 107.965787][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 107.977315][ T8190] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 107.991751][ T8185] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 108.126520][ T25] kauditd_printk_skb: 1 callbacks suppressed [ 108.126528][ T25] audit: type=1800 audit(1575206449.346:31): pid=8288 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16531 res=0 [ 108.154752][ T25] audit: type=1804 audit(1575206449.376:32): pid=8288 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir159177621/syzkaller.OKPEkh/0/file0" dev="sda1" ino=16531 res=1 [ 108.452646][ T25] audit: type=1800 audit(1575206449.676:33): pid=8288 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=16531 res=0 13:20:49 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_sco(r1, &(0x7f0000000000), 0x8) listen(r1, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 13:20:49 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x100a}}) 13:20:49 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4080, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000001c0)=""/203, 0xcb}], 0x1) 13:20:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000100)=0x51, 0x4) listen(r0, 0x26) recvmmsg(r0, &(0x7f0000002f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) listen(r0, 0x0) shutdown(r0, 0x0) 13:20:49 executing program 1: pipe2(&(0x7f0000000680), 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, &(0x7f0000000200)={0x0, r1+30000000}, &(0x7f0000000300)={0x0}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 13:20:49 executing program 5: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) [ 108.574118][ T25] audit: type=1800 audit(1575206449.796:34): pid=8304 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16539 res=0 13:20:49 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4080, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000001c0)=""/203, 0xcb}], 0x1) 13:20:49 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x100a}}) [ 108.615321][ T25] audit: type=1804 audit(1575206449.826:35): pid=8304 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir159177621/syzkaller.OKPEkh/1/file0" dev="sda1" ino=16539 res=1 13:20:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000100)=0x51, 0x4) listen(r0, 0x26) recvmmsg(r0, &(0x7f0000002f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) listen(r0, 0x0) shutdown(r0, 0x0) 13:20:50 executing program 2: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) 13:20:50 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x100a}}) 13:20:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000100)=0x51, 0x4) listen(r0, 0x26) recvmmsg(r0, &(0x7f0000002f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) listen(r0, 0x0) shutdown(r0, 0x0) [ 108.864511][ T25] audit: type=1800 audit(1575206450.086:36): pid=8326 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16534 res=0 [ 108.920340][ T25] audit: type=1804 audit(1575206450.136:37): pid=8326 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245576269/syzkaller.0SYxYB/4/file0" dev="sda1" ino=16534 res=1 13:20:50 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_sco(r1, &(0x7f0000000000), 0x8) listen(r1, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 13:20:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000100)=0x51, 0x4) listen(r0, 0x26) recvmmsg(r0, &(0x7f0000002f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) listen(r0, 0x0) shutdown(r0, 0x0) 13:20:50 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4080, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000001c0)=""/203, 0xcb}], 0x1) 13:20:50 executing program 5: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) 13:20:50 executing program 2: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x666d) sendfile(r0, r1, 0x0, 0xa195) 13:20:50 executing program 1: pipe2(&(0x7f0000000680), 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, &(0x7f0000000200)={0x0, r1+30000000}, &(0x7f0000000300)={0x0}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 109.422587][ T25] audit: type=1800 audit(1575206450.646:38): pid=8341 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16531 res=0 13:20:50 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4080, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000001c0)=""/203, 0xcb}], 0x1) [ 109.487008][ T25] audit: type=1800 audit(1575206450.666:39): pid=8344 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=16532 res=0 [ 109.508664][ T25] audit: type=1804 audit(1575206450.676:40): pid=8341 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir245576269/syzkaller.0SYxYB/5/file0" dev="sda1" ino=16531 res=1 [ 109.539004][ T8352] ================================================================== [ 109.547457][ T8352] BUG: KASAN: slab-out-of-bounds in iov_iter_alignment+0x6a1/0x7b0 [ 109.555773][ T8352] Read of size 4 at addr ffff8880a06f4d04 by task syz-executor.2/8352 [ 109.564096][ T8352] [ 109.566452][ T8352] CPU: 0 PID: 8352 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 109.574691][ T8352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.584759][ T8352] Call Trace: [ 109.588069][ T8352] dump_stack+0x1fb/0x318 [ 109.592426][ T8352] print_address_description+0x75/0x5c0 [ 109.597994][ T8352] ? vprintk_func+0x158/0x170 [ 109.603039][ T8352] ? printk+0x62/0x8d [ 109.607036][ T8352] ? vprintk_emit+0x2d4/0x3a0 [ 109.611730][ T8352] __kasan_report+0x14b/0x1c0 [ 109.616684][ T8352] ? iov_iter_alignment+0x6a1/0x7b0 [ 109.622016][ T8352] kasan_report+0x26/0x50 [ 109.626494][ T8352] __asan_report_load4_noabort+0x14/0x20 [ 109.632143][ T8352] iov_iter_alignment+0x6a1/0x7b0 [ 109.637206][ T8352] iomap_dio_bio_actor+0x1a7/0x11e0 [ 109.642424][ T8352] ? ext4_set_iomap+0x529/0x760 [ 109.647284][ T8352] iomap_dio_actor+0x2b4/0x4a0 [ 109.647305][ T8352] ? rcu_read_lock_sched_held+0x10b/0x170 [ 109.647318][ T8352] iomap_apply+0x370/0x490 [ 109.647343][ T8352] iomap_dio_rw+0x8ad/0x1010 [ 109.647351][ T8352] ? iomap_dio_rw+0x1010/0x1010 [ 109.647389][ T8352] ext4_file_write_iter+0x15a4/0x1f50 [ 109.647413][ T8352] do_iter_readv_writev+0x651/0x8e0 [ 109.660836][ T8352] do_iter_write+0x180/0x590 [ 109.660849][ T8352] ? __kasan_check_read+0x11/0x20 [ 109.660860][ T8352] ? splice_from_pipe_next+0x43d/0x4d0 [ 109.660875][ T8352] vfs_iter_write+0x7c/0xa0 [ 109.660888][ T8352] iter_file_splice_write+0x703/0xe40 [ 109.660926][ T8352] ? splice_from_pipe+0x180/0x180 [ 109.660938][ T8352] direct_splice_actor+0xf7/0x130 [ 109.660952][ T8352] splice_direct_to_actor+0x4d2/0xb90 [ 109.660962][ T8352] ? do_splice_direct+0x330/0x330 [ 109.660980][ T8352] do_splice_direct+0x200/0x330 13:20:50 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4080, 0x0) readv(r0, &(0x7f0000001600)=[{&(0x7f00000001c0)=""/203, 0xcb}], 0x1) 13:20:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000100)=0x51, 0x4) listen(r0, 0x26) recvmmsg(r0, &(0x7f0000002f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x15) listen(r0, 0x0) shutdown(r0, 0x0) [ 109.660997][ T8352] ? security_file_permission+0xe0/0x350 [ 109.661009][ T8352] do_sendfile+0x7e4/0xfd0 [ 109.661035][ T8352] __x64_sys_sendfile64+0x176/0x1b0 [ 109.695203][ T8352] do_syscall_64+0xf7/0x1c0 [ 109.695222][ T8352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 109.695232][ T8352] RIP: 0033:0x45a679 [ 109.695242][ T8352] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 109.695248][ T8352] RSP: 002b:00007f0c7eba5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 109.695258][ T8352] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a679 [ 109.695264][ T8352] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 109.695269][ T8352] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 109.695274][ T8352] R10: 000000000000a195 R11: 0000000000000246 R12: 00007f0c7eba66d4 [ 109.695280][ T8352] R13: 00000000004c8652 R14: 00000000004df368 R15: 00000000ffffffff [ 109.695296][ T8352] [ 109.695303][ T8352] Allocated by task 8352: [ 109.695313][ T8352] __kasan_kmalloc+0x11c/0x1b0 [ 109.695319][ T8352] kasan_kmalloc+0x9/0x10 [ 109.695329][ T8352] __kmalloc+0x254/0x340 [ 109.695337][ T8352] kmalloc_array+0x32/0x60 [ 109.695349][ T8352] iter_file_splice_write+0x15f/0xe40 [ 109.705302][ T4087] kobject: 'loop0' (000000005595910d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 109.705390][ T8352] direct_splice_actor+0xf7/0x130 [ 109.730131][ T4087] kobject: 'loop4' (000000001c7cc89b): kobject_uevent_env [ 109.731312][ T8352] splice_direct_to_actor+0x4d2/0xb90 [ 109.731321][ T8352] do_splice_direct+0x200/0x330 [ 109.731328][ T8352] do_sendfile+0x7e4/0xfd0 [ 109.731335][ T8352] __x64_sys_sendfile64+0x176/0x1b0 [ 109.731345][ T8352] do_syscall_64+0xf7/0x1c0 [ 109.731357][ T8352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 109.731360][ T8352] [ 109.731366][ T8352] Freed by task 0: [ 109.731369][ T8352] (stack is not available) [ 109.731372][ T8352] [ 109.731380][ T8352] The buggy address belongs to the object at ffff8880a06f4c00 [ 109.731380][ T8352] which belongs to the cache kmalloc-256 of size 256 [ 109.731388][ T8352] The buggy address is located 4 bytes to the right of [ 109.731388][ T8352] 256-byte region [ffff8880a06f4c00, ffff8880a06f4d00) [ 109.731393][ T8352] The buggy address belongs to the page: [ 109.731403][ T8352] page:ffffea000281bd00 refcount:1 mapcount:0 mapping:ffff8880aa4008c0 index:0x0 [ 109.731415][ T8352] raw: 00fffe0000000200 ffffea000250c808 ffffea00026ad388 ffff8880aa4008c0 [ 109.743168][ T4087] kobject: 'loop4' (000000001c7cc89b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 109.746404][ T8352] raw: 0000000000000000 ffff8880a06f4000 0000000100000008 0000000000000000 [ 109.746409][ T8352] page dumped because: kasan: bad access detected [ 109.746413][ T8352] [ 109.746417][ T8352] Memory state around the buggy address: [ 109.746425][ T8352] ffff8880a06f4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 109.746432][ T8352] ffff8880a06f4c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 109.746438][ T8352] >ffff8880a06f4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 109.746443][ T8352] ^ [ 109.746450][ T8352] ffff8880a06f4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 109.746457][ T8352] ffff8880a06f4e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 109.746461][ T8352] ================================================================== [ 109.746465][ T8352] Disabling lock debugging due to kernel taint [ 109.752251][ T8352] Kernel panic - not syncing: panic_on_warn set ... [ 109.799240][ T4087] kobject: 'loop4' (000000001c7cc89b): kobject_uevent_env [ 109.803107][ T8352] CPU: 0 PID: 8352 Comm: syz-executor.2 Tainted: G B 5.4.0-syzkaller #0 [ 109.803112][ T8352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.803115][ T8352] Call Trace: [ 109.803131][ T8352] dump_stack+0x1fb/0x318 [ 109.803143][ T8352] panic+0x264/0x7a9 [ 109.803152][ T8352] ? trace_hardirqs_on+0x34/0x80 [ 109.803163][ T8352] __kasan_report+0x1bb/0x1c0 [ 109.803173][ T8352] ? iov_iter_alignment+0x6a1/0x7b0 [ 109.803181][ T8352] kasan_report+0x26/0x50 [ 109.803191][ T8352] __asan_report_load4_noabort+0x14/0x20 [ 109.803198][ T8352] iov_iter_alignment+0x6a1/0x7b0 [ 109.803211][ T8352] iomap_dio_bio_actor+0x1a7/0x11e0 [ 109.803222][ T8352] ? ext4_set_iomap+0x529/0x760 [ 109.803235][ T8352] iomap_dio_actor+0x2b4/0x4a0 [ 109.803246][ T8352] ? rcu_read_lock_sched_held+0x10b/0x170 [ 109.803256][ T8352] iomap_apply+0x370/0x490 [ 109.803273][ T8352] iomap_dio_rw+0x8ad/0x1010 [ 109.803279][ T8352] ? iomap_dio_rw+0x1010/0x1010 [ 109.803298][ T8352] ext4_file_write_iter+0x15a4/0x1f50 [ 109.816365][ T4087] kobject: 'loop4' (000000001c7cc89b): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 109.819261][ T8352] do_iter_readv_writev+0x651/0x8e0 [ 109.819277][ T8352] do_iter_write+0x180/0x590 [ 109.819287][ T8352] ? __kasan_check_read+0x11/0x20 [ 109.819296][ T8352] ? splice_from_pipe_next+0x43d/0x4d0 [ 109.819307][ T8352] vfs_iter_write+0x7c/0xa0 [ 109.819317][ T8352] iter_file_splice_write+0x703/0xe40 [ 109.819336][ T8352] ? splice_from_pipe+0x180/0x180 [ 109.819349][ T8352] direct_splice_actor+0xf7/0x130 [ 109.864426][ T4087] kobject: 'loop0' (000000005595910d): kobject_uevent_env [ 109.866341][ T8352] splice_direct_to_actor+0x4d2/0xb90 [ 109.866350][ T8352] ? do_splice_direct+0x330/0x330 [ 109.866364][ T8352] do_splice_direct+0x200/0x330 [ 109.866378][ T8352] ? security_file_permission+0xe0/0x350 [ 109.866388][ T8352] do_sendfile+0x7e4/0xfd0 [ 109.866402][ T8352] __x64_sys_sendfile64+0x176/0x1b0 [ 109.866415][ T8352] do_syscall_64+0xf7/0x1c0 [ 109.866426][ T8352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 109.866434][ T8352] RIP: 0033:0x45a679 [ 109.866442][ T8352] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 109.866447][ T8352] RSP: 002b:00007f0c7eba5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 109.866459][ T8352] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a679 [ 109.866463][ T8352] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 109.866468][ T8352] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 109.866473][ T8352] R10: 000000000000a195 R11: 0000000000000246 R12: 00007f0c7eba66d4 [ 109.866477][ T8352] R13: 00000000004c8652 R14: 00000000004df368 R15: 00000000ffffffff [ 109.867273][ T8352] Kernel Offset: disabled [ 110.368225][ T8352] Rebooting in 86400 seconds..