[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 86.991278][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 86.991292][ T27] audit: type=1800 audit(1580147160.144:29): pid=9610 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 87.018766][ T27] audit: type=1800 audit(1580147160.154:30): pid=9610 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.41' (ECDSA) to the list of known hosts. 2020/01/27 17:46:10 fuzzer started 2020/01/27 17:46:12 dialing manager at 10.128.0.26:36489 2020/01/27 17:46:12 syscalls: 2928 2020/01/27 17:46:12 code coverage: enabled 2020/01/27 17:46:12 comparison tracing: enabled 2020/01/27 17:46:12 extra coverage: enabled 2020/01/27 17:46:12 setuid sandbox: enabled 2020/01/27 17:46:12 namespace sandbox: enabled 2020/01/27 17:46:12 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/27 17:46:12 fault injection: enabled 2020/01/27 17:46:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/27 17:46:12 net packet injection: enabled 2020/01/27 17:46:12 net device setup: enabled 2020/01/27 17:46:12 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/01/27 17:46:12 devlink PCI setup: PCI device 0000:00:10.0 is not available 17:48:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) syzkaller login: [ 263.991725][ T9778] IPVS: ftp: loaded support on port[0] = 21 17:48:57 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1e) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) [ 264.200280][ T9778] chnl_net:caif_netlink_parms(): no params data found [ 264.347729][ T9778] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.364245][ T9778] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.376910][ T9778] device bridge_slave_0 entered promiscuous mode [ 264.391902][ T9782] IPVS: ftp: loaded support on port[0] = 21 [ 264.401315][ T9778] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.413401][ T9778] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.424482][ T9778] device bridge_slave_1 entered promiscuous mode [ 264.476935][ T9778] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 264.501351][ T9778] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 264.573802][ T9778] team0: Port device team_slave_0 added [ 264.596162][ T9778] team0: Port device team_slave_1 added [ 264.627304][ T9782] chnl_net:caif_netlink_parms(): no params data found [ 264.649608][ T9778] batman_adv: batadv0: Adding interface: batadv_slave_0 17:48:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x2, r2}]}}}]}, 0x38}}, 0x0) [ 264.664075][ T9778] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 264.690437][ T9778] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 264.722627][ T9778] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 264.731113][ T9778] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 264.760936][ T9778] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 264.792582][ T9782] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.799916][ T9782] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.811008][ T9782] device bridge_slave_0 entered promiscuous mode [ 264.821999][ T9782] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.831776][ T9782] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.840866][ T9782] device bridge_slave_1 entered promiscuous mode [ 264.879536][ T9782] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 264.895715][ T9782] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 264.947542][ T9778] device hsr_slave_0 entered promiscuous mode 17:48:58 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000006a000102000000c2e2ae780002000000", @ANYRES32=0x0, @ANYBLOB="04000a00ffffffff"], 0x20}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000006a0001adda63a6c2e2ae78000a000000", @ANYRES32=0x0, @ANYBLOB='\b'], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 265.006877][ T9778] device hsr_slave_1 entered promiscuous mode [ 265.072524][ T9785] IPVS: ftp: loaded support on port[0] = 21 [ 265.083418][ T9782] team0: Port device team_slave_0 added [ 265.130803][ T9782] team0: Port device team_slave_1 added [ 265.221936][ T9782] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 265.229998][ T9782] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 265.256749][ T9782] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 265.287456][ T9782] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 265.294855][ T9782] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 265.322178][ T9782] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 265.358560][ T9787] IPVS: ftp: loaded support on port[0] = 21 17:48:58 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1, 0x3, 0x0, 0x0) [ 265.459030][ T9782] device hsr_slave_0 entered promiscuous mode [ 265.514419][ T9782] device hsr_slave_1 entered promiscuous mode [ 265.594417][ T9782] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 265.602291][ T9782] Cannot create hsr debugfs directory [ 265.651603][ T9789] IPVS: ftp: loaded support on port[0] = 21 17:48:58 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$LOOP_CHANGE_FD(r0, 0x125f, 0xffffffffffffffff) [ 265.840724][ T9778] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 265.909333][ T9778] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 266.009824][ T9778] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 266.087598][ T9778] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 266.170160][ T9787] chnl_net:caif_netlink_parms(): no params data found [ 266.172845][ T9792] IPVS: ftp: loaded support on port[0] = 21 [ 266.188372][ T9785] chnl_net:caif_netlink_parms(): no params data found [ 266.292905][ T9787] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.301045][ T9787] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.309784][ T9787] device bridge_slave_0 entered promiscuous mode [ 266.318973][ T9787] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.326252][ T9787] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.334609][ T9787] device bridge_slave_1 entered promiscuous mode [ 266.345640][ T9782] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 266.408085][ T9782] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 266.491420][ T9782] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 266.558884][ T9785] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.566188][ T9785] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.573895][ T9785] device bridge_slave_0 entered promiscuous mode [ 266.583508][ T9785] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.590711][ T9785] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.598927][ T9785] device bridge_slave_1 entered promiscuous mode [ 266.619353][ T9782] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 266.678169][ T9787] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.691994][ T9787] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.743758][ T9785] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.839316][ T9785] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.866620][ T9787] team0: Port device team_slave_0 added [ 266.887366][ T9789] chnl_net:caif_netlink_parms(): no params data found [ 266.917632][ T9787] team0: Port device team_slave_1 added [ 266.932506][ T9785] team0: Port device team_slave_0 added [ 266.940872][ T9792] chnl_net:caif_netlink_parms(): no params data found [ 266.958148][ T9785] team0: Port device team_slave_1 added [ 266.993808][ T9787] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 267.001076][ T9787] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 267.029170][ T9787] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 267.053060][ T9789] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.060320][ T9789] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.069406][ T9789] device bridge_slave_0 entered promiscuous mode [ 267.080222][ T9789] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.087561][ T9789] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.095757][ T9789] device bridge_slave_1 entered promiscuous mode [ 267.110878][ T9787] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 267.119087][ T9787] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 267.145376][ T9787] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 267.187570][ T9785] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 267.197891][ T9785] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 267.225452][ T9785] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 267.239972][ T9785] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 267.247953][ T9785] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 267.274753][ T9785] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 267.307134][ T9778] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.317157][ T9792] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.324483][ T9792] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.332235][ T9792] device bridge_slave_0 entered promiscuous mode [ 267.361935][ T9789] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 267.374164][ T9789] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 267.389895][ T9792] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.399112][ T9792] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.407425][ T9792] device bridge_slave_1 entered promiscuous mode [ 267.476129][ T9787] device hsr_slave_0 entered promiscuous mode [ 267.534557][ T9787] device hsr_slave_1 entered promiscuous mode [ 267.594174][ T9787] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 267.601827][ T9787] Cannot create hsr debugfs directory [ 267.667401][ T9785] device hsr_slave_0 entered promiscuous mode [ 267.714552][ T9785] device hsr_slave_1 entered promiscuous mode [ 267.754233][ T9785] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 267.762033][ T9785] Cannot create hsr debugfs directory [ 267.781756][ T9792] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 267.793707][ T9792] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 267.826623][ T9789] team0: Port device team_slave_0 added [ 267.864240][ T9789] team0: Port device team_slave_1 added [ 267.881058][ T9778] 8021q: adding VLAN 0 to HW filter on device team0 [ 267.893787][ T9792] team0: Port device team_slave_0 added [ 267.925425][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.934214][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.954886][ T9782] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.963015][ T9792] team0: Port device team_slave_1 added [ 267.997275][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.006644][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.015503][ T2718] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.023286][ T2718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.041192][ T9789] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 268.053204][ T9789] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.081647][ T9789] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 268.108345][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.120243][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.129832][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.138989][ T2718] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.146506][ T2718] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.166019][ T9792] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 268.173035][ T9792] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.199841][ T9792] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 268.216898][ T9789] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 268.223994][ T9789] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.252195][ T9789] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 268.269735][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 268.278764][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.287183][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.296953][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 268.309053][ T9782] 8021q: adding VLAN 0 to HW filter on device team0 [ 268.317802][ T9792] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 268.324916][ T9792] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 268.351141][ T9792] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 268.468227][ T9792] device hsr_slave_0 entered promiscuous mode [ 268.524582][ T9792] device hsr_slave_1 entered promiscuous mode [ 268.564171][ T9792] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 268.571764][ T9792] Cannot create hsr debugfs directory [ 268.578177][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.590059][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.599018][ T2718] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.606175][ T2718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.614861][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.623561][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.632405][ T2718] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.639793][ T2718] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.648093][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 268.717401][ T9789] device hsr_slave_0 entered promiscuous mode [ 268.754626][ T9789] device hsr_slave_1 entered promiscuous mode [ 268.814237][ T9789] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 268.821837][ T9789] Cannot create hsr debugfs directory [ 268.850548][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.859905][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 268.869046][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 268.878070][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 268.887334][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 268.896734][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 268.942459][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 268.958165][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 268.966939][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.976518][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 268.986198][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 268.994914][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 269.003312][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.011979][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 269.020924][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 269.029503][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 269.037863][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.046454][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 269.055322][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.063682][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 269.100863][ T9778] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 269.129364][ T9782] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 269.182838][ T9787] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 269.233623][ T9787] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 269.326018][ T9787] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 269.380864][ T9787] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 269.466574][ T9785] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 269.518249][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 269.525935][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.533580][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 269.541525][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.567870][ T9785] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 269.607838][ T9778] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 269.651375][ T9785] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 269.708496][ T9782] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 269.726484][ T9789] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 269.799445][ T9789] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 269.856873][ T9785] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 269.946327][ T9789] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 269.989685][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 269.999466][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 270.008365][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 270.017599][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 270.053159][ T9789] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 270.154726][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 270.163011][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.177822][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.186783][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.195895][ T9792] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 270.240725][ T9792] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 270.309843][ T9792] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 270.375716][ T9782] device veth0_vlan entered promiscuous mode [ 270.404178][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 270.412615][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.421515][ T9792] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 270.467625][ T9782] device veth1_vlan entered promiscuous mode [ 270.482213][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 270.490567][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.499602][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.533817][ T9778] device veth0_vlan entered promiscuous mode [ 270.566918][ T9787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.605985][ T9778] device veth1_vlan entered promiscuous mode [ 270.660345][ T9787] 8021q: adding VLAN 0 to HW filter on device team0 [ 270.687376][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 270.698820][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 270.707640][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 270.716166][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.723802][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.732294][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 270.741078][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.753687][ T9782] device veth0_macvtap entered promiscuous mode [ 270.769642][ T9782] device veth1_macvtap entered promiscuous mode [ 270.790368][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 270.798957][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 270.807985][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.816584][ T2924] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.823853][ T2924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.832956][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.861331][ T9789] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.892512][ T9785] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.902961][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 270.912328][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.926121][ T2681] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.933214][ T2681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.949942][ T9782] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 270.978591][ T9778] device veth0_macvtap entered promiscuous mode [ 270.993181][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 271.002401][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 271.016731][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 271.026589][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 271.035443][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 271.044769][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 271.059613][ T9789] 8021q: adding VLAN 0 to HW filter on device team0 [ 271.071567][ T9782] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 271.090981][ T9785] 8021q: adding VLAN 0 to HW filter on device team0 [ 271.106585][ T9778] device veth1_macvtap entered promiscuous mode [ 271.113759][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 271.122745][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.131258][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.140983][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.149918][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 271.159308][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 271.168659][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.176934][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.233321][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.257063][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.266553][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.276610][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.289033][ T2924] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.296187][ T2924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.303955][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.313610][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.322254][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.331715][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.340405][ T2924] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.347512][ T2924] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.355939][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.364896][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.373274][ T2924] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.380446][ T2924] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.388314][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.397760][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 271.407050][ T2924] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.414199][ T2924] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.423481][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 271.432083][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.440588][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 271.449015][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 271.458303][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.489156][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 271.509912][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 271.548977][ T9792] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.580672][ T9778] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 271.592033][ T9778] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.603705][ T9778] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 271.617256][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.635497][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 271.655087][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.665528][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.674341][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 271.683168][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 271.711196][ T9778] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.727467][ T9778] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.739817][ T9778] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 271.773653][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 271.795260][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 271.805510][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.813888][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.835181][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.843888][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 271.852875][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 271.867938][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 271.880456][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.898190][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 271.910384][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 271.922455][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.937812][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.949560][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 271.962070][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 271.989603][ T9789] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 272.002801][ T9789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 272.026955][ T9787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 272.035632][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 272.043697][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 272.056624][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.101638][ T9785] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 272.113243][ T9785] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 272.145706][ T9792] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.152752][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 272.163629][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.175347][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 272.194973][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.210671][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 272.293321][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 272.302817][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.313380][ T2681] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.320576][ T2681] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.342622][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.353832][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.375414][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.383106][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.396784][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.427836][ T9787] 8021q: adding VLAN 0 to HW filter on device batadv0 17:49:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r2, 0x52005) keyctl$revoke(0x3, r2) [ 272.456543][ T9789] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 272.465024][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 272.495567][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.538394][ T2717] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.545564][ T2717] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.566884][ T2717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 17:49:05 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x14) close(r2) socket$inet(0x10, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffefa6f909f7", @ANYRES32, @ANYBLOB="eaffff0af1ffffff"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) [ 272.595930][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 272.611048][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 272.627372][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 272.699950][ T9785] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 272.736142][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready 17:49:05 executing program 0: mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) gettid() r0 = gettid() capget(&(0x7f0000000400)={0x20080522, r0}, &(0x7f0000000440)) tgkill(r0, 0x0, 0x22) arch_prctl$ARCH_SET_GS(0x1001, 0x0) chdir(&(0x7f00000002c0)='./bus\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8450, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r2 = open(&(0x7f0000000480)='./bus\x00', 0x101c40, 0x50) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x40d09) [ 272.748404][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.801239][ C0] hrtimer: interrupt took 34831 ns [ 272.824718][ T9818] netlink: 2220 bytes leftover after parsing attributes in process `syz-executor.1'. [ 272.863768][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 272.873689][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 272.909891][ T27] audit: type=1804 audit(1580147346.064:31): pid=9820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir656933514/syzkaller.8ugo40/1/bus/bus" dev="sda1" ino=16525 res=1 [ 272.918840][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 272.943966][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 272.955181][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 272.965303][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 17:49:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x3, 0x1, 0x7, 0x1f, 0x0, 0x0, 0x50000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xdae, 0x2, @perf_bp={&(0x7f0000000040)}, 0x20000, 0x0, 0x5, 0x7, 0x0, 0x1f}, r1, 0x0, r0, 0x5) bind$can_raw(0xffffffffffffffff, &(0x7f00000002c0), 0x10) fanotify_init(0x0, 0x0) creat(0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c09695000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f26fb0b71d0e6adfefc41d8f7faf75e0f226bd917487960717142fa9ea4318123741c0a0e168c1886d0d4d94f2f4e345c652fbc16ee988e6e0dc8cedf3ceb9fbfbf9b0a4def23d410f6296b0db6cf529a2255b6b079e38032a8343881dcc7b1b85f453d44aeaccd3641110bec4e90a6341965c39e4b3449abe802f1ab3e89cf6c662ed4048d3b3e22278d00031e5388e85c867ddd58211d6ececb0cd2b6d357b8580218ce74e467725837074e468ee23fd2f73902ebcfcf49822775985bf31b715f5888b24efa000000000000000000e0ff00000000000000000000000000000000000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf649c3bfdbc6ec664b91a6844efdebb7b3de8f6333f6c962b9f292324b7ab7f7da31cf41ab11f12fb1e2c494034127de79f40159e800ea2474b542d35a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a74e04bde7bac7407509a4d9a485c5989b8e673e3296e52d3370688c19322b95a2315b395000000000000000000000000020a40f135429e817e01e732000000001420d1a66e9b7ff12c96cf4f5bb64a74fc10070f62b6a5c67a8c59b29adceb505c98c8dfa61fa426cc78ca0cce5989dcbb0d156d34e53531251e502cbdf73101881e6222c6eed85de58202d456a9b794c0fe5f167728867f22575e5525985d37c7e99a984ee1775b2370f0858a2adf13098b629db6009dd69916cbb5d407001dd62cadc9e23f46faf1906d6294071b19178dca12e5bd15ad4a4cad7a1f600079d6aa2005"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r2, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 272.973791][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.982833][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 272.991797][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.001497][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.010477][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.022670][ T9787] device veth0_vlan entered promiscuous mode [ 273.050666][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 273.069335][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 273.091150][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 273.107112][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 273.119969][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 273.131830][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 273.188767][ T9792] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 273.243822][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 273.262582][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.271421][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 273.286239][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 273.301722][ T9789] device veth0_vlan entered promiscuous mode [ 273.328800][ T9789] device veth1_vlan entered promiscuous mode [ 273.340860][ T9787] device veth1_vlan entered promiscuous mode 17:49:06 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x4d, 0x0, 0x0, 0x0) [ 273.355871][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 273.366116][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.389201][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.403925][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 273.412688][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 273.428531][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 273.449379][ T9785] device veth0_vlan entered promiscuous mode 17:49:06 executing program 1: mkdir(0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) gettid() capget(0x0, &(0x7f0000000440)) arch_prctl$ARCH_SET_GS(0x1001, 0x0) chdir(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1040}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x101c40, 0x50) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) [ 273.518142][ T9792] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 273.539075][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 273.554952][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 273.563118][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:49:06 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe) write$P9_RREAD(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="72000000750000670000000ee72b01782f6c097baa30d95c3128d5a2f2bc2fa0a225247df9f679b8297771a030848f7068864b2c5fb4f9f82b400eb7027b7b2a866450b009fe4190dae834fddc03f71006233ac08cfad4c4e24068a61a25bc68db6cbbe5e02587f46ff1349e6eb58caf4a76c1"], 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) [ 273.614424][ T2718] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 273.643048][ T9785] device veth1_vlan entered promiscuous mode [ 273.682942][ T27] audit: type=1804 audit(1580147346.834:32): pid=9838 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir081903931/syzkaller.OeNQGu/3/bus" dev="sda1" ino=16520 res=1 [ 273.720397][ T9787] device veth0_macvtap entered promiscuous mode [ 273.747456][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 273.763773][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 273.787824][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 273.802729][ T27] audit: type=1804 audit(1580147346.954:33): pid=9844 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir081903931/syzkaller.OeNQGu/3/bus" dev="sda1" ino=16520 res=1 17:49:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./bus\x00', &(0x7f0000000000)='cifs\x00', 0x0, &(0x7f000000a000)) [ 273.842062][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 273.873853][ T9789] device veth0_macvtap entered promiscuous mode [ 273.917653][ T9787] device veth1_macvtap entered promiscuous mode [ 273.940503][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 273.956468][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 273.981417][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 274.010320][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 274.036579][ T9789] device veth1_macvtap entered promiscuous mode [ 274.054479][ T9851] CIFS: Attempting to mount (null) [ 274.069737][ T9851] CIFS VFS: Device name not specified. [ 274.089418][ T9851] CIFS VFS: Malformed UNC in devname. [ 274.102526][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 274.119323][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 274.135051][ T9852] CIFS: Attempting to mount (null) [ 274.140763][ T9852] CIFS VFS: Device name not specified. [ 274.155433][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 274.163553][ T9852] CIFS VFS: Malformed UNC in devname. [ 274.203532][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 274.233781][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.261085][ T9785] device veth0_macvtap entered promiscuous mode [ 274.285467][ T9789] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.333237][ T9789] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.348232][ T9789] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.361527][ T9789] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.382935][ T9789] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 274.391808][ T9787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.410159][ T9787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.420177][ T9787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.430791][ T9787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.440874][ T9787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.453382][ T9787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.465884][ T9787] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 274.480499][ T9787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.491150][ T9787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.501270][ T9787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.512734][ T9787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.526269][ T9787] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 274.542705][ T9785] device veth1_macvtap entered promiscuous mode [ 274.554272][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 274.562469][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 274.571808][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 274.580982][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 274.589929][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 274.598509][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 274.607965][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 274.617052][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 274.632819][ T9789] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.644191][ T9789] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.656030][ T9789] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.667301][ T9789] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.677348][ T9789] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.688145][ T9789] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.699773][ T9789] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 274.726018][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 274.736382][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 274.776293][ T9785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.788929][ T9785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.798947][ T9785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.809846][ T9785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.819993][ T9785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.830851][ T9785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.840950][ T9785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 274.852182][ T9785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.864730][ T9785] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 274.876940][ T9785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.887705][ T9785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.897847][ T9785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.908405][ T9785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.918300][ T9785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.929524][ T9785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.939456][ T9785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 274.949914][ T9785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 274.961733][ T9785] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 274.974628][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 274.983276][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 274.992548][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 275.001406][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 275.010950][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 275.020039][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 275.029082][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 275.037331][ T2716] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 275.049628][ T9792] device veth0_vlan entered promiscuous mode [ 275.081528][ T9792] device veth1_vlan entered promiscuous mode [ 275.268745][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 275.285908][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 275.307282][ T9792] device veth0_macvtap entered promiscuous mode [ 275.378069][ T9792] device veth1_macvtap entered promiscuous mode 17:49:08 executing program 2: accept$phonet_pipe(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8000000000000, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x2, 0x3, 0x358, 0x0, 0x1f0, 0x0, 0x0, 0x0, 0x2c0, 0x2c0, 0x2c0, 0x2c0, 0x2c0, 0x3, 0x0, {[{{@uncond, 0x0, 0x190, 0x1f0, 0x0, {}, [@common=@inet=@recent0={{0xf8, 'recent\x00'}, {0x0, 0x0, 0x55, 0x0, 'syz1\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 17:49:08 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000140)) 17:49:08 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe) write$P9_RREAD(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="72000000750000670000000ee72b01782f6c097baa30d95c3128d5a2f2bc2fa0a225247df9f679b8297771a030848f7068864b2c5fb4f9f82b400eb7027b7b2a866450b009fe4190dae834fddc03f71006233ac08cfad4c4e24068a61a25bc68db6cbbe5e02587f46ff1349e6eb58caf4a76c1"], 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) [ 275.602014][ T9792] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 275.612771][ T9792] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.625644][ T9792] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 275.685306][ T9792] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.710579][ T9792] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 275.752553][ T9881] xt_recent: Unsupported userspace flags (00000055) [ 275.772589][ T9792] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.802609][ T9792] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 275.821166][ T9792] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.831381][ T9792] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 275.841947][ T9792] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.853381][ T9792] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 275.864989][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 275.877170][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 275.886380][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 275.904994][ T3032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 275.919574][ T9792] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 275.936789][ T9792] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.948087][ T9792] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 275.958993][ T9792] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.971997][ T9792] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 275.983526][ T9792] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 275.993794][ T9792] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 276.012273][ T9792] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.022643][ T9792] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 276.041715][ T9792] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 276.062583][ T9792] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 276.074556][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 276.087210][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:49:09 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r1}, 0x10) 17:49:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0xffffffffffffffdf, 0x20000800, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xffffffffffffff47, 0x0, 0x0, 0x0) 17:49:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x81) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000580)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = dup3(r0, r1, 0x0) ioctl$KVM_GET_CPUID2(r4, 0x4068aea3, &(0x7f0000000100)=ANY=[]) dup2(r5, r4) 17:49:09 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) ppoll(&(0x7f00000000c0)=[{r2}], 0x1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000140)=@abs, 0x6e) 17:49:09 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe) write$P9_RREAD(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="72000000750000670000000ee72b01782f6c097baa30d95c3128d5a2f2bc2fa0a225247df9f679b8297771a030848f7068864b2c5fb4f9f82b400eb7027b7b2a866450b009fe4190dae834fddc03f71006233ac08cfad4c4e24068a61a25bc68db6cbbe5e02587f46ff1349e6eb58caf4a76c18d0094773943549f794d2a8cb0c0c675529a91"], 0x86) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000180)={{0x7fffffff}, 0x18}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 17:49:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2f}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x3c}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) [ 276.337903][ T9900] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 17:49:09 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0xfffffff5) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 17:49:09 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = inotify_init() inotify_add_watch(r1, 0x0, 0xfe) write$P9_RREAD(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="72000000750000670000000ee72b01782f6c097baa30d95c3128d5a2f2bc2fa0a225247df9f679b8297771a030848f7068864b2c5fb4f9f82b400eb7027b7b2a866450b009fe4190dae834fddc03f71006233ac08cfad4c4e24068a61a25bc68db6cbbe5e02587f46ff1349e6eb58caf4a76c1"], 0x73) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000180)={{0x7fffffff, 0x9}, 0x18}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) [ 276.749044][ T27] audit: type=1804 audit(1580147349.904:34): pid=9912 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir448113640/syzkaller.jcFR3c/2/memory.events" dev="sda1" ino=16546 res=1 17:49:10 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x400004e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x0, 0x10}, &(0x7f0000000100)=0x18) [ 276.861451][ T27] audit: type=1804 audit(1580147350.014:35): pid=9915 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir448113640/syzkaller.jcFR3c/2/memory.events" dev="sda1" ino=16546 res=1 17:49:10 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) close(r0) 17:49:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x14, 0x4, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000040)={r2, 0x0, 0x0}, 0x20) 17:49:10 executing program 0: creat(&(0x7f0000000200)='./bus\x00', 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000240)={[{@xino_auto='xino=auto'}]}) 17:49:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r3, 0x0, 0x2) sendfile(r3, r4, 0x0, 0x40d09) 17:49:10 executing program 3: r0 = getpid() syz_open_dev$vcsa(0x0, 0x7, 0x41) sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) getpid() waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x3, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYRES16], 0x1}}, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) clone(0x41fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x10000000016, &(0x7f0000000200)) ptrace(0x10, r2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x18032, 0xffffffffffffffff, 0xc6351000) wait4(0x0, &(0x7f0000000380), 0x8, 0x0) 17:49:10 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x800002, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="80"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) creat(&(0x7f0000000100)='./bus\x00', 0x0) [ 277.392167][ T27] audit: type=1804 audit(1580147350.544:36): pid=9938 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir083002432/syzkaller.5DnTF7/5/bus" dev="sda1" ino=16543 res=1 [ 277.417748][ T9939] overlayfs: missing 'lowerdir' 17:49:10 executing program 5: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={[{@wsync='wsync'}]}) [ 277.459701][ T9942] overlayfs: missing 'lowerdir' 17:49:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r4 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r3, 0x0, 0x2) sendfile(r3, r4, 0x0, 0x40d09) [ 277.687736][ T27] audit: type=1804 audit(1580147350.844:37): pid=9960 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir083002432/syzkaller.5DnTF7/6/bus" dev="sda1" ino=16556 res=1 17:49:10 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) gettid() timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e, 0x4}, &(0x7f0000000040)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r0, 0xffffffffffffffff) write$FUSE_LSEEK(r1, &(0x7f0000000580)={0x18, 0x0, 0x0, {0x800}}, 0x18) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffbfff0000000032000000ac14140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000002000000000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff1c0004000100fbff00000000fe8000"/268], 0x4}}, 0x0) r3 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ftruncate(r3, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') socket$inet(0x2, 0x4000000000000001, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_raw(r5, &(0x7f0000000000)={0x1d, r6}, 0x10) sendfile(r5, r4, 0x0, 0xfdef) 17:49:10 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe) write$P9_RREAD(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='r'], 0x1) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) [ 277.751334][ T9954] XFS (loop5): Invalid superblock magic number 17:49:11 executing program 4: creat(&(0x7f0000000140)='./bus\x00', 0x0) r0 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000000)={0x14}, 0x14) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 17:49:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @empty}}, 0x5c) [ 277.836758][ T9943] debugfs: Directory '9943-5' with parent 'kvm' already present! 17:49:11 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) gettid() timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e}, &(0x7f0000000040)) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000580)={0x18}, 0x18) socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) r1 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ftruncate(r1, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, 0x0) bind$can_raw(r3, &(0x7f0000000000), 0x10) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) 17:49:11 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe) write$P9_RREAD(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="72000000750000670000000ee72b01782f6c097baa30d95c3128d5a2f2bc2fa0a225247df9f679b8297771a030848f7068864b2c5fb4f9f82b400eb7027b7b2a866450b009fe4190dae834fddc03f71006233ac08cfad4c4e24068a61a25bc68"], 0x60) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000180)={{0x7fffffff, 0x9}, 0x18}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) [ 278.123251][ T27] audit: type=1804 audit(1580147351.274:38): pid=9977 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir083002432/syzkaller.5DnTF7/7/bus" dev="sda1" ino=16550 res=1 17:49:11 executing program 4: creat(&(0x7f0000000140)='./bus\x00', 0x0) r0 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r0, &(0x7f0000000000)={0x14}, 0x14) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x0, 0xffffffe4}) [ 278.168027][ T9954] XFS (loop5): Invalid superblock magic number 17:49:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 17:49:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008105e00f80ecdb4cb904021d65ef0b007c05e8fe55a10a000500ac14142603000e1208001e000000812fa800090008000300e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) 17:49:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0x0, 0x0, 0x0, 0x118, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond, 0x0, 0xf8, 0x118, 0x0, {}, [@common=@inet=@socket2={{0x28, 'socket\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x60}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 17:49:11 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r1, &(0x7f0000000180)='1', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000140)) [ 278.631169][T10011] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 17:49:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r4, 0x0) sendto$inet6(r0, 0x0, 0xffffffffffffffdf, 0x20000800, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) sendto$packet(r0, &(0x7f0000000340), 0xffffffffffffff47, 0x0, 0x0, 0x0) [ 278.760313][T10016] ip6t_rpfilter: unknown options 17:49:11 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") fanotify_init(0x20, 0x0) 17:49:11 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) gettid() timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e}, &(0x7f0000000040)) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000580)={0x18}, 0x18) socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) r1 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ftruncate(r1, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, 0x0) bind$can_raw(r3, &(0x7f0000000000), 0x10) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) 17:49:12 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) gettid() timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e}, &(0x7f0000000040)) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000580)={0x18}, 0x18) socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) r1 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ftruncate(r1, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, 0x0) bind$can_raw(r3, &(0x7f0000000000), 0x10) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) 17:49:12 executing program 5: chdir(&(0x7f00000002c0)='./bus\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r1 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x40d09) 17:49:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") fanotify_init(0x20, 0x0) 17:49:12 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='erspan0\x00', 0xff89) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 17:49:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000002c0), 0x10) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000380)) creat(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f0000000000)={&(0x7f0000000180), 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000000840)=[{{&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, 0x0}}], 0x31b, 0x2, 0x0) [ 279.243992][ T27] audit: type=1804 audit(1580147352.394:39): pid=10039 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir448113640/syzkaller.jcFR3c/6/bus" dev="sda1" ino=16547 res=1 17:49:12 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec", 0x4b, 0xffffff0d, 0x0, 0x0) 17:49:12 executing program 4: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) gettid() timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e}, &(0x7f0000000040)) r0 = open(0x0, 0x141042, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[], 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000580)={0x18}, 0x18) socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) r1 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ftruncate(r1, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/crypto\x00', 0x0, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, 0x0) bind$can_raw(r3, &(0x7f0000000000), 0x10) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) 17:49:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4}}]}}, &(0x7f0000000240)=""/191, 0x32, 0xbf, 0x8}, 0x20) [ 279.425422][ T27] audit: type=1804 audit(1580147352.404:40): pid=10038 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir448113640/syzkaller.jcFR3c/6/bus" dev="sda1" ino=16547 res=1 17:49:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") fanotify_init(0x20, 0x0) 17:49:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, 'pids'}]}, 0x6) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="214e017c6f767920"], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000240)=ANY=[@ANYBLOB='@'], 0x1) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 17:49:12 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec", 0x4b, 0xffffff0d, 0x0, 0x0) [ 279.599137][ T27] audit: type=1804 audit(1580147352.434:41): pid=10042 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir448113640/syzkaller.jcFR3c/6/bus" dev="sda1" ino=16547 res=1 [ 279.608996][T10065] BPF:[1] ARRAY (anon) 17:49:12 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") fanotify_init(0x20, 0x0) [ 279.706226][T10065] BPF:type_id=4 index_type_id=4 nr_elems=0 [ 279.727144][T10065] BPF: [ 279.745006][T10065] BPF:Invalid index [ 279.768785][T10065] BPF: [ 279.768785][T10065] [ 279.797263][T10065] BPF:[1] ARRAY (anon) 17:49:13 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) sendmmsg(r0, &(0x7f0000000380)=[{{0x0, 0x0, &(0x7f0000000200)=[{0x0}, {&(0x7f0000001340)="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", 0x3cf}], 0x2}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf92a1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 279.839315][T10065] BPF:type_id=4 index_type_id=4 nr_elems=0 [ 279.872585][T10065] BPF: 17:49:13 executing program 1: socket$netlink(0x10, 0x3, 0x0) fanotify_init(0x20, 0x0) 17:49:13 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) gettid() timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e}, &(0x7f0000000040)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r0, 0xffffffffffffffff) write$FUSE_LSEEK(r1, &(0x7f0000000580)={0x18, 0x0, 0x0, {0x800}}, 0x18) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffbfff0000000032000000ac14140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000002000000000000000000000048000200656362286369706865725f6e756c"], 0x4}}, 0x0) open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_raw(r3, &(0x7f0000000000)={0x1d, r4}, 0x10) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfdef) 17:49:13 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) [ 279.889830][T10065] BPF:Invalid index [ 279.893813][T10065] BPF: [ 279.893813][T10065] 17:49:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x3c1, 0x3, 0x2f8, 0x0, 0x0, 0x0, 0x0, 0x118, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, 0x0, {[{{@uncond, 0x0, 0xf8, 0x118, 0x0, {}, [@common=@inet=@socket2={{0x5d, 'socket\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) 17:49:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) memfd_create(0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0xffffff0d, 0x0, 0x1c) 17:49:13 executing program 1: socket$netlink(0x10, 0x3, 0x0) fanotify_init(0x20, 0x0) 17:49:13 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000080)='.\x00', 0xfe) write$P9_RREAD(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="72000000750000670000000ee72b01782f6c097baa30d95c3128d5a2f2bc2fa0a225247df9f679b8297771a030848f7068864b2c5fb4f9f82b400eb7027b7b2a866450b009fe4190dae834fddc03f71006233ac08cfad4c4e24068a61a25bc68db6cbbe5e02587f46ff1349e6eb58caf4a76c18d0094773943549f794d2a8cb0c0c675529a91"], 0x86) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000180)={{0x7fffffff, 0x9}, 0x18}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) [ 280.296349][ T27] audit: type=1804 audit(1580147353.454:42): pid=10102 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir656933514/syzkaller.8ugo40/12/bus" dev="sda1" ino=16565 res=1 17:49:13 executing program 1: socket$netlink(0x10, 0x3, 0x0) fanotify_init(0x20, 0x0) 17:49:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="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"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_MASTER={0x8, 0xa, r7}]}, 0x28}}, 0x0) 17:49:13 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") fanotify_init(0x20, 0x0) [ 280.570444][T10112] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 17:49:13 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) gettid() timer_create(0x8, &(0x7f00000001c0)={0x0, 0x3e}, &(0x7f0000000040)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$binfmt_elf32(r1, &(0x7f0000000200)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup2(r0, 0xffffffffffffffff) write$FUSE_LSEEK(r1, &(0x7f0000000580)={0x18, 0x0, 0x0, {0x800}}, 0x18) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$key(0xf, 0x3, 0x2) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0000000000000000000ffffffffbfff0000000032000000ac14140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000002000000000000000000000048000200656362286369706865725f6e756c"], 0x4}}, 0x0) open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_raw(r3, &(0x7f0000000000)={0x1d, r4}, 0x10) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfdef) [ 280.651890][T10113] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 17:49:14 executing program 3: ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000080)={'syzkaller1\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) close(0xffffffffffffffff) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x4) openat$vcsu(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcsu\x00', 0x400240, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) bind$unix(r0, 0x0, 0x0) listen(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000000)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) r3 = getpid() sched_setscheduler(r3, 0x0, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) close(r4) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRESDEC, @ANYRESOCT], 0x2b) r5 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x20601, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r5, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) 17:49:14 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") fanotify_init(0x20, 0x0) 17:49:14 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000000)=0x3) write$binfmt_elf64(r0, 0x0, 0x0) 17:49:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="d800000018008105e00f80ecdb4cb904023565ef0b007c05e8fe55a10a000500ac14142603000e1208001e000000812fa800040008000300e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b7fece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703", 0xd8}], 0x1}, 0x0) 17:49:14 executing program 2: syz_open_dev$video4linux(&(0x7f0000000240)='/dev/v4l-subdev#\x00', 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) sendto$inet(r2, &(0x7f0000fa3fff), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7c, &(0x7f000059aff8), 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) ioctl$USBDEVFS_SETINTERFACE(0xffffffffffffffff, 0x80085504, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c004500a, &(0x7f0000000300)) socket$inet6(0xa, 0x40000080806, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) [ 281.059407][T10133] netlink: 'syz-executor.5': attribute type 5 has an invalid length. 17:49:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000c00), 0x4) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)}, 0x0) 17:49:14 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") fanotify_init(0x20, 0x0) [ 281.104193][T10133] netlink: 'syz-executor.5': attribute type 4 has an invalid length. 17:49:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) fanotify_init(0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r2, 0xc0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) 17:49:14 executing program 5: syz_open_dev$video4linux(&(0x7f0000000240)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) clock_gettime(0x0, 0x0) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000280)={0x72, 0x0, 0x4, 0x0, 0x81, {}, {0x1, 0x1, 0x0, 0x7b, 0x5, 0x0, "d28e23cb"}, 0x1, 0x3, @userptr, 0xf10b}) r3 = socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) r4 = dup3(r3, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_SETINTERFACE(r4, 0x80085504, &(0x7f0000000100)={0x9}) getpid() ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) socket$inet6(0xa, 0x40000080806, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) 17:49:14 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") fanotify_init(0x20, 0x0) 17:49:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[@ANYBLOB="b8000000100019050000000000000000000000003c0001002c0001001400030016f8bcd383af9b1577def13edad6b8bf14000400fe8000000000000000000000000000bb0c00020005000100000000003c0002000c00020005000100000000002c00010014000300fe88000000000000000000000000000114000400ff00000c000000000000000000000001080007000000000024000f0014000100080001007f0002007f0000010c0002000500010000000000"], 0xb8}}, 0x0) 17:49:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) getpid() r0 = fanotify_init(0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) dup2(r1, r0) [ 281.590521][T10162] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 17:49:14 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") fanotify_init(0x20, 0x0) 17:49:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet(0x2, 0x2, 0x2200000088) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0xa, &(0x7f0000000c00), 0x4) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB], 0x1}}, 0x0) 17:49:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000002c0)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000000040), 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000740)="81838ea59a01f3def2f74b864fabdfd6d9016709aa568a1dd2af7e570c81431e0fe705be1de9535af1e1520ec38fce0389a39beff538dfb438a3c93448cad104f9d66117e97aff934914e356c48414e3df401e01bd42f65e63bae1243fbd819eb3c0d4401e2d9a6d4c24f442d625e0cbbea614d2085696d3946370c4ecd2318b5b6e4ea8d18e8a9843641268a71cb4feb04dccd83672a7351545702bbbf3151d1fc2e68cfc8e4393d7d43d0dfe9fd96feb636ae44f501db5b0f651c2ea16a3b08888e63f5d43c24ef0", 0xc9, 0x20040880, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf9061a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 17:49:15 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") fanotify_init(0x20, 0x0) 17:49:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xffff00000}, {0x80000006}]}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000040)="240000001a005f0314f9f4070009040011000000ff020001000200000800040003000000", 0x24) 17:49:15 executing program 0: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x5}, 0x10) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000100), 0x10) 17:49:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="080db5055e0bcfe8478071") fanotify_init(0x20, 0x0) 17:49:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d36020a8447000b4e230f000000f0a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e232e725839c97b910000", 0x104}], 0x1) 17:49:15 executing program 5: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x40, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x5}, 0x10) 17:49:15 executing program 0: syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@fat=@gid={'gid'}}]}) 17:49:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f00000021c0)=ANY=[@ANYBLOB="0a013f2f66696c573000"], 0xa) 17:49:15 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="080db5055e0bcfe8478071") fanotify_init(0x20, 0x0) 17:49:15 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0x2, 0x0, 0x0, @local}, 0x17) 17:49:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={0x0, 0xad0659082bdef884, &(0x7f0000000180)={&(0x7f0000000000)={{0x14}, [@NFT_MSG_NEWTABLE={0x2c, 0x0, 0xa, 0x5, 0x0, 0x0, {0x0, 0x0, 0x3}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x8c, 0x3, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_COUNTERS={0x28, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x8}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x33b8}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x2}]}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x24, 0x4, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x633ddc67}, @NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x55e4cbda}]}]}], {0x14}}, 0xe0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) [ 282.512952][T10205] FAT-fs (loop0): bogus number of reserved sectors [ 282.565457][T10205] FAT-fs (loop0): Can't find a valid FAT filesystem [ 282.621871][T10205] FAT-fs (loop0): bogus number of reserved sectors [ 282.640403][T10221] general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN [ 282.652214][T10221] KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] [ 282.661317][T10221] CPU: 1 PID: 10221 Comm: syz-executor.3 Not tainted 5.5.0-rc6-next-20200116-syzkaller #0 [ 282.661613][T10205] FAT-fs (loop0): Can't find a valid FAT filesystem [ 282.671208][T10221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.671344][T10221] RIP: 0010:nft_chain_parse_hook+0x386/0xa10 [ 282.671366][T10221] Code: e8 af 9e f6 fa 41 83 fd 05 0f 87 62 05 00 00 e8 20 9d f6 fa 49 8d 7c 24 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e a6 05 00 00 44 89 e9 be 01 00 [ 282.713758][T10221] RSP: 0018:ffffc90002067100 EFLAGS: 00010206 [ 282.719850][T10221] RAX: dffffc0000000000 RBX: ffffc900020672b0 RCX: ffffc9001003d000 [ 282.727836][T10221] RDX: 0000000000000003 RSI: ffffffff867efab0 RDI: 0000000000000018 [ 282.735816][T10221] RBP: ffffc900020671f0 R08: ffff8880976e03c0 R09: 0000000000000000 [ 282.744143][T10221] R10: fffff5200040ce2f R11: ffffc9000206717f R12: 0000000000000000 [ 282.752334][T10221] R13: 0000000000000000 R14: 0000000000000000 R15: ffffc900020671c8 [ 282.760316][T10221] FS: 00007fa6f248a700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 282.769251][T10221] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 282.775853][T10221] CR2: 0000000020000100 CR3: 000000009f0f2000 CR4: 00000000001426e0 [ 282.783839][T10221] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 282.792125][T10221] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 282.800199][T10221] Call Trace: [ 282.803483][T10221] ? nf_tables_newset+0x2620/0x2620 [ 282.808750][T10221] ? nft_trans_rule_add+0x2d0/0x2d0 [ 282.814003][T10221] ? trace_hardirqs_on+0x67/0x240 [ 282.819043][T10221] nf_tables_addchain.constprop.0+0x1c1/0x1520 [ 282.825204][T10221] ? nft_chain_parse_hook+0xa10/0xa10 [ 282.830685][T10221] ? nla_strcmp+0xe3/0x120 [ 282.835130][T10221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.841378][T10221] ? nft_table_lookup+0x154/0x1b0 [ 282.846422][T10221] nf_tables_newchain+0x1033/0x1820 [ 282.851614][T10221] ? nf_tables_addchain.constprop.0+0x1520/0x1520 [ 282.858034][T10221] ? nla_memcpy+0xb0/0xb0 [ 282.862387][T10221] ? __nla_parse+0x43/0x60 [ 282.866879][T10221] nfnetlink_rcv_batch+0x8c8/0x1780 [ 282.872190][T10221] ? nf_tables_addchain.constprop.0+0x1520/0x1520 [ 282.878618][T10221] ? nfnetlink_subsys_register+0x2b0/0x2b0 [ 282.884558][T10221] ? __dev_queue_xmit+0x173f/0x35c0 [ 282.889778][T10221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.896135][T10221] ? apparmor_capable+0x4df/0x910 [ 282.901176][T10221] ? __nla_validate_parse+0x2d0/0x1ee0 [ 282.906683][T10221] ? cap_capable+0x205/0x270 [ 282.911278][T10221] ? nla_memcpy+0xb0/0xb0 [ 282.915619][T10221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.921944][T10221] ? ns_capable_common+0x93/0x100 [ 282.926964][T10221] ? __nla_parse+0x43/0x60 [ 282.931555][T10221] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 282.937380][T10221] nfnetlink_rcv+0x3e7/0x460 [ 282.941962][T10221] ? nfnetlink_rcv_batch+0x1780/0x1780 [ 282.947502][T10221] ? netlink_deliver_tap+0x248/0xbf0 [ 282.952799][T10221] netlink_unicast+0x59e/0x7e0 [ 282.958183][T10221] ? netlink_attachskb+0x870/0x870 [ 282.963301][T10221] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 282.969201][T10221] ? __check_object_size+0x3d/0x437 [ 282.974415][T10221] netlink_sendmsg+0x91c/0xea0 [ 282.979381][T10221] ? netlink_unicast+0x7e0/0x7e0 [ 282.984332][T10221] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 282.989879][T10221] ? apparmor_socket_sendmsg+0x2a/0x30 [ 282.995346][T10221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.001644][T10221] ? security_socket_sendmsg+0x8d/0xc0 [ 283.007229][T10221] ? netlink_unicast+0x7e0/0x7e0 [ 283.012243][T10221] sock_sendmsg+0xd7/0x130 [ 283.016655][T10221] ____sys_sendmsg+0x753/0x880 [ 283.021427][T10221] ? kernel_sendmsg+0x50/0x50 [ 283.026137][T10221] ? __fget_files+0x337/0x520 [ 283.030939][T10221] ? find_held_lock+0x35/0x130 [ 283.035743][T10221] ___sys_sendmsg+0x100/0x170 [ 283.040441][T10221] ? sendmsg_copy_msghdr+0x70/0x70 [ 283.045612][T10221] ? __kasan_check_read+0x11/0x20 [ 283.050683][T10221] ? __fget_files+0x359/0x520 [ 283.055520][T10221] ? do_dup2+0x4f0/0x4f0 [ 283.059764][T10221] ? __fget_light+0x1ad/0x270 [ 283.064869][T10221] ? __fdget+0x1b/0x20 [ 283.069192][T10221] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 283.075528][T10221] __sys_sendmsg+0x105/0x1d0 [ 283.080172][T10221] ? __sys_sendmsg_sock+0xc0/0xc0 [ 283.085539][T10221] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 283.091914][T10221] ? do_syscall_64+0x26/0x790 [ 283.096699][T10221] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.102770][T10221] ? do_syscall_64+0x26/0x790 [ 283.107550][T10221] __x64_sys_sendmsg+0x78/0xb0 [ 283.112635][T10221] do_syscall_64+0xfa/0x790 [ 283.117250][T10221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.123339][T10221] RIP: 0033:0x45b349 [ 283.127260][T10221] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.147661][T10221] RSP: 002b:00007fa6f2489c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 283.156265][T10221] RAX: ffffffffffffffda RBX: 00007fa6f248a6d4 RCX: 000000000045b349 [ 283.164405][T10221] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 283.172374][T10221] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 283.180359][T10221] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 283.188340][T10221] R13: 000000000000093a R14: 00000000004ca9e5 R15: 000000000075bf2c [ 283.196312][T10221] Modules linked in: [ 283.223209][T10221] ---[ end trace 61e28e40b3c8ace5 ]--- [ 283.229078][T10221] RIP: 0010:nft_chain_parse_hook+0x386/0xa10 [ 283.236267][T10221] Code: e8 af 9e f6 fa 41 83 fd 05 0f 87 62 05 00 00 e8 20 9d f6 fa 49 8d 7c 24 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e a6 05 00 00 44 89 e9 be 01 00 [ 283.257617][T10221] RSP: 0018:ffffc90002067100 EFLAGS: 00010206 [ 283.263699][T10221] RAX: dffffc0000000000 RBX: ffffc900020672b0 RCX: ffffc9001003d000 17:49:16 executing program 2: 17:49:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x0, &(0x7f0000000000)="080db5055e0bcfe8478071") fanotify_init(0x20, 0x0) 17:49:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a54000000090ac9df00000000000000000000000008000540000000280900010073797a300000000008000a40000000000900020073797a3100000000080003400000000f08000640000000000800074000000016140000001100010000000000000000000000000a252c5190326c02565734661d6729c9a465e14ed11ae4abb5c3f11115c3713f7c0341fe005e2f0e24be0be342c5cafc5e1f50e42c10c66caac2a9e3ead3fa"], 0x7c}}, 0x0) 17:49:16 executing program 5: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="2321213a0f0df805000000ef33408b93e8b647dc86c66e073f092a97ce0b70cf4aa009ff688a9fc6f7ffe5e95f67a891394ce80800c84af285c61a3656f27ffe16ccdf581f01fd7c810b3cd731cd284e96576f865e5300f16187ff87f620a99b535456a2b05a87fb85e441883ad2cb62d0ed4b47de834aadecdd8861a0c980980ec3fe2601e43d026efa090fb5c220fb4011132975cecbe07a1d881461e70fc34b5eb0729c9707aaddb10f5f8693220bf6f8b8ba344a747a5a02a9a96f6f3d44008a7f70c9136c3286483d77bbe933c78f3b29e45c94781df4f5e35fa47f14f9ce01515881f49eed0b2700"/248], 0x10094) write$binfmt_aout(r0, &(0x7f0000000240), 0x13800) [ 283.272030][T10221] RDX: 0000000000000003 RSI: ffffffff867efab0 RDI: 0000000000000018 [ 283.292020][T10221] RBP: ffffc900020671f0 R08: ffff8880976e03c0 R09: 0000000000000000 [ 283.305279][T10221] R10: fffff5200040ce2f R11: ffffc9000206717f R12: 0000000000000000 [ 283.313355][T10221] R13: 0000000000000000 R14: 0000000000000000 R15: ffffc900020671c8 17:49:16 executing program 0: 17:49:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, 0x0) fanotify_init(0x20, 0x0) [ 283.323060][T10221] FS: 00007fa6f248a700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 283.333061][T10221] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 283.352594][T10221] CR2: 00007ffe8657c5d8 CR3: 000000009f0f2000 CR4: 00000000001426e0 17:49:16 executing program 5: [ 283.367938][T10221] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 283.394554][T10221] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 17:49:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a54000000090ac9df00000000000000000000000008000540000000280900010073797a300000000008000a40000000000900020073797a3100000000080003400000000f08000640000000000800074000000016140000001100010000000000000000000000000a252c5190326c02565734661d6729c9a465e14ed11ae4abb5c3f11115c3713f7c0341fe005e2f0e24be0be342c5cafc5e1f50e42c10c66caac2a9e3ead3fa"], 0x7c}}, 0x0) [ 283.467802][T10221] Kernel panic - not syncing: Fatal exception [ 283.475901][T10221] Kernel Offset: disabled [ 283.480761][T10221] Rebooting in 86400 seconds..