Warning: Permanently added '10.128.0.129' (ECDSA) to the list of known hosts. 2020/06/29 08:33:45 fuzzer started 2020/06/29 08:33:45 dialing manager at 10.128.0.105:43109 2020/06/29 08:33:45 syscalls: 3105 2020/06/29 08:33:45 code coverage: enabled 2020/06/29 08:33:45 comparison tracing: enabled 2020/06/29 08:33:45 extra coverage: enabled 2020/06/29 08:33:45 setuid sandbox: enabled 2020/06/29 08:33:45 namespace sandbox: enabled 2020/06/29 08:33:45 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/29 08:33:45 fault injection: enabled 2020/06/29 08:33:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/29 08:33:45 net packet injection: enabled 2020/06/29 08:33:45 net device setup: enabled 2020/06/29 08:33:45 concurrency sanitizer: enabled 2020/06/29 08:33:45 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/29 08:33:45 USB emulation: enabled 2020/06/29 08:33:46 suppressing KCSAN reports in functions: 'alloc_pid' 'do_epoll_wait' 'generic_write_end' 'filemap_map_pages' '__ext4_new_inode' 08:33:50 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f02", 0x13) 08:33:50 executing program 1: set_mempolicy(0x8002, &(0x7f0000000000)=0x5, 0x6) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xe50, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe3c, 0x1, [@m_pedit={0xe38, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x1}}}]}, {0x4}}}]}]}, 0xe50}}, 0x0) syzkaller login: [ 35.763574][ T8657] IPVS: ftp: loaded support on port[0] = 21 [ 35.829317][ T8657] chnl_net:caif_netlink_parms(): no params data found [ 35.867674][ T8657] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.890232][ T8657] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.897691][ T8657] device bridge_slave_0 entered promiscuous mode [ 35.915510][ T8657] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.934930][ T8657] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.942772][ T8657] device bridge_slave_1 entered promiscuous mode [ 35.958981][ T8657] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.972879][ T8787] IPVS: ftp: loaded support on port[0] = 21 [ 35.981995][ T8657] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 08:33:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x4, 0x0, 0x0) [ 36.011789][ T8657] team0: Port device team_slave_0 added [ 36.032517][ T8657] team0: Port device team_slave_1 added [ 36.068169][ T8657] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.092505][ T8657] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.119193][ T8657] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.133433][ T8787] chnl_net:caif_netlink_parms(): no params data found [ 36.143929][ T8657] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.151875][ T8657] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 36.194957][ T8657] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.212365][ T8915] IPVS: ftp: loaded support on port[0] = 21 08:33:50 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xfffffffffffffe66, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000407097d202d47d1b000500010006"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fda, 0x0) [ 36.311572][ T8657] device hsr_slave_0 entered promiscuous mode 08:33:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x2c}}, 0x0) [ 36.380460][ T8657] device hsr_slave_1 entered promiscuous mode [ 36.462895][ T8942] IPVS: ftp: loaded support on port[0] = 21 [ 36.489157][ T8787] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.501657][ T8787] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.509305][ T8787] device bridge_slave_0 entered promiscuous mode [ 36.540745][ T8787] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.552149][ T8787] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.559570][ T8787] device bridge_slave_1 entered promiscuous mode [ 36.617423][ T8915] chnl_net:caif_netlink_parms(): no params data found [ 36.635144][ T8787] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.675108][ T9071] IPVS: ftp: loaded support on port[0] = 21 [ 36.705657][ T8787] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 08:33:51 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}]}, 0x58}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) [ 36.739453][ T8657] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 36.821324][ T8657] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 36.874702][ T8942] chnl_net:caif_netlink_parms(): no params data found [ 36.900190][ T8657] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 36.954036][ T8657] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 37.019160][ T8787] team0: Port device team_slave_0 added [ 37.026617][ T8787] team0: Port device team_slave_1 added [ 37.027779][ T9242] IPVS: ftp: loaded support on port[0] = 21 [ 37.057424][ T8915] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.065126][ T8915] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.073509][ T8915] device bridge_slave_0 entered promiscuous mode [ 37.081467][ T8915] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.088533][ T8915] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.096351][ T8915] device bridge_slave_1 entered promiscuous mode [ 37.112092][ T8787] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.119024][ T8787] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.145743][ T8787] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.164114][ T8787] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.171457][ T8787] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.198027][ T8787] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.223067][ T8915] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.237955][ T8915] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.251582][ T9071] chnl_net:caif_netlink_parms(): no params data found [ 37.290885][ T8787] device hsr_slave_0 entered promiscuous mode [ 37.329549][ T8787] device hsr_slave_1 entered promiscuous mode [ 37.369721][ T8787] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.377440][ T8787] Cannot create hsr debugfs directory [ 37.404773][ T8942] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.414448][ T8942] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.423216][ T8942] device bridge_slave_0 entered promiscuous mode [ 37.431537][ T8942] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.438567][ T8942] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.446443][ T8942] device bridge_slave_1 entered promiscuous mode [ 37.481772][ T8915] team0: Port device team_slave_0 added [ 37.497707][ T9071] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.505831][ T9071] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.513943][ T9071] device bridge_slave_0 entered promiscuous mode [ 37.522099][ T9071] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.529146][ T9071] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.537205][ T9071] device bridge_slave_1 entered promiscuous mode [ 37.548132][ T9242] chnl_net:caif_netlink_parms(): no params data found [ 37.557107][ T8942] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.567175][ T8915] team0: Port device team_slave_1 added [ 37.580929][ T8915] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.587875][ T8915] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.613907][ T8915] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.632221][ T9071] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.642170][ T8942] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.655519][ T8915] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.662491][ T8915] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.688618][ T8915] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.703025][ T9071] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.733095][ T8942] team0: Port device team_slave_0 added [ 37.748783][ T9071] team0: Port device team_slave_0 added [ 37.780943][ T8915] device hsr_slave_0 entered promiscuous mode [ 37.849245][ T8915] device hsr_slave_1 entered promiscuous mode [ 37.889117][ T8915] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 37.896670][ T8915] Cannot create hsr debugfs directory [ 37.903340][ T8942] team0: Port device team_slave_1 added [ 37.918094][ T9071] team0: Port device team_slave_1 added [ 37.931912][ T8942] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.938852][ T8942] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.965873][ T8942] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.977588][ T8942] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.984553][ T8942] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.011497][ T8942] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.025942][ T9242] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.033720][ T9242] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.041279][ T9242] device bridge_slave_0 entered promiscuous mode [ 38.052980][ T8787] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 38.121567][ T9242] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.128743][ T9242] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.136478][ T9242] device bridge_slave_1 entered promiscuous mode [ 38.153210][ T8787] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 38.270307][ T8942] device hsr_slave_0 entered promiscuous mode [ 38.319296][ T8942] device hsr_slave_1 entered promiscuous mode [ 38.378837][ T8942] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 38.386684][ T8942] Cannot create hsr debugfs directory [ 38.395783][ T9071] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.402960][ T9071] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.429934][ T9071] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.441907][ T9071] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.449229][ T9071] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.475338][ T9071] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.486416][ T8787] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 38.541498][ T8787] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 38.606483][ T9242] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.640796][ T9242] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.700309][ T9071] device hsr_slave_0 entered promiscuous mode [ 38.768842][ T9071] device hsr_slave_1 entered promiscuous mode [ 38.808650][ T9071] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 38.816205][ T9071] Cannot create hsr debugfs directory [ 38.836147][ T9242] team0: Port device team_slave_0 added [ 38.844234][ T8657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.853336][ T8915] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 38.884595][ T8915] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 38.930458][ T9242] team0: Port device team_slave_1 added [ 38.936132][ T8915] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 38.980698][ T8915] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 39.067995][ T8942] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 39.120577][ T8942] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 39.179779][ T8942] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 39.204764][ T8657] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.212808][ T9242] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.219844][ T9242] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.246410][ T9242] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.269804][ T8942] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 39.324713][ T5049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 39.332330][ T5049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.348323][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 39.356744][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.364975][ T9477] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.372012][ T9477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.379578][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 39.387868][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.396268][ T9477] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.403382][ T9477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.411036][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 39.419578][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 39.427979][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 39.436357][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 39.445049][ T9242] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.452544][ T9242] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.478864][ T9242] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.489872][ T9071] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 39.562140][ T9071] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 39.620371][ T9071] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 39.680348][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 39.688002][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 39.696230][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 39.704811][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 39.713614][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 39.721822][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.729946][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 39.738019][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.759087][ T8657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 39.766544][ T9071] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 39.869953][ T9242] device hsr_slave_0 entered promiscuous mode [ 39.918329][ T9242] device hsr_slave_1 entered promiscuous mode [ 39.968101][ T9242] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 39.975647][ T9242] Cannot create hsr debugfs directory [ 40.019243][ T8657] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 40.027478][ T5049] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 40.035590][ T5049] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 40.049598][ T8787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.061399][ T9242] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 40.113852][ T8942] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.122867][ T8915] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.132369][ T9242] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 40.199961][ T9242] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 40.249815][ T9242] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 40.289393][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.296937][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.314498][ T9071] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.326969][ T8787] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.344500][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 40.353901][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 40.362822][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 40.371568][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.380586][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.387584][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.395868][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 40.404561][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.413001][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.420077][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.427708][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 40.442524][ T9071] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.454057][ T8942] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.469820][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 40.477563][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.485566][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.494472][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.502594][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.510386][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 40.518056][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.525747][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 40.534502][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 40.543147][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 40.552551][ T8915] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.564544][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 40.573037][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 40.581793][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.590699][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.597756][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.612345][ T8787] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 40.623384][ T8787] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 40.642513][ T8657] device veth0_vlan entered promiscuous mode [ 40.649563][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 40.657409][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 40.667142][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 40.676405][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 40.686734][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.695346][ T9477] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.702520][ T9477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.711595][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 40.719976][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 40.729388][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 40.738240][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.746543][ T9477] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.753566][ T9477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.761707][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 40.770364][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 40.778598][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 40.787231][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 40.795808][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.804409][ T9477] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.812046][ T9477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.820428][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 40.829487][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 40.837668][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 40.874857][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 40.883714][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 40.892184][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 40.902028][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.910412][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 40.919796][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 40.929521][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.936547][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.944667][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 40.954220][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 40.962985][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 40.971416][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.978518][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.986882][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 40.995309][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 41.003843][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 41.012637][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 41.021529][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 41.030037][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 41.040012][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 41.048457][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 41.056822][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 41.065294][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 41.073901][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 41.082230][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.091293][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 41.099800][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 41.107110][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 41.127118][ T8915] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 41.139360][ T8915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 41.151841][ T9071] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 41.162628][ T9071] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 41.173767][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 41.181757][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 41.189856][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 41.198561][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 41.206697][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.215175][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 41.223803][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 41.232543][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 41.241232][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 41.249764][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 41.258101][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.266102][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 41.274431][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.282557][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 41.290205][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 41.299612][ T8657] device veth1_vlan entered promiscuous mode [ 41.317353][ T8942] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 41.327916][ T8942] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 41.341028][ T8787] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.350395][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 41.358755][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 41.366882][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.375200][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 41.383965][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.392716][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 41.403000][ T9242] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.428813][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 41.436169][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 41.454103][ T9071] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.467323][ T8942] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.476628][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 41.484282][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 41.491746][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.499427][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.506855][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 41.515686][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.524351][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 41.532276][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 41.542350][ T9242] 8021q: adding VLAN 0 to HW filter on device team0 [ 41.556280][ T8657] device veth0_macvtap entered promiscuous mode [ 41.569026][ T8915] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.580596][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 41.589472][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.600823][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 41.609471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.618059][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.625063][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.633268][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 41.641541][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 41.652867][ T8657] device veth1_macvtap entered promiscuous mode [ 41.673611][ T8787] device veth0_vlan entered promiscuous mode [ 41.680744][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 41.690456][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 41.699063][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.707240][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.714391][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.722523][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 41.731250][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.739795][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 41.748578][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 41.757058][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 41.765314][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.785294][ T8942] device veth0_vlan entered promiscuous mode [ 41.794301][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.803880][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.811629][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 41.821321][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 41.830046][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 41.839354][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 41.847707][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 41.855654][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.865752][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 41.874637][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.888224][ T8657] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.895545][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 41.903461][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.911234][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.918855][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 41.927585][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.943089][ T8787] device veth1_vlan entered promiscuous mode [ 41.953867][ T8915] device veth0_vlan entered promiscuous mode [ 41.965538][ T8915] device veth1_vlan entered promiscuous mode [ 41.974946][ T8657] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.983665][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 41.992037][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 42.000549][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 42.009212][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 42.017592][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 42.025768][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.034590][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 42.042697][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 42.051471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.060273][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 42.068820][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.076953][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.085403][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 42.109766][ T9242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 42.123453][ T5049] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 42.131513][ T5049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 42.140532][ T5049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 42.149124][ T5049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 42.157667][ T5049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.168855][ T8942] device veth1_vlan entered promiscuous mode [ 42.182098][ T8787] device veth0_macvtap entered promiscuous mode [ 42.192058][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 42.201139][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 42.209053][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 42.217058][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.329232][ T9071] device veth0_vlan entered promiscuous mode [ 42.346864][ T8942] device veth0_macvtap entered promiscuous mode [ 42.354443][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 42.362843][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.370439][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 42.378266][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 42.385621][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 42.393348][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 42.403071][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.411595][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 42.420159][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.429724][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 42.451580][ T9242] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 42.465037][ T9071] device veth1_vlan entered promiscuous mode [ 42.473195][ T8787] device veth1_macvtap entered promiscuous mode [ 42.509382][ T8942] device veth1_macvtap entered promiscuous mode [ 42.527626][ T8915] device veth0_macvtap entered promiscuous mode [ 42.555988][ T8787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 42.568532][ T8787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.579923][ T8787] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.592613][ T8915] device veth1_macvtap entered promiscuous mode [ 42.607423][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 42.615991][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 42.624977][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.633776][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 42.642546][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 42.653344][ T8787] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.664649][ T8787] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.675577][ T8787] batman_adv: batadv0: Interface activated: batadv_slave_1 08:33:57 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f02", 0x13) [ 42.697926][ T8915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 42.713040][ T8915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.725346][ T8915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 42.756910][ T8915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.768117][ T8915] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.778561][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 42.790429][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 42.799729][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 42.809396][ T4740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 42.868969][ T8942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 42.879683][ T8942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.889960][ T8942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 42.900738][ T8942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 08:33:57 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f02", 0x13) [ 42.911733][ T8942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 42.922520][ T8942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.934139][ T8942] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 42.943570][ T9071] device veth0_macvtap entered promiscuous mode [ 42.958463][ T8915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 42.987107][ T8915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 42.998504][ T8915] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 43.011057][ T8915] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.024725][ T8915] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 43.058661][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 43.066595][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 43.075942][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 43.084685][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 43.093230][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.102957][ T8942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 43.114352][ T8942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.124511][ T8942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 43.136022][ T8942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.145935][ T8942] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 08:33:57 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f02", 0x13) [ 43.157137][ T8942] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.158169][ T8942] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 43.307970][ T9860] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 43.317964][ T9860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.337131][ T9860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 43.345708][ T9860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 08:33:57 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f02", 0x13) 08:33:57 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f02", 0x13) [ 43.498639][ T9071] device veth1_macvtap entered promiscuous mode [ 43.508651][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 43.528300][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 43.537559][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 08:33:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x4, 0x0, 0x0) [ 43.554975][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 43.575897][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.591739][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 08:33:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x4, 0x0, 0x0) [ 43.605195][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.618072][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 43.629639][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.639857][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 08:33:58 executing program 1: set_mempolicy(0x8002, &(0x7f0000000000)=0x5, 0x6) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xe50, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe3c, 0x1, [@m_pedit={0xe38, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x1}}}]}, {0x4}}}]}]}, 0xe50}}, 0x0) 08:33:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x4, 0x0, 0x0) [ 43.651134][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.662801][ T9071] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 43.728171][ T9242] device veth0_vlan entered promiscuous mode [ 43.749879][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.768141][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.775813][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 43.798790][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 43.800330][ T9975] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.3'. [ 43.829227][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 43.848799][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.861770][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 43.879362][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.889383][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 43.900347][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.910607][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 43.921291][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.932835][ T9071] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 43.945360][ T9242] device veth1_vlan entered promiscuous mode [ 43.964912][ T5049] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 43.978120][ T5049] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 44.000914][ T5049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.193438][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 44.208465][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 44.227256][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.237949][ T9242] device veth0_macvtap entered promiscuous mode [ 44.259176][ T9242] device veth1_macvtap entered promiscuous mode [ 44.284518][ T9242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 44.297488][ T9242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.308932][ T9242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 44.320901][ T9242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.332572][ T9242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 44.343313][ T9242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.353760][ T9242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 44.364613][ T9242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.374724][ T9242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 44.386140][ T9242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.397331][ T9242] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 44.405130][ T9860] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 44.414306][ T9860] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 44.422404][ T9860] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 44.431127][ T9860] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.442519][ T9242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 44.453503][ T9242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.463667][ T9242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 44.474428][ T9242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.484487][ T9242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 44.496046][ T9242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.506908][ T9242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 44.517831][ T9242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 08:33:58 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xfffffffffffffe66, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000407097d202d47d1b000500010006"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fda, 0x0) 08:33:58 executing program 2: set_mempolicy(0x8002, &(0x7f0000000000)=0x5, 0x6) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xe50, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe3c, 0x1, [@m_pedit={0xe38, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x1}}}]}, {0x4}}}]}]}, 0xe50}}, 0x0) [ 44.527927][ T9242] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 44.538627][ T9242] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.549639][ T9242] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 44.559500][ T3918] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 44.570004][ T3918] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.648248][ T9994] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.3'. 08:33:59 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}]}, 0x58}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 08:33:59 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000cc2fed)="130000003e0005ffffe3ffbd000026180a3f02", 0x13) 08:33:59 executing program 1: set_mempolicy(0x8002, &(0x7f0000000000)=0x5, 0x6) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xe50, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe3c, 0x1, [@m_pedit={0xe38, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x1}}}]}, {0x4}}}]}]}, 0xe50}}, 0x0) 08:33:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x2c}}, 0x0) 08:33:59 executing program 2: set_mempolicy(0x8002, &(0x7f0000000000)=0x5, 0x6) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xe50, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe3c, 0x1, [@m_pedit={0xe38, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x1}}}]}, {0x4}}}]}]}, 0xe50}}, 0x0) 08:33:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x2c}}, 0x0) 08:33:59 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}]}, 0x58}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 08:33:59 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xfffffffffffffe66, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000407097d202d47d1b000500010006"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fda, 0x0) 08:33:59 executing program 1: set_mempolicy(0x8002, &(0x7f0000000000)=0x5, 0x6) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xe50, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe3c, 0x1, [@m_pedit={0xe38, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x1}}}]}, {0x4}}}]}]}, 0xe50}}, 0x0) 08:33:59 executing program 2: set_mempolicy(0x8002, &(0x7f0000000000)=0x5, 0x6) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xe50, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe3c, 0x1, [@m_pedit={0xe38, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x1}}}]}, {0x4}}}]}]}, 0xe50}}, 0x0) [ 44.946384][T10024] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.0'. 08:33:59 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xfffffffffffffe66, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000407097d202d47d1b000500010006"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fda, 0x0) 08:33:59 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x58, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8}]}]}, 0x58}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 08:33:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x2c}}, 0x0) 08:33:59 executing program 1: set_mempolicy(0x8002, &(0x7f0000000000)=0x5, 0x6) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xe50, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe3c, 0x1, [@m_pedit={0xe38, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x1}}}]}, {0x4}}}]}]}, 0xe50}}, 0x0) 08:33:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x4, 0x0, 0x0) 08:33:59 executing program 5: clock_adjtime(0x0, &(0x7f0000000140)={0x10000073d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff, 0x26bd}) 08:33:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x10fffb) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) fadvise64(r0, 0x0, 0xffff, 0x4) 08:33:59 executing program 5: clock_adjtime(0x0, &(0x7f0000000140)={0x10000073d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff, 0x26bd}) 08:33:59 executing program 1: set_mempolicy(0x8002, &(0x7f0000000000)=0x5, 0x6) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xe50, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe3c, 0x1, [@m_pedit={0xe38, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x1}}}]}, {0x4}}}]}]}, 0xe50}}, 0x0) [ 45.555042][T10054] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.3'. 08:34:00 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xfffffffffffffe66, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000407097d202d47d1b000500010006"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fda, 0x0) 08:34:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x4, 0x0, 0x0) 08:34:00 executing program 1: set_mempolicy(0x8002, &(0x7f0000000000)=0x5, 0x6) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=@newtaction={0xe50, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe3c, 0x1, [@m_pedit={0xe38, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{}, 0x1}}}]}, {0x4}}}]}]}, 0xe50}}, 0x0) [ 45.789764][T10071] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.0'. [ 46.192546][ T0] NOHZ: local_softirq_pending 08 08:34:00 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xfffffffffffffe66, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000407097d202d47d1b000500010006"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fda, 0x0) 08:34:00 executing program 5: clock_adjtime(0x0, &(0x7f0000000140)={0x10000073d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff, 0x26bd}) 08:34:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x10fffb) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) fadvise64(r0, 0x0, 0xffff, 0x4) 08:34:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x10fffb) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) fadvise64(r0, 0x0, 0xffff, 0x4) 08:34:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x4, 0x0, 0x0) 08:34:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x10fffb) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) fadvise64(r0, 0x0, 0xffff, 0x4) 08:34:00 executing program 5: clock_adjtime(0x0, &(0x7f0000000140)={0x10000073d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff, 0x26bd}) 08:34:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x10fffb) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) fadvise64(r0, 0x0, 0xffff, 0x4) 08:34:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x10fffb) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) fadvise64(r0, 0x0, 0xffff, 0x4) [ 46.368237][T10087] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.3'. 08:34:00 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xfffffffffffffe66, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="c400000004060101000000407097d202d47d1b000500010006"], 0x1}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x47fda, 0x0) 08:34:00 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) 08:34:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x10fffb) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) fadvise64(r0, 0x0, 0xffff, 0x4) [ 46.581710][ T28] audit: type=1800 audit(1593419640.994:2): pid=10104 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=22 res=0 [ 46.643933][ T28] audit: type=1804 audit(1593419641.034:3): pid=10104 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir568315027/syzkaller.uU8Au0/8/file0/bus" dev="loop5" ino=23 res=1 [ 46.643961][T10109] netlink: 168 bytes leftover after parsing attributes in process `syz-executor.0'. [ 46.699444][ T28] audit: type=1804 audit(1593419641.034:4): pid=10104 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir568315027/syzkaller.uU8Au0/8/file0/bus" dev="loop5" ino=23 res=1 08:34:01 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) 08:34:01 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) 08:34:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x10fffb) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) fadvise64(r0, 0x0, 0xffff, 0x4) 08:34:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x10fffb) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) fadvise64(r0, 0x0, 0xffff, 0x4) 08:34:01 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:34:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x10fffb) write$P9_RXATTRWALK(r0, &(0x7f0000000040)={0xf}, 0xf) fadvise64(r0, 0x0, 0xffff, 0x4) 08:34:01 executing program 4: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) 08:34:01 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) [ 47.174987][ T28] audit: type=1800 audit(1593419641.579:5): pid=10119 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=24 res=0 08:34:01 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) [ 47.242662][ T28] audit: type=1804 audit(1593419641.579:6): pid=10119 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir568315027/syzkaller.uU8Au0/9/file0/bus" dev="loop5" ino=25 res=1 [ 47.273926][ T28] audit: type=1800 audit(1593419641.619:7): pid=10128 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="loop3" ino=26 res=0 [ 47.292868][ T28] audit: type=1804 audit(1593419641.629:8): pid=10128 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir225652432/syzkaller.RxZQJA/4/file0/bus" dev="loop3" ino=27 res=1 08:34:01 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) 08:34:01 executing program 0: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) [ 47.338280][ T28] audit: type=1800 audit(1593419641.738:9): pid=10140 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=15790 res=0 08:34:01 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) 08:34:01 executing program 5: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) 08:34:01 executing program 4: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) 08:34:01 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) [ 47.484477][ T28] audit: type=1804 audit(1593419641.787:10): pid=10140 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir225652432/syzkaller.RxZQJA/5/bus" dev="sda1" ino=15760 res=1 08:34:01 executing program 0: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) [ 47.517698][ T28] audit: type=1800 audit(1593419641.787:11): pid=10137 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="loop4" ino=28 res=0 08:34:02 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) 08:34:02 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:34:02 executing program 4: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) 08:34:02 executing program 2: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) 08:34:02 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:34:02 executing program 0: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) 08:34:02 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:34:02 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) 08:34:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000140)=[{0x64}, {0x6, 0x0, 0x0, 0x7ffffff7}]}) 08:34:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) unshare(0x20000400) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 08:34:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000140)=[{0x64}, {0x6, 0x0, 0x0, 0x7ffffff7}]}) 08:34:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000140)=[{0x64}, {0x6, 0x0, 0x0, 0x7ffffff7}]}) 08:34:02 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:34:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000140)=[{0x64}, {0x6, 0x0, 0x0, 0x7ffffff7}]}) 08:34:02 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000008240)=[{{&(0x7f0000001140)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000001100)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback}}}], 0x28}}], 0x1, 0x0) 08:34:02 executing program 3: syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x40000000ffc00040, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="04000000eca40000666174000404090a0200027400f801", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x14d0c2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r4, &(0x7f0000001440)={0x8, {"000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x1000}}, 0x1006) r5 = open$dir(&(0x7f0000000100)='./bus\x00', 0x6fd091d72e90504c, 0x0) sendfile(r1, r5, 0x0, 0x7fffffa3) 08:34:03 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:34:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) unshare(0x20000400) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 08:34:03 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000008240)=[{{&(0x7f0000001140)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000001100)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback}}}], 0x28}}], 0x1, 0x0) 08:34:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) unshare(0x20000400) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 08:34:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) unshare(0x20000400) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 08:34:03 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:34:03 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000008240)=[{{&(0x7f0000001140)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000001100)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback}}}], 0x28}}], 0x1, 0x0) 08:34:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) unshare(0x20000400) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 08:34:03 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:34:03 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmmsg$inet6(r0, &(0x7f0000008240)=[{{&(0x7f0000001140)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000001100)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback}}}], 0x28}}], 0x1, 0x0) 08:34:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) unshare(0x20000400) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 08:34:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) unshare(0x20000400) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 08:34:03 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:34:03 executing program 0: r0 = socket(0x22, 0x2, 0x4) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000080)=0x6, 0x4) 08:34:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) unshare(0x20000400) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 08:34:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) unshare(0x20000400) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 08:34:03 executing program 0: r0 = socket(0x22, 0x2, 0x4) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000080)=0x6, 0x4) 08:34:03 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x204) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 08:34:03 executing program 3: r0 = socket(0x22, 0x2, 0x4) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000080)=0x6, 0x4) 08:34:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x18}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [0x4c], 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) unshare(0x20000400) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 08:34:03 executing program 0: r0 = socket(0x22, 0x2, 0x4) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000080)=0x6, 0x4) 08:34:03 executing program 3: r0 = socket(0x22, 0x2, 0x4) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000080)=0x6, 0x4) 08:34:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x69, 0x10, 0x74}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) 08:34:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a92604259bd23f92f7071a463143fb42c20e017feec42107f2e6ddbe1150296c6a6db4afa7c81b2636b1c5fbc57275c2ec"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) socket$kcm(0x2, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x5ee, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840213f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) [ 49.630253][ C0] hrtimer: interrupt took 36775 ns [ 49.687802][T10325] ================================================================== [ 49.696092][T10325] BUG: KCSAN: data-race in iptunnel_xmit / iptunnel_xmit [ 49.703269][T10325] [ 49.705598][T10325] write to 0xffff88810c9d3140 of 8 bytes by task 10321 on cpu 0: [ 49.713321][T10325] iptunnel_xmit+0x435/0x4b0 [ 49.717988][T10325] ip_tunnel_xmit+0x1099/0x11c0 [ 49.722924][T10325] ipgre_xmit+0x53e/0x590 [ 49.727871][T10325] xmit_one+0xc0/0x310 [ 49.731938][T10325] __dev_queue_xmit+0xf00/0x15a0 [ 49.737001][T10325] dev_queue_xmit+0x13/0x20 [ 49.741494][T10325] __bpf_redirect+0x56a/0x7c0 [ 49.746160][T10325] bpf_clone_redirect+0x168/0x1c0 [ 49.751426][T10325] bpf_prog_bebbfe2050753572+0x5c/0xd74 [ 49.756961][T10325] bpf_test_run+0x26d/0x4a0 [ 49.761466][T10325] bpf_prog_test_run_skb+0x463/0xb00 [ 49.766740][T10325] __do_sys_bpf+0x3898/0x9940 [ 49.771410][T10325] __x64_sys_bpf+0x3d/0x50 [ 49.775812][T10325] do_syscall_64+0x51/0xb0 [ 49.780219][T10325] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 49.786088][T10325] [ 49.788403][T10325] read to 0xffff88810c9d3140 of 8 bytes by task 10325 on cpu 1: [ 49.796020][T10325] iptunnel_xmit+0x423/0x4b0 [ 49.800596][T10325] ip_tunnel_xmit+0x1099/0x11c0 [ 49.805432][T10325] ipgre_xmit+0x53e/0x590 [ 49.809755][T10325] xmit_one+0xc0/0x310 [ 49.813816][T10325] __dev_queue_xmit+0xf00/0x15a0 [ 49.818754][T10325] dev_queue_xmit+0x13/0x20 [ 49.823345][T10325] __bpf_redirect+0x56a/0x7c0 [ 49.828008][T10325] bpf_clone_redirect+0x168/0x1c0 [ 49.833025][T10325] bpf_prog_bebbfe2050753572+0x5c/0xda8 [ 49.838556][T10325] bpf_test_run+0x26d/0x4a0 [ 49.843043][T10325] bpf_prog_test_run_skb+0x463/0xb00 [ 49.848321][T10325] __do_sys_bpf+0x3898/0x9940 [ 49.852984][T10325] __x64_sys_bpf+0x3d/0x50 [ 49.857472][T10325] do_syscall_64+0x51/0xb0 [ 49.861879][T10325] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 49.867750][T10325] [ 49.870197][T10325] Reported by Kernel Concurrency Sanitizer on: [ 49.876353][T10325] CPU: 1 PID: 10325 Comm: syz-executor.1 Not tainted 5.8.0-rc3-syzkaller #0 [ 49.885968][T10325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.896643][T10325] ================================================================== [ 49.905650][T10325] Kernel panic - not syncing: panic_on_warn set ... [ 49.912299][T10325] CPU: 1 PID: 10325 Comm: syz-executor.1 Not tainted 5.8.0-rc3-syzkaller #0 [ 49.921827][T10325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 49.931896][T10325] Call Trace: [ 49.935171][T10325] dump_stack+0x10f/0x19d [ 49.939490][T10325] panic+0x207/0x64a [ 49.943371][T10325] ? vprintk_emit+0x44a/0x4f0 [ 49.948037][T10325] kcsan_report+0x684/0x690 [ 49.952522][T10325] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 49.958099][T10325] ? iptunnel_xmit+0x423/0x4b0 [ 49.962847][T10325] ? ip_tunnel_xmit+0x1099/0x11c0 [ 49.967858][T10325] ? ipgre_xmit+0x53e/0x590 [ 49.972344][T10325] ? xmit_one+0xc0/0x310 [ 49.976596][T10325] ? __dev_queue_xmit+0xf00/0x15a0 [ 49.981782][T10325] ? dev_queue_xmit+0x13/0x20 [ 49.986446][T10325] ? __bpf_redirect+0x56a/0x7c0 [ 49.991397][T10325] ? bpf_clone_redirect+0x168/0x1c0 [ 49.996585][T10325] ? bpf_prog_bebbfe2050753572+0x5c/0xda8 [ 50.002369][T10325] ? bpf_test_run+0x26d/0x4a0 [ 50.007118][T10325] ? bpf_prog_test_run_skb+0x463/0xb00 [ 50.012560][T10325] ? __do_sys_bpf+0x3898/0x9940 [ 50.017423][T10325] ? __x64_sys_bpf+0x3d/0x50 [ 50.022012][T10325] ? do_syscall_64+0x51/0xb0 [ 50.026591][T10325] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 50.032649][T10325] ? __ip_finish_output+0x3d2/0x3e0 [ 50.037837][T10325] kcsan_setup_watchpoint+0x453/0x4d0 [ 50.043389][T10325] iptunnel_xmit+0x423/0x4b0 [ 50.047967][T10325] ip_tunnel_xmit+0x1099/0x11c0 [ 50.052801][T10325] ? ip_tunnel_xmit+0x1/0x11c0 [ 50.057570][T10325] ipgre_xmit+0x53e/0x590 [ 50.061891][T10325] xmit_one+0xc0/0x310 [ 50.066659][T10325] __dev_queue_xmit+0xf00/0x15a0 [ 50.071601][T10325] dev_queue_xmit+0x13/0x20 [ 50.075442][T10340] netlink: 126166 bytes leftover after parsing attributes in process `syz-executor.5'. [ 50.076095][T10325] __bpf_redirect+0x56a/0x7c0 [ 50.090357][T10325] bpf_clone_redirect+0x168/0x1c0 [ 50.095376][T10325] bpf_prog_bebbfe2050753572+0x5c/0xda8 [ 50.101016][T10325] ? cpa_flush+0x35d/0x440 [ 50.105421][T10325] ? find_next_bit+0xa7/0xf0 [ 50.110180][T10325] ? cpumask_next+0xc/0x30 [ 50.114679][T10325] ? __this_cpu_preempt_check+0x18/0x20 [ 50.120316][T10325] ? __perf_event_task_sched_in+0x419/0x440 [ 50.126197][T10325] ? update_load_avg+0x1ad/0x2d0 [ 50.131123][T10325] ? rb_insert_color+0x7e/0x310 08:34:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc600a00164003000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) 08:34:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x69, 0x10, 0x74}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) 08:34:04 executing program 0: r0 = socket(0x22, 0x2, 0x4) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000080)=0x6, 0x4) 08:34:04 executing program 3: r0 = socket(0x22, 0x2, 0x4) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000080)=0x6, 0x4) 08:34:04 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000080)=0x8, 0x4) mmap$xdp(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x180000000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000002180)='smaps\x00') sendfile(r4, r5, 0x0, 0xfffc) 08:34:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc600a00164003000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 50.135965][T10325] ? check_preemption_disabled+0x51/0x140 [ 50.141676][T10325] ? __list_del_entry_valid+0x54/0xc0 [ 50.147037][T10325] ? _raw_spin_unlock_irqrestore+0x53/0x70 [ 50.152839][T10325] ? rcu_preempt_deferred_qs_irqrestore+0x3e2/0x610 [ 50.159480][T10325] ? ktime_get+0x18c/0x1c0 [ 50.163901][T10325] bpf_test_run+0x26d/0x4a0 [ 50.168397][T10325] ? check_preemption_disabled+0x51/0x140 [ 50.174224][T10325] ? build_skb+0x1a3/0x260 [ 50.174671][T10343] netlink: 126166 bytes leftover after parsing attributes in process `syz-executor.5'. 08:34:04 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2e02020025000535d25a80648c63940d0424fc600a00164003000000051a82c137153e6709020f8003001700d1bd", 0x33fe0}], 0x1}, 0x0) [ 50.178632][T10325] bpf_prog_test_run_skb+0x463/0xb00 [ 50.178644][T10325] ? bpf_prog_test_run_tracing+0x3a0/0x3a0 [ 50.178657][T10325] __do_sys_bpf+0x3898/0x9940 [ 50.178670][T10325] ? tomoyo_path_number_perm+0x286/0x2d0 [ 50.178686][T10325] ? ktime_get_ts64+0x2d9/0x310 [ 50.178697][T10325] ? set_normalized_timespec64+0x104/0x130 [ 50.178749][T10325] ? check_preemption_disabled+0x51/0x140 [ 50.226862][T10325] ? debug_smp_processor_id+0x18/0x20 [ 50.232225][T10325] ? fpregs_assert_state_consistent+0x7e/0x90 [ 50.238370][T10325] __x64_sys_bpf+0x3d/0x50 [ 50.242772][T10325] do_syscall_64+0x51/0xb0 [ 50.247288][T10325] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 50.253165][T10325] RIP: 0033:0x45cb19 [ 50.257044][T10325] Code: Bad RIP value. [ 50.261091][T10325] RSP: 002b:00007f2feab97c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 50.269486][T10325] RAX: ffffffffffffffda RBX: 00000000004dad40 RCX: 000000000045cb19 [ 50.277440][T10325] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 50.286187][T10325] RBP: 000000000078bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 50.290692][T10350] netlink: 126166 bytes leftover after parsing attributes in process `syz-executor.5'. [ 50.295012][T10325] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 50.295022][T10325] R13: 000000000000005d R14: 00000000004c32bb R15: 00007f2feab986d4 [ 50.306106][T10325] Kernel Offset: disabled [ 50.326342][T10325] Rebooting in 86400 seconds..