[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 66.304345][ T27] audit: type=1800 audit(1585871696.884:25): pid=9300 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 66.325801][ T27] audit: type=1800 audit(1585871696.894:26): pid=9300 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 66.368124][ T27] audit: type=1800 audit(1585871696.894:27): pid=9300 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.49' (ECDSA) to the list of known hosts. 2020/04/02 23:55:07 fuzzer started 2020/04/02 23:55:08 dialing manager at 10.128.0.26:35359 2020/04/02 23:55:09 syscalls: 2996 2020/04/02 23:55:09 code coverage: enabled 2020/04/02 23:55:09 comparison tracing: enabled 2020/04/02 23:55:09 extra coverage: enabled 2020/04/02 23:55:09 setuid sandbox: enabled 2020/04/02 23:55:09 namespace sandbox: enabled 2020/04/02 23:55:09 Android sandbox: /sys/fs/selinux/policy does not exist 2020/04/02 23:55:09 fault injection: enabled 2020/04/02 23:55:09 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/04/02 23:55:09 net packet injection: enabled 2020/04/02 23:55:09 net device setup: enabled 2020/04/02 23:55:09 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/04/02 23:55:09 devlink PCI setup: PCI device 0000:00:10.0 is not available 23:58:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775db7b5dd2848ea12585677d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) recvmmsg(r2, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000001c0)=""/229, 0xe5}], 0x1}}], 0x1, 0x0, 0x0) 23:58:28 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x170) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000680)="ff5b93baf4715971ba778a4091bf32a5307d1aad95db841680c544d506ab1c3405176a92ebe5ce0025e269e33dba850c0edff31990e83f65d40e8aec1f8801132a4088456b3f9166215a20ce4113818fe8668752a06696602189d19eb27eeb7c7a8fe69d0e65a052a93b5c4cf71bc11c4bc0bc7fbc5637850e7cf553dc9683e2a77d09196b818171d8e2b85add4e45494bc588edfedd7bd8045fa963bdd79c6885fb32e67153a5050367a53907b55917d7f298c40364e253", 0xffffffe1) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x1, 0x2000}, 0x0) r4 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r4, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a99d58d2267958d4c5320b836f26e80fff0f48", 0x53) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) sendfile(r4, r4, &(0x7f0000000200), 0xff8) r5 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000180)='Z\x00') syzkaller login: [ 278.043009][ T9468] IPVS: ftp: loaded support on port[0] = 21 [ 278.180624][ T9468] chnl_net:caif_netlink_parms(): no params data found [ 278.285189][ T9472] IPVS: ftp: loaded support on port[0] = 21 [ 278.316482][ T9468] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.324181][ T9468] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.333593][ T9468] device bridge_slave_0 entered promiscuous mode [ 278.344642][ T9468] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.352957][ T9468] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.361365][ T9468] device bridge_slave_1 entered promiscuous mode 23:58:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x1000000000000a}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) openat$cgroup_procs(r1, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[]}}, 0x80) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000180)=""/185, 0xb9, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0xfec0) [ 278.396535][ T9468] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 278.416652][ T9468] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 278.449263][ T9468] team0: Port device team_slave_0 added [ 278.460039][ T9468] team0: Port device team_slave_1 added [ 278.491949][ T9468] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 278.505404][ T9468] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 278.568144][ T9468] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 278.604428][ T9468] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 278.618188][ T9468] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 278.658166][ T9468] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 23:58:29 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200036150, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 278.741906][ T9476] IPVS: ftp: loaded support on port[0] = 21 [ 278.747760][ T9472] chnl_net:caif_netlink_parms(): no params data found [ 278.852586][ T9468] device hsr_slave_0 entered promiscuous mode [ 278.908425][ T9468] device hsr_slave_1 entered promiscuous mode 23:58:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mlockall(0x1) r4 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x4000000000010046) [ 278.995130][ T9479] IPVS: ftp: loaded support on port[0] = 21 [ 279.096097][ T9472] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.120020][ T9472] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.128694][ T9472] device bridge_slave_0 entered promiscuous mode [ 279.192134][ T9484] IPVS: ftp: loaded support on port[0] = 21 [ 279.210279][ T9472] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.217358][ T9472] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.226092][ T9472] device bridge_slave_1 entered promiscuous mode [ 279.279377][ T9472] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 279.315688][ T9472] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 279.409286][ T9472] team0: Port device team_slave_0 added 23:58:30 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x45, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) write$cgroup_int(r3, &(0x7f0000000200), 0x43400) [ 279.470255][ T9472] team0: Port device team_slave_1 added [ 279.544599][ T9476] chnl_net:caif_netlink_parms(): no params data found [ 279.555775][ T9468] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 279.647692][ T9472] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 279.655044][ T9472] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 279.681256][ T9472] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 279.695046][ T9472] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 279.702091][ T9472] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 279.728575][ T9472] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 279.739665][ T9468] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 279.793546][ T9468] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 279.883732][ T9468] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 279.955035][ T9479] chnl_net:caif_netlink_parms(): no params data found [ 279.993500][ T9488] IPVS: ftp: loaded support on port[0] = 21 [ 280.100077][ T9472] device hsr_slave_0 entered promiscuous mode [ 280.148359][ T9472] device hsr_slave_1 entered promiscuous mode [ 280.228232][ T9472] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 280.235981][ T9472] Cannot create hsr debugfs directory [ 280.253702][ T9476] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.260889][ T9476] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.269075][ T9476] device bridge_slave_0 entered promiscuous mode [ 280.305566][ T9484] chnl_net:caif_netlink_parms(): no params data found [ 280.315793][ T9476] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.323188][ T9476] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.330983][ T9476] device bridge_slave_1 entered promiscuous mode [ 280.416436][ T9476] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 280.444613][ T9479] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.451796][ T9479] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.463219][ T9479] device bridge_slave_0 entered promiscuous mode [ 280.471918][ T9479] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.481523][ T9479] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.489560][ T9479] device bridge_slave_1 entered promiscuous mode [ 280.512163][ T9476] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 280.530614][ T9479] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 280.546032][ T9479] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 280.617980][ T9484] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.625190][ T9484] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.633319][ T9484] device bridge_slave_0 entered promiscuous mode [ 280.641628][ T9484] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.648741][ T9484] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.656486][ T9484] device bridge_slave_1 entered promiscuous mode [ 280.674115][ T9476] team0: Port device team_slave_0 added [ 280.685029][ T9476] team0: Port device team_slave_1 added [ 280.706440][ T9476] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 280.713575][ T9476] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 280.739785][ T9476] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 280.765136][ T9479] team0: Port device team_slave_0 added [ 280.774138][ T9479] team0: Port device team_slave_1 added [ 280.792241][ T9476] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 280.799719][ T9476] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 280.825751][ T9476] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 280.853844][ T9479] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 280.860865][ T9479] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 280.887285][ T9479] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 280.902277][ T9479] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 280.909279][ T9479] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 280.935233][ T9479] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 280.955888][ T9484] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 281.002052][ T9484] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 281.070058][ T9479] device hsr_slave_0 entered promiscuous mode [ 281.118445][ T9479] device hsr_slave_1 entered promiscuous mode [ 281.158181][ T9479] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 281.158211][ T9479] Cannot create hsr debugfs directory [ 281.204945][ T9472] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 281.311296][ T9476] device hsr_slave_0 entered promiscuous mode [ 281.358437][ T9476] device hsr_slave_1 entered promiscuous mode [ 281.418140][ T9476] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 281.425796][ T9476] Cannot create hsr debugfs directory [ 281.434107][ T9484] team0: Port device team_slave_0 added [ 281.448488][ T9472] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 281.511876][ T9484] team0: Port device team_slave_1 added [ 281.521550][ T9488] chnl_net:caif_netlink_parms(): no params data found [ 281.538752][ T9472] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 281.606553][ T9472] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 281.700061][ T9484] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 281.707025][ T9484] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 281.734809][ T9484] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 281.750540][ T9468] 8021q: adding VLAN 0 to HW filter on device bond0 [ 281.777599][ T9484] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 281.787712][ T9484] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 281.814401][ T9484] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 281.853221][ T9468] 8021q: adding VLAN 0 to HW filter on device team0 [ 281.880608][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 281.890340][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 281.961739][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 281.974374][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.983322][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.990487][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.999937][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 282.051720][ T9484] device hsr_slave_0 entered promiscuous mode [ 282.088330][ T9484] device hsr_slave_1 entered promiscuous mode [ 282.128183][ T9484] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 282.135746][ T9484] Cannot create hsr debugfs directory [ 282.141977][ T9488] bridge0: port 1(bridge_slave_0) entered blocking state [ 282.149289][ T9488] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.157057][ T9488] device bridge_slave_0 entered promiscuous mode [ 282.168194][ T9488] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.175272][ T9488] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.184069][ T9488] device bridge_slave_1 entered promiscuous mode [ 282.205390][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 282.217575][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 282.227275][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 282.234342][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 282.242637][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 282.292613][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 282.335532][ T9488] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 282.348897][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 282.357479][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 282.366811][ T9476] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 282.430649][ T9488] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 282.448564][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 282.456271][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 282.465254][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 282.478659][ T9476] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 282.531696][ T9476] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 282.618881][ T9488] team0: Port device team_slave_0 added [ 282.630224][ T9488] team0: Port device team_slave_1 added [ 282.637094][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 282.646337][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 282.655598][ T9476] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 282.701175][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 282.709897][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 282.733054][ T9488] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 282.740766][ T9488] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 282.767184][ T9488] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 282.789060][ T9468] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 282.812612][ T9488] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 282.825341][ T9488] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 282.852623][ T9488] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 282.879352][ T9479] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 282.922085][ T9479] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 282.986641][ T9479] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 283.086015][ T9479] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 283.191812][ T9488] device hsr_slave_0 entered promiscuous mode [ 283.238751][ T9488] device hsr_slave_1 entered promiscuous mode [ 283.278171][ T9488] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 283.285738][ T9488] Cannot create hsr debugfs directory [ 283.294894][ T9472] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.306143][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 283.314810][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 283.347384][ T9484] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 283.408960][ T9468] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 283.431299][ T9484] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 283.492356][ T9484] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 283.553196][ T9484] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 283.619582][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.627261][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.684544][ T9472] 8021q: adding VLAN 0 to HW filter on device team0 [ 283.739289][ T9476] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.765598][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.776841][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.787280][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.794450][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.802177][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 283.810848][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 283.820864][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.851264][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.861480][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.869928][ T2754] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.876962][ T2754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.913784][ T9468] device veth0_vlan entered promiscuous mode [ 283.936879][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 283.945915][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 283.954974][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 283.976955][ T9468] device veth1_vlan entered promiscuous mode [ 283.993943][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 284.001976][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 284.010128][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 284.019990][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.027657][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.035692][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 284.069052][ T9476] 8021q: adding VLAN 0 to HW filter on device team0 [ 284.092048][ T9488] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 284.157959][ T9479] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.165998][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 284.174197][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 284.183448][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 284.192103][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 284.202713][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 284.211269][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 284.219941][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.234800][ T9472] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 284.250610][ T9472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 284.260167][ T9488] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 284.303174][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 284.311696][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 284.320475][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.330591][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 284.340302][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.350862][ T2754] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.357905][ T2754] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.365905][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.373609][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.382839][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 284.391400][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 284.400475][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.409455][ T2754] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.416496][ T2754] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.438201][ T9488] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 284.485916][ T9479] 8021q: adding VLAN 0 to HW filter on device team0 [ 284.511547][ T9488] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 284.558520][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 284.567094][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 284.579492][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 284.587003][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 284.596912][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 284.606763][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 284.616651][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 284.636529][ T9468] device veth0_macvtap entered promiscuous mode [ 284.652604][ T9468] device veth1_macvtap entered promiscuous mode [ 284.664698][ T9472] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 284.679258][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 284.688577][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 284.697068][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 284.705274][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 284.714039][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 284.723091][ T3473] bridge0: port 1(bridge_slave_0) entered blocking state [ 284.730216][ T3473] bridge0: port 1(bridge_slave_0) entered forwarding state [ 284.737680][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 284.746435][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 284.757831][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 284.766369][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 284.784996][ T9484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.815973][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 284.827068][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 284.836898][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 284.847515][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 284.856460][ T2680] bridge0: port 2(bridge_slave_1) entered blocking state [ 284.863591][ T2680] bridge0: port 2(bridge_slave_1) entered forwarding state [ 284.871952][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 284.887385][ T9476] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 284.900480][ T9476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 284.917879][ T9484] 8021q: adding VLAN 0 to HW filter on device team0 [ 284.939367][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 284.947709][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 284.956887][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 284.966937][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 284.974851][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 284.982780][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 284.991767][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 285.000748][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 285.009533][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.018235][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 285.028774][ T9468] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 285.043621][ T9468] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 285.071999][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 285.081779][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 285.094435][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 285.103087][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.112009][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 285.121679][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 285.130973][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.140085][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.148701][ T3483] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.155745][ T3483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.166844][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.229045][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.237387][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.251642][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.261538][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.270838][ T2680] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.277899][ T2680] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.285727][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 285.294690][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 285.304126][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 285.311850][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 285.325159][ T9472] device veth0_vlan entered promiscuous mode [ 285.341053][ T9476] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 285.358912][ T9479] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 285.370551][ T9479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 285.382679][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 285.391242][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.400418][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 285.409227][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.417356][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 285.426264][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 285.435524][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.443955][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.452309][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 285.469317][ T9472] device veth1_vlan entered promiscuous mode [ 285.527977][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 285.536383][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 285.545037][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 285.553981][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 285.562984][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 285.571324][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.579818][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 285.588188][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.596350][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 285.605132][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.620085][ T9484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 285.701810][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 285.710845][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.788224][ T9476] device veth0_vlan entered promiscuous mode [ 285.801143][ T9488] 8021q: adding VLAN 0 to HW filter on device bond0 [ 285.814453][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 285.823419][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 285.832460][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 285.840762][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 285.884421][ T9488] 8021q: adding VLAN 0 to HW filter on device team0 [ 285.901822][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 285.922448][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 285.938276][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 285.946898][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 285.965059][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.973482][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.984870][ T9476] device veth1_vlan entered promiscuous mode [ 285.999965][ T9479] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 286.016122][ T9484] 8021q: adding VLAN 0 to HW filter on device batadv0 23:58:36 executing program 0: [ 286.041566][ T9472] device veth0_macvtap entered promiscuous mode [ 286.055865][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 286.075213][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 23:58:36 executing program 0: r0 = gettid() socket$inet6_sctp(0xa, 0x0, 0x84) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000280)='./file0\x00', 0xf1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x8404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 286.095806][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 286.104506][ T2680] bridge0: port 1(bridge_slave_0) entered blocking state [ 286.111630][ T2680] bridge0: port 1(bridge_slave_0) entered forwarding state [ 286.126810][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 286.163599][ T9472] device veth1_macvtap entered promiscuous mode [ 286.176726][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 286.204010][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 286.218791][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 286.227258][ T3475] bridge0: port 2(bridge_slave_1) entered blocking state [ 286.234389][ T3475] bridge0: port 2(bridge_slave_1) entered forwarding state [ 286.242727][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 286.252841][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 286.299226][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 286.315275][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 286.324171][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 286.334068][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 286.351134][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 286.359814][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 286.368961][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 286.377661][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.386529][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 286.395049][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 286.396754][ C0] hrtimer: interrupt took 46083 ns [ 286.403504][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 286.422199][ T9476] device veth0_macvtap entered promiscuous mode [ 286.453569][ T9472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 286.466707][ T9472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.487360][ T9472] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 286.544180][ T9488] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 286.556773][ T9488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 286.564617][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 286.572671][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.581443][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.590052][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 286.600040][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 286.609684][ T9472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.620662][ T9472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.632298][ T9472] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 286.648045][ T9479] device veth0_vlan entered promiscuous mode [ 286.655640][ T9476] device veth1_macvtap entered promiscuous mode [ 286.682714][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 286.690770][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 286.700025][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 286.708869][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 286.716994][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 286.725541][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 286.734529][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 286.783222][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 286.791613][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 286.799725][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 286.807150][ T2680] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 286.817428][ T9479] device veth1_vlan entered promiscuous mode [ 286.830299][ T9476] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 286.841515][ T9476] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.851616][ T9476] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 286.862081][ T9476] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.873617][ T9476] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 286.925708][ T9488] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 286.942244][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 286.953033][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.967797][ T9476] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 286.987661][ T9476] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 286.997720][ T9476] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 287.009255][ T9476] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.021322][ T9476] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 287.092888][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 287.101358][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 287.112469][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 287.121521][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 287.131235][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 287.139235][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 287.223916][ T9484] device veth0_vlan entered promiscuous mode [ 287.303651][ T9484] device veth1_vlan entered promiscuous mode [ 287.338714][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 287.349162][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 287.367295][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 287.379167][ T9479] device veth0_macvtap entered promiscuous mode [ 287.483719][ T9479] device veth1_macvtap entered promiscuous mode [ 287.499755][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 287.507712][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 287.516157][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 287.524395][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 287.533782][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 287.542509][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 287.551292][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 287.570659][ T9484] device veth0_macvtap entered promiscuous mode [ 287.621662][ T9484] device veth1_macvtap entered promiscuous mode [ 287.635301][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 287.645404][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 287.654422][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 287.664975][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 287.675471][ T9479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 287.688010][ T9479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.698241][ T9479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 287.708907][ T9479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.719886][ T9479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 287.730529][ T9479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.743283][ T9479] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 287.755230][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 287.765547][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 287.773674][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 287.782860][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 287.796182][ T9488] device veth0_vlan entered promiscuous mode [ 287.821743][ T9479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 287.835154][ T9479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.845478][ T9479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 287.856296][ T9479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.866217][ T9479] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 287.877436][ T9479] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.890512][ T9479] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 287.905557][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 23:58:38 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x1000000000000a}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) openat$cgroup_procs(r1, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[]}}, 0x80) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000180)=""/185, 0xb9, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0xfec0) [ 287.916883][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 287.930810][ T9484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 287.942692][ T9484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.954333][ T9484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 287.981847][ T9484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 287.997199][ T9484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 288.013099][ T9484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 288.024842][ T9484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 288.036570][ T9484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 288.051109][ T9484] batman_adv: batadv0: Interface activated: batadv_slave_0 23:58:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth1_to_bridge\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="20000000060000009d9ef2ccff82be9102df29531dc7ee33eaba5da08fbbbd6143"]}) [ 288.102927][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 288.112869][ T3483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 288.125434][ T9484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 288.139666][ T9484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 288.151802][ T9484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 288.162758][ T9484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 288.182523][ T9484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 288.193701][ T9484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:58:38 executing program 2: ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) close(0xffffffffffffffff) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) unshare(0x40000000) 23:58:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="6653405c0001d12f0000000000ae47eddc3f4912997f00000000278dd8f47d0100005ae64f8f7cd76931bc36460234432479aed75d492b41fd983f79e65199615607672c59957ab6ad602ea04db364bf68e6faa53367f05f4ad6000800002f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca42afa924edfe92175a1f0000007a08060feace34b52dde5f75a033703700006de84c6fa1a2da67d3a95563698c7e24ab45f0866f15da7f9a3effa0eda5cbf7c48dc4cd66c78c054c938810b4aa955121cc6eaea6a2f951afd29fe8b226cea0e098887bfce1904869628199", 0xe4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 288.210844][ T9484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 288.221483][ T9484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 288.233537][ T9484] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 288.290021][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 288.309415][ T2754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 288.346223][ T9565] IPVS: ftp: loaded support on port[0] = 21 [ 288.360595][ T9488] device veth1_vlan entered promiscuous mode 23:58:39 executing program 3: semop(0x0, &(0x7f0000000280)=[{0x0, 0xfff, 0x1000}, {0x0, 0xf000}, {}], 0x3) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000040)) [ 288.528560][ T9574] NFS: Device name not specified [ 288.539983][ T9575] NFS: Device name not specified 23:58:39 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x38e, 0x62, 0x0) [ 288.585748][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 288.599283][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 288.613236][ T9488] device veth0_macvtap entered promiscuous mode [ 288.691261][ T9488] device veth1_macvtap entered promiscuous mode [ 288.701004][ T9581] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:58:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x34a, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000240)={0x0, 0x11d000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000014000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000000)="440f20c0663505000000440f22c02ed80a660fc73366b9da0800000f3266b8010000000f23c80f21f866350800c0000f23f8440f20c0663502000000440f22c066b9044d564b0f32440f20c0663502000000440f22c0f7ad0f000f00d1", 0x5d}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x3e7) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 288.772380][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 288.792159][ T9583] IPVS: ftp: loaded support on port[0] = 21 [ 288.799461][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 288.809826][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 288.822536][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 288.833875][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 288.845987][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 288.856185][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 288.867080][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 288.883272][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 288.894581][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 288.899507][ T9586] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 288.915075][ T9488] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 288.936889][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 288.957232][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 288.965621][ T43] tipc: TX() has been purged, node left! [ 288.966365][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 288.980809][ T3475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 289.017882][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 289.039372][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 289.088228][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 289.101576][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 289.111850][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 289.122580][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 289.134345][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 289.144926][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 289.155128][ T9488] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 289.167144][ T9488] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 289.182062][ T9488] batman_adv: batadv0: Interface activated: batadv_slave_1 23:58:39 executing program 0: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='.\x00', 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) [ 289.329389][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 289.353936][ T3473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:58:40 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0xc00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000440)=""/149, 0x95) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60000011}) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0x200034, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1b, 0x0, 0x60}}) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f00000001c0)={0x2001}) 23:58:40 executing program 5: msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, 0x0, 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000080)=""/62) 23:58:40 executing program 3: unshare(0x2040400) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) flistxattr(r0, 0x0, 0x0) 23:58:40 executing program 0: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='.\x00', 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="0000000064b3163df08ed3367c854121cd2b1e6c585fa72c38df6e74c8497258c2cd52d125613801e86f54096f384c8a5794b05d17b3a070cb98cfedd73714d0024d392f389d92ee8c695c7bd70cb3eedb3d9865d74eff392dd5205a1c7f0b62496c98c0dcecacb38b1ad03c5d5749bdeb870d2cdf21370cd4d1c7718dc75846f7d803cebc018b4605fff2657cfc606f4a78bdef9a0b312115c5de52dbcbe775fbec2f07422e94a6342245af5887000000000000000000ab96b8412e4bbb177f0ad5663e3e9c7eff7777075680f59b65d6ef0f4fee98f728ae837d3b3cfda3a36ea3229b17f4c5b4606d2e4df041eb149eb546e63198a1b50a742a1fa8ee9a27693e4d099c14f7bb3bb0fd1a3a36b801b44ef18c9fb8f67219dfc921724cc2f80a8571361b188e8942b8e562141dc0a5a0073789b0f1a8cf"], 0x1) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 23:58:40 executing program 5: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='.\x00', 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth1_to_bridge\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="20000000060000009d9ef2ccff82be9102df29531dc7ee33eaba5da08fbbbd61"]}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) 23:58:40 executing program 3: 23:58:41 executing program 2: 23:58:41 executing program 1: 23:58:41 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x0) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0xc00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000440)=""/149, 0x95) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x60000011}) epoll_pwait(r1, &(0x7f0000000100)=[{}], 0x1, 0x200034, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1b, 0x0, 0x60}}) r3 = dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f00000001c0)={0x2001}) 23:58:41 executing program 3: 23:58:41 executing program 5: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='.\x00', 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth1_to_bridge\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="20000000060000009d9ef2ccff82be9102df29531dc7ee33eaba5da08fbbbd61"]}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) 23:58:41 executing program 0: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='.\x00', 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="0000000064b3163df08ed3367c854121cd2b1e6c585fa72c38df6e74c8497258c2cd52d125613801e86f54096f384c8a5794b05d17b3a070cb98cfedd73714d0024d392f389d92ee8c695c7bd70cb3eedb3d9865d74eff392dd5205a1c7f0b62496c98c0dcecacb38b1ad03c5d5749bdeb870d2cdf21370cd4d1c7718dc75846f7d803cebc018b4605fff2657cfc606f4a78bdef9a0b312115c5de52dbcbe775fbec2f07422e94a6342245af5887000000000000000000ab96b8412e4bbb177f0ad5663e3e9c7eff7777075680f59b65d6ef0f4fee98f728ae837d3b3cfda3a36ea3229b17f4c5b4606d2e4df041eb149eb546e63198a1b50a742a1fa8ee9a27693e4d099c14f7bb3bb0fd1a3a36b801b44ef18c9fb8f67219dfc921724cc2f80a8571361b188e8942b8e562141dc0a5a0073789b0f1a8cf"], 0x1) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 23:58:41 executing program 2: 23:58:42 executing program 2: 23:58:42 executing program 3: 23:58:42 executing program 5: 23:58:42 executing program 1: 23:58:42 executing program 4: 23:58:42 executing program 2: 23:58:42 executing program 3: 23:58:42 executing program 5: 23:58:42 executing program 0: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='.\x00', 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1) r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) r2 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES32=0x0], 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 23:58:42 executing program 4: 23:58:42 executing program 1: 23:58:42 executing program 2: 23:58:42 executing program 3: 23:58:42 executing program 4: 23:58:42 executing program 1: 23:58:42 executing program 5: 23:58:42 executing program 2: 23:58:42 executing program 3: 23:58:42 executing program 4: 23:58:42 executing program 5: 23:58:43 executing program 0: 23:58:43 executing program 1: 23:58:43 executing program 2: 23:58:43 executing program 4: 23:58:43 executing program 3: 23:58:43 executing program 5: 23:58:43 executing program 5: 23:58:43 executing program 1: 23:58:43 executing program 2: 23:58:43 executing program 4: 23:58:43 executing program 3: 23:58:43 executing program 0: 23:58:43 executing program 2: 23:58:43 executing program 4: 23:58:43 executing program 3: 23:58:43 executing program 5: 23:58:43 executing program 0: 23:58:43 executing program 1: 23:58:43 executing program 4: 23:58:44 executing program 2: 23:58:44 executing program 3: 23:58:44 executing program 5: 23:58:44 executing program 0: 23:58:44 executing program 1: 23:58:44 executing program 4: 23:58:44 executing program 2: 23:58:44 executing program 0: 23:58:44 executing program 3: 23:58:44 executing program 5: 23:58:44 executing program 1: 23:58:44 executing program 4: 23:58:44 executing program 2: 23:58:44 executing program 0: 23:58:44 executing program 5: 23:58:44 executing program 1: 23:58:44 executing program 3: 23:58:44 executing program 4: 23:58:44 executing program 1: 23:58:44 executing program 5: 23:58:44 executing program 2: 23:58:44 executing program 3: 23:58:44 executing program 4: 23:58:44 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x8800000) creat(&(0x7f00000000c0)='./file0\x00', 0x6d) 23:58:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x6, 0x0, 0x0, 0x10000017}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x3, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb920888ba4784466ebedb0400060000000000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce96477e96a1b651d2d3405a8e1ae68541484f993adb8fe151d28dfa5c132d07519db532efed97d204c71e21aa7a3f20c799086b421437617adaed844c064697c25f85e4a714d7382902c98a523c490fac8ebbc0660d04a4822ad8c5d9717f63ca7a5a690c067ef"], 0x79) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) socket$bt_hidp(0x1f, 0x3, 0x6) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 23:58:45 executing program 1: mkdirat(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() accept4(0xffffffffffffffff, 0x0, 0x0, 0x80000) bind$packet(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x6, 0x0, 0x0, 0x10000017}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x3, 0x0, 0x6}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="230228efb4a24fe846892bc04b26c0d8d21d5d6fe0eb920888ba4784466ebedb0400060000000000004c8897c1d1ede6c1f37b9c352ef85800004380a8cf359a30a74dc68c37cfbef5c16f3e648860faf8228bf63bb3bf08002a74e3e6017fe72e8d5b7cc2cba5236e1882c601f2b49e32098f6919c7234ce96477e96a1b651d2d3405a8e1ae68541484f993adb8fe151d28dfa5c132d07519db532efed97d204c71e21aa7a3f20c799086b421437617adaed844c064697c25f85e4a714d7382902c98a523c490fac8ebbc0660d04a4822ad8c5d9717f63ca7a5a690c067ef"], 0x79) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) socket$bt_hidp(0x1f, 0x3, 0x6) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 23:58:45 executing program 2: pipe(&(0x7f0000000440)) semget$private(0x0, 0x6, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="8c", 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000040)='./file1\x00', 0x143042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d1) setsockopt(r2, 0x1, 0x20, &(0x7f0000000340)="b5057018", 0x4) keyctl$session_to_parent(0x12) socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) 23:58:45 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) getpeername$packet(r0, 0x0, &(0x7f0000000040)) sendto$packet(0xffffffffffffffff, &(0x7f0000000480)="a98cbce63e913b12a5245ff57d77cafce14d5221e4b54d30969a426fb33fdca6581ad02691644992c6e6af9b1469571f6040fedc761b82b07890d641fb53e63b6b99a1a9473f23d3b4144ca91ec7ab3f323746309824c366fd888aeecfaaa407259858f7161829cdb0", 0x69, 0x0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x20, 0x6, @local}, 0x14) r1 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r2 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) mkdirat(r2, 0x0, 0x0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000080)) ftruncate(r3, 0x208200) write$ppp(0xffffffffffffffff, &(0x7f00000001c0)="b1", 0x1) sendfile(r1, r2, 0x0, 0x8482) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="a891ce22cb332a5708b330fbee6bf9cbe3870b7b02c3f94446deb71a0e20132a4a9ca1d18591c44244777b7a7cede57d67c91f5ddefe8b3f2c93fef802024aefd94d2af6d242696861c07ab024b253e5dc31d0c66b5303b0e2decd4cfb566df84201e3f696de0a3c1ff755efa6ea19193fb45b1b93fae56164c00f9b3de19a5b78dcb6b7478b22f849f10400000000000004521e9053041de56927990000000000000057b3b613b8d2e3a0ae2be67d4e8759713763eeb5c8f3a47bdb90c49bd2245cf25c388417b5b36f52a85f2e9f36a2545411a55f7603881347a56ab82315646b6d28ed1dd78e14253b88b6c7db4e2f3536b42d87c07c2fe91918dc363a8130f52b269e0000c63d4fdd2f9ab2ffcbb71734aca28721419b98ae3cb70169c8e88953fa4fc0a3d46d26bce72e1be9620a2eb2f8ccfd96cf10af586a6b684e22bce4c81a41eef29b8177663f4345feab681eea899e"], 0x155) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) r4 = request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) request_key(0x0, &(0x7f0000000100)={'syz'}, 0x0, r4) [ 294.444992][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 294.445004][ T27] audit: type=1800 audit(1585871925.024:31): pid=9779 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16551 res=0 23:58:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)={0x20, 0x2, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 23:58:45 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000200)='\xf4y6\xce\xaa#\x9d\xc6\xa6\x03\"H\xbaa\xbf\xae\x05\xe8\xd9\xadwJ\xf7m\xeb\x8b\x1c\xea\xa57\xb2u\x90\xd8\xd1\xc1\xf4\x12\f\x86\x9b\xa9\xd5\xfd\xff,\xb8\xcf\xba\x12\xd7\xc2\x1d\xb4\x85>YN\x19\xe2\xabM\xad\xe4\x14\x0f\xc5\xa4}\xfcdV\'X\xf3\xc5p\xee\xf9+\x1e\x96%8\xe7\xf49\x89\xff\xdb\x03[p\x8a\x87Q\xde,\x11\x90\xb1\xb3\xce\xbb\xdca\xc2\xca\x06\x00\x00\x00\xd3\xf9\xb09\xba&\x96\x18\xb1i\xdf\xa2\xc4\x05\xdc*I\xdb\xb5\x8c\xf1\xd8{\xed\xc1\xa2Qm\xa0+\x06\x9f\xa5;V\x96:\x02\xedN\x89\x97\xb8\x90}N\xc5\x8fu\x1d\x7fW\n\xe44', 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffba, 0x0, 0x0, 0xb2) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x0) [ 294.668245][ T27] audit: type=1800 audit(1585871925.154:32): pid=9779 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16551 res=0 23:58:45 executing program 4: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x2007fff) r1 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000001300)='./bus\x00', 0xa402, 0x0) sendfile(r1, r2, 0x0, 0x8482) [ 294.833764][ T9797] ptrace attach of "/root/syz-executor.1"[9795] was attempted by "/root/syz-executor.1"[9797] 23:58:45 executing program 0: pipe(&(0x7f0000000440)) semget$private(0x0, 0x6, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="8c", 0x1) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) r3 = open(&(0x7f0000000040)='./file1\x00', 0x143042, 0x0) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d1) setsockopt(r2, 0x1, 0x20, &(0x7f0000000340)="b5057018", 0x4) keyctl$session_to_parent(0x12) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) [ 294.907221][ T27] audit: type=1800 audit(1585871925.484:33): pid=9800 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16567 res=0 23:58:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66731f66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x0, 0x2) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffa) write$FUSE_NOTIFY_STORE(r1, 0x0, 0x0) 23:58:45 executing program 2: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x2007fff) r1 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000001300)='./bus\x00', 0xa402, 0x0) sendfile(r1, r2, 0x0, 0x8482) [ 295.109011][ T27] audit: type=1800 audit(1585871925.694:34): pid=9819 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16574 res=0 23:58:45 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/renderD128\x00', 0x4001, 0x0) [ 295.199732][ T27] audit: type=1800 audit(1585871925.694:35): pid=9824 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16574 res=0 [ 295.392697][ T27] audit: type=1804 audit(1585871925.944:36): pid=9827 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir566717011/syzkaller.3hwIF1/19/file0/bus" dev="loop3" ino=23 res=1 23:58:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x4, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0x2e, 0x2e, 0x5f, 0x600005f, 0x2, 0x5f, 0x5f, 0x52, 0x5f, 0x5f, 0x5f]}, 0x40) r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001700)='nl80211\x00') sendmsg$NL80211_CMD_STOP_AP(r3, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000180)={0x10001, 0x0, 0x0, 0x9}, 0x10) ptrace(0x10, r2) wait4(0x0, 0x0, 0x0, 0x0) 23:58:46 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x1000, 0x0) 23:58:46 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) lseek(r0, 0x4200, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x7ff, &(0x7f0000000380)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffb) fdatasync(r1) 23:58:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) socket$nl_audit(0x10, 0x3, 0x9) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f00000004c0)={0x38, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000000, 0x40000000011, r3, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x4) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) [ 295.655228][ T9846] ptrace attach of "/root/syz-executor.5"[9844] was attempted by "/root/syz-executor.5"[9846] [ 295.694421][ T27] audit: type=1800 audit(1585871926.274:37): pid=9832 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16569 res=0 23:58:46 executing program 2: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x2007fff) r1 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000001300)='./bus\x00', 0xa402, 0x0) sendfile(r1, r2, 0x0, 0x8482) 23:58:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ppoll(&(0x7f0000000140)=[{r2, 0x61}], 0x1, &(0x7f00000001c0)={0x0, r3+30000000}, 0x0, 0x0) [ 295.771056][ T9854] ptrace attach of "/root/syz-executor.5"[9853] was attempted by "/root/syz-executor.5"[9854] [ 295.786271][ T27] audit: type=1800 audit(1585871926.314:38): pid=9843 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16569 res=0 [ 295.864821][ T27] audit: type=1804 audit(1585871926.374:39): pid=9850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir056743861/syzkaller.v0i0Cq/14/bus" dev="sda1" ino=16570 res=1 23:58:46 executing program 5: mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) ftruncate(r0, 0x2007fff) r1 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001280), 0x0) r2 = open(&(0x7f0000001300)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8482) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) writev(0xffffffffffffffff, 0x0, 0x0) 23:58:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/unix\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 296.160240][ T27] audit: type=1804 audit(1585871926.644:40): pid=9839 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir566717011/syzkaller.3hwIF1/19/file0/bus" dev="loop3" ino=23 res=1 23:58:46 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) 23:58:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='uid_map\x00') write$P9_RRENAMEAT(r0, 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000200)={0x30, 0x5, 0x0, {0x0, 0x3, 0x5, 0xa74}}, 0x30) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x60, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000140)='./file0\x00', 0x1050c2, 0x0) r4 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x80200, 0x0) write(r3, &(0x7f0000000600)="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", 0x200) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_opaque(r5, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xd}, 0x0, 0x0, 0x6, 0x8, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000001c0)=@v2={0x2, @aes128, 0x1, [], "62d9480b4f2e92a14215dad923b78271"}) sendfile(r3, r4, 0x0, 0xa195) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) 23:58:46 executing program 3: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000d00)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) write$input_event(r1, &(0x7f0000000000)={{0x77359400}}, 0xfe4f) 23:58:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x62, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x1050c2, 0x0) r1 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0xa195) [ 296.599218][ T9897] input: syz1 as /devices/virtual/input/input5 23:58:47 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000280)) sched_setaffinity(0x0, 0xfffffffffffffff5, &(0x7f0000000000)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0/file0\x00', 0x121002, 0x98) accept$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {0x1, 0x4}, [{}, {0x2, 0x1, r2}], {}, [{}], {0x10, 0x2}, {0x20, 0x2}}, 0x3c, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000002c0)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getgroups(0x2, &(0x7f0000000540)=[0x0, 0x0]) 23:58:47 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff5, &(0x7f0000000000)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0/file0\x00', 0x121002, 0x98) accept$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010004000000000002000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0403f7d5abadd9ee4aa90000", @ANYRES32=0x0, @ANYBLOB="10000200000000002000020000000000"], 0x6, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) chdir(&(0x7f0000000100)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000002c0)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000600)='./file0/file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getgroups(0x0, 0x0) [ 296.769900][ T9897] input: syz1 as /devices/virtual/input/input6 23:58:47 executing program 1: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000018c0)=""/246) memfd_create(0x0, 0x0) process_vm_readv(0x0, &(0x7f0000000680)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000600)=""/26, 0x1a}], 0x4, &(0x7f00000007c0)=[{0x0}, {&(0x7f00000001c0)=""/45, 0x2d}, {0x0}, {&(0x7f0000000540)=""/157, 0x9d}], 0x4, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x1ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30480, 0x10000c, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) write$P9_RSYMLINK(r1, &(0x7f0000000040)={0x14, 0x11, 0x0, {0x80, 0x4, 0x3}}, 0x14) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='scalable\x00', 0x9) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x40, 0x4000) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000300)=""/187) r4 = socket$inet(0x2, 0x3, 0x81) sendmmsg(r4, &(0x7f0000005c00)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @multicast2}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000240)={0x7, 'veth0_to_bond\x00', {0x4}, 0x7}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x14) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="f800000017000101000000000000000004000000e40011800c000000000000000000000008000400", @ANYRES32=0x0, @ANYBLOB="a19441714bf9b3bc95914e5e19b0f04cd8cdf6a227bd268215389d4f6b9709c7ccb690a363567db0609ceb70119898d46ddccfae44a936a92241310e5bf5eea6d3435a2839a55b4414484b44f5c318dbe8bb03ce18ac142bff12fbc9810c43fe0ec2cd131528aa8651ef98b108007e00", @ANYRES32=0x0, @ANYBLOB="4d000000439bbfd37acb1e4d64552024c7a0fc0f3acf47a8864b17dc51ac36635882021f00093cf6a7edcbed94a2a51a3a2954f331bcbd3e054123d5f0cf9c76489fc46953c45ed0817cebfa4600050000001c06cd5700", @ANYRES32=0x0, @ANYBLOB], 0xf8}}, 0x4040) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x7, 0x21, 0x1}, 0x7) 23:58:47 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(r0, 0x0, r1, 0x0, 0x4ffe0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Z\x04\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86/\x9f\x8f\xc0)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000200)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, 0x0, 0x20000102000007) 23:58:47 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r2}]}}}]}, 0x38}}, 0x0) r3 = creat(&(0x7f0000000100)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000340)={0x1}) ftruncate(r3, 0x5) getdents64(r3, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:58:47 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x100000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40c03}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0xfffb) fallocate(r0, 0x8, 0x0, 0x8000) write$9p(r0, &(0x7f0000000c40)="180636072c96", 0x6) syz_read_part_table(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getpgid(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4004}, 0x0, 0xd, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) flistxattr(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, 0x0, &(0x7f0000000240)) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000680), 0x0, 0xb6}], 0x0, 0x0) 23:58:47 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x404, 0x0, 0x0, 0x0, 0x206}}], 0x1, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udp6\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x4c00) 23:58:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) 23:58:47 executing program 4: socket$key(0xf, 0x3, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) keyctl$revoke(0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001015050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000004bc0)=ANY=[@ANYBLOB='$\x00'/20, @ANYRES32, @ANYBLOB='\x00'/12], 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xc4, 0x0, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @ETHTOOL_A_LINKMODES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x4008400}, 0x4000405) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:58:48 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) 23:58:48 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xa) close(r2) socket(0x10, 0x3, 0x6) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000040)="f98ac693ce6908", 0x7}], 0x1) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="40010000100013070000000000000000fe800000000000000000eaffffffffbaff01000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414bb0000000000000000000000000000000032000000ff020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e756c6c290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008001d"], 0x4}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 23:58:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 297.846299][ T9937] device sit1 entered promiscuous mode 23:58:48 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='uid_map\x00') write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x60, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x1050c2, 0x0) r2 = open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, 0x0) sendfile(r1, r2, 0x0, 0xa195) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) [ 297.992845][ T9969] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 23:58:48 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x8000000) [ 298.343829][ T9982] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 23:58:49 executing program 1: openat$thread_pidfd(0xffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x181080, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) exit_group(0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1a9bc2, 0x88) r2 = memfd_create(&(0x7f0000000100)='/s\xcb2\x1d\b\x00\xe8\xdc[\x17\x8b\xb2\xf7W\xf0hW\xdd\xbd\xc8k\xc0\xa5velindf\r(\x90\xe0\xe0\r\xa6R\xb4\xb8\xa1\x98\xb43\xa7,\xa6<\x13\xfe\xa8\xc3\x01\xbd\x96:\xe2\x13\x02\xfaw\xaa\xef\x96\xfbi\xf8\x00\bbQ\xd8gC\xb2-\xa1s\xeb\x0f\x8e\xe93\xf2\xd6\x03\'\xb0(\x8f\xaf\f7\n$\x03\x89\xf7\xb6\xcd\xd0\xd2\x86i\xb6o\x9e\x1e\xad\x18j\x8f\x9b\xd1\x8a\xda\\;\xb6\xf4\'y\x1f?\xc5\x90\xcc\xe9\xdc\xa7\a\xe2J', 0x0) ftruncate(r2, 0x40003) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 23:58:49 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000140)=ANY=[]) 23:58:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000180)={0xf}, 0xf) 23:58:49 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r2}]}}}]}, 0x38}}, 0x0) r3 = creat(&(0x7f0000000100)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000340)={0x1}) ftruncate(r3, 0x5) getdents64(r3, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:58:49 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000180)={0xf}, 0xf) 23:58:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x102010800000011, 0x2, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) dup3(r0, r1, 0x80000) 23:58:49 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xa2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$poke(0x9, r1, 0x0, 0x0) 23:58:49 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:58:49 executing program 3: openat$thread_pidfd(0xffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x181080, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) exit_group(0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1a9bc2, 0x88) r2 = memfd_create(&(0x7f0000000100)='/s\xcb2\x1d\b\x00\xe8\xdc[\x17\x8b\xb2\xf7W\xf0hW\xdd\xbd\xc8k\xc0\xa5velindf\r(\x90\xe0\xe0\r\xa6R\xb4\xb8\xa1\x98\xb43\xa7,\xa6<\x13\xfe\xa8\xc3\x01\xbd\x96:\xe2\x13\x02\xfaw\xaa\xef\x96\xfbi\xf8\x00\bbQ\xd8gC\xb2-\xa1s\xeb\x0f\x8e\xe93\xf2\xd6\x03\'\xb0(\x8f\xaf\f7\n$\x03\x89\xf7\xb6\xcd\xd0\xd2\x86i\xb6o\x9e\x1e\xad\x18j\x8f\x9b\xd1\x8a\xda\\;\xb6\xf4\'y\x1f?\xc5\x90\xcc\xe9\xdc\xa7\a\xe2J', 0x0) ftruncate(r2, 0x40003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0xf2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$void(0xffffffffffffffff, 0x5450) sendfile(r1, r2, 0x0, 0x2008000fffffffe) [ 298.971491][T10013] ptrace attach of "/root/syz-executor.5"[9488] was attempted by "/root/syz-executor.5"[10013] 23:58:49 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x11, 0x800000003, 0x8) bind(0xffffffffffffffff, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getpid() r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200), 0xc, 0x0}, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) 23:58:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'sit0\x00', 0x0}) shmdt(0x0) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000100)=0x6, 0x4) bind$packet(r0, &(0x7f0000000200)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) [ 299.088709][T10000] device sit2 entered promiscuous mode [ 299.300596][T10013] ptrace attach of "/root/syz-executor.5"[9488] was attempted by "/root/syz-executor.5"[10013] 23:58:49 executing program 0: syz_emit_ethernet(0x76, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x40, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}], "00006558000000ff"}}}}}}}, 0x0) 23:58:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x10000, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x2) 23:58:50 executing program 0: syz_emit_ethernet(0x76, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x40, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}], "00006558000000ff"}}}}}}}, 0x0) 23:58:50 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0x1ff) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 23:58:50 executing program 5: openat$thread_pidfd(0xffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x181080, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) exit_group(0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1a9bc2, 0x88) r2 = memfd_create(&(0x7f0000000100)='/s\xcb2\x1d\b\x00\xe8\xdc[\x17\x8b\xb2\xf7W\xf0hW\xdd\xbd\xc8k\xc0\xa5velindf\r(\x90\xe0\xe0\r\xa6R\xb4\xb8\xa1\x98\xb43\xa7,\xa6<\x13\xfe\xa8\xc3\x01\xbd\x96:\xe2\x13\x02\xfaw\xaa\xef\x96\xfbi\xf8\x00\bbQ\xd8gC\xb2-\xa1s\xeb\x0f\x8e\xe93\xf2\xd6\x03\'\xb0(\x8f\xaf\f7\n$\x03\x89\xf7\xb6\xcd\xd0\xd2\x86i\xb6o\x9e\x1e\xad\x18j\x8f\x9b\xd1\x8a\xda\\;\xb6\xf4\'y\x1f?\xc5\x90\xcc\xe9\xdc\xa7\a\xe2J', 0x0) ftruncate(r2, 0x40003) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x0, 0xf2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$void(0xffffffffffffffff, 0x5450) sendfile(r1, r2, 0x0, 0x2008000fffffffe) 23:58:50 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f00000001c0)="0f0147d1d1861900000f23c80f21f8350000e0000f23f8b9190b0000b8ba690000ba000000000f308fe938028d2f000000f30f2cc0b805000000e0a264df0f013a66ba4300ecc744240000000000c7442402bc0c0000c7442406000000000f011c24c4c11972d000", 0x68}], 0x1, 0x1, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f00000002c0)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x3da, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000000)={0x34, 0x1, 0x3, 0xfffffff8}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000100)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 23:58:50 executing program 4: syz_mount_image$msdos(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x1000) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 23:58:50 executing program 0: syz_emit_ethernet(0x76, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x40, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}], "00006558000000ff"}}}}}}}, 0x0) [ 300.086432][ T27] kauditd_printk_skb: 12 callbacks suppressed [ 300.086445][ T27] audit: type=1804 audit(1585871930.664:53): pid=10055 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir566717011/syzkaller.3hwIF1/26/bus" dev="sda1" ino=16595 res=1 23:58:50 executing program 0: syz_emit_ethernet(0x76, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x40, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}], "00006558000000ff"}}}}}}}, 0x0) [ 300.253463][ T27] audit: type=1804 audit(1585871930.804:54): pid=10068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir404049208/syzkaller.nFxxDo/24/bus" dev="sda1" ino=16605 res=1 23:58:51 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 23:58:51 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="8c000000122bb627de6a875420000000000000000000000000000000000000000000000000000000000000000000000000000200000000004721597fc1b7b7d53839ef011988f80e9020eaa7fc08751a79dcab1b4d"], 0x1}}, 0x0) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3772", 0xff7c}], 0x1) 23:58:51 executing program 1: 23:58:51 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 23:58:51 executing program 5: [ 300.872019][ T27] audit: type=1804 audit(1585871931.454:55): pid=10084 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir566717011/syzkaller.3hwIF1/26/bus" dev="sda1" ino=16595 res=1 23:58:51 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) [ 301.138932][ T27] audit: type=1804 audit(1585871931.624:56): pid=10094 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir404049208/syzkaller.nFxxDo/24/bus" dev="sda1" ino=16605 res=1 23:58:51 executing program 3: 23:58:51 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x38, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [], "00006558000000ff"}}}}}}}, 0x0) 23:58:51 executing program 1: [ 301.138961][ T27] audit: type=1804 audit(1585871931.624:57): pid=10096 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir404049208/syzkaller.nFxxDo/24/bus" dev="sda1" ino=16605 res=1 23:58:51 executing program 4: 23:58:51 executing program 5: [ 301.138984][ T27] audit: type=1800 audit(1585871931.684:58): pid=10090 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16595 res=0 23:58:51 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x38, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [], "00006558000000ff"}}}}}}}, 0x0) 23:58:51 executing program 1: 23:58:52 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="8c000000122bb627de6a875420000000000000000000000000000000000000000000000000000000000000000000000000000200000000004721597fc1b7b7d53839ef011988f80e9020eaa7fc08751a79dcab1b4d"], 0x1}}, 0x0) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3772", 0xff7c}], 0x1) 23:58:52 executing program 5: 23:58:52 executing program 3: 23:58:52 executing program 1: 23:58:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x38, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [], "00006558000000ff"}}}}}}}, 0x0) 23:58:52 executing program 4: 23:58:52 executing program 3: 23:58:52 executing program 1: 23:58:52 executing program 0: syz_emit_ethernet(0x76, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x40, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing], "00006558000000ff"}}}}}}}, 0x0) 23:58:52 executing program 5: 23:58:52 executing program 4: 23:58:52 executing program 3: 23:58:52 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="8c000000122bb627de6a875420000000000000000000000000000000000000000000000000000000000000000000000000000200000000004721597fc1b7b7d53839ef011988f80e9020eaa7fc08751a79dcab1b4d"], 0x1}}, 0x0) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3772", 0xff7c}], 0x1) 23:58:52 executing program 1: 23:58:52 executing program 4: 23:58:52 executing program 0: syz_emit_ethernet(0x76, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x40, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing], "00006558000000ff"}}}}}}}, 0x0) 23:58:52 executing program 5: 23:58:52 executing program 3: 23:58:52 executing program 5: 23:58:52 executing program 4: 23:58:52 executing program 1: 23:58:52 executing program 3: 23:58:52 executing program 0: syz_emit_ethernet(0x76, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x40, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing], "00006558000000ff"}}}}}}}, 0x0) 23:58:53 executing program 5: 23:58:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="8c000000122bb627de6a875420000000000000000000000000000000000000000000000000000000000000000000000000000200000000004721597fc1b7b7d53839ef011988f80e9020eaa7fc08751a79dcab1b4d"], 0x1}}, 0x0) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3772", 0xff7c}], 0x1) 23:58:53 executing program 4: 23:58:53 executing program 1: 23:58:53 executing program 3: 23:58:53 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x38, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}]}}}}}}}, 0x0) 23:58:53 executing program 5: 23:58:53 executing program 4: 23:58:53 executing program 5: 23:58:53 executing program 3: 23:58:53 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x38, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}]}}}}}}}, 0x0) 23:58:53 executing program 1: 23:58:53 executing program 1: 23:58:53 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3772", 0xff7c}], 0x1) 23:58:53 executing program 4: 23:58:53 executing program 5: 23:58:53 executing program 3: 23:58:53 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x38, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}]}}}}}}}, 0x0) 23:58:53 executing program 1: 23:58:53 executing program 5: 23:58:53 executing program 1: 23:58:53 executing program 0: syz_emit_ethernet(0x72, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x3c, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}], '\x00\x00eX'}}}}}}}, 0x0) 23:58:53 executing program 3: 23:58:53 executing program 4: 23:58:54 executing program 1: 23:58:54 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3772", 0xff7c}], 0x1) 23:58:54 executing program 4: 23:58:54 executing program 5: 23:58:54 executing program 3: 23:58:54 executing program 0: syz_emit_ethernet(0x72, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x3c, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}], '\x00\x00eX'}}}}}}}, 0x0) 23:58:54 executing program 1: 23:58:54 executing program 3: 23:58:54 executing program 4: 23:58:54 executing program 5: 23:58:54 executing program 1: 23:58:54 executing program 0: syz_emit_ethernet(0x72, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x3c, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}], '\x00\x00eX'}}}}}}}, 0x0) 23:58:54 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3772", 0xff7c}], 0x1) 23:58:54 executing program 3: 23:58:54 executing program 4: 23:58:54 executing program 5: 23:58:54 executing program 1: 23:58:54 executing program 0: syz_emit_ethernet(0x74, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x3e, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}], '\x00\x00eX\x00\x00'}}}}}}}, 0x0) 23:58:54 executing program 4: 23:58:54 executing program 3: 23:58:54 executing program 1: 23:58:54 executing program 5: 23:58:54 executing program 0: syz_emit_ethernet(0x74, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x3e, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}], '\x00\x00eX\x00\x00'}}}}}}}, 0x0) 23:58:55 executing program 4: 23:58:55 executing program 2: sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="8c000000122bb627de6a875420000000000000000000000000000000000000000000000000000000000000000000000000000200000000004721597fc1b7b7d53839ef011988f80e9020eaa7fc08751a79dcab1b4d"], 0x1}}, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3772", 0xff7c}], 0x1) 23:58:55 executing program 3: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000ffffffa5000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 23:58:55 executing program 1: r0 = socket(0x10, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe847a071") syz_emit_ethernet(0x3e, &(0x7f0000000280)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x2, 0x3a, 0x0, @rand_addr="e2aebd41e8e1b8428257ba8c9ba1612d", @mcast2, {[], @echo_request}}}}}, 0x0) 23:58:55 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000002100ff038400260263300a400a"], 0x1}}, 0x0) r3 = inotify_init() r4 = socket$packet(0x11, 0x2, 0x300) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) close(r2) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 23:58:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0x7530}, {0x77359400}}, 0x0) 23:58:55 executing program 0: syz_emit_ethernet(0x74, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x3e, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}], '\x00\x00eX\x00\x00'}}}}}}}, 0x0) 23:58:55 executing program 1: mkdir(&(0x7f0000000740)='./file0\x00', 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x400007, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) umount2(&(0x7f0000000080)='./file0\x00', 0x0) [ 304.753451][T10297] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 23:58:55 executing program 2: sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="8c000000122bb627de6a875420000000000000000000000000000000000000000000000000000000000000000000000000000200000000004721597fc1b7b7d53839ef011988f80e9020eaa7fc08751a79dcab1b4d"], 0x1}}, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3772", 0xff7c}], 0x1) 23:58:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) sendfile(r1, r0, &(0x7f0000000100)=0x8, 0x1f) fchdir(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0xc0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.controllers\x00', 0x275a, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback=0x7f000014}, {0x2, 0x0, @loopback=0x7f000600}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x27}) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"/319], 0x140}, 0x1, 0x0, 0x0, 0x4040800}, 0x4040014) 23:58:55 executing program 0: syz_emit_ethernet(0x75, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x3f, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}], '\x00\x00eX\x00\x00\x00'}}}}}}}, 0x0) [ 304.771747][T10291] loop3: p1 p2 p3 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 23:58:55 executing program 0: syz_emit_ethernet(0x75, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x3f, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}], '\x00\x00eX\x00\x00\x00'}}}}}}}, 0x0) [ 304.771757][T10291] loop3: partition table partially beyond EOD, truncated [ 305.077781][T10291] loop3: p1 start 1 is beyond EOD, truncated [ 305.086282][T10291] loop3: p2 size 1073741824 extends beyond EOD, truncated [ 305.095776][T10291] loop3: p3 size 2 extends beyond EOD, truncated [ 305.103966][T10291] loop3: p4 size 32768 extends beyond EOD, truncated 23:58:55 executing program 2: sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="8c000000122bb627de6a875420000000000000000000000000000000000000000000000000000000000000000000000000000200000000004721597fc1b7b7d53839ef011988f80e9020eaa7fc08751a79dcab1b4d"], 0x1}}, 0x0) writev(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3772", 0xff7c}], 0x1) 23:58:55 executing program 0: syz_emit_ethernet(0x75, &(0x7f0000000080)={@broadcast=[0xff, 0xff, 0xff, 0x0], @random="f674049167a6", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a4f008", 0x3f, 0x3a, 0x0, @remote, @mcast2, {[], @pkt_toobig={0x4, 0x2, 0x0, 0x0, {0x0, 0x6, "0004e6", 0x0, 0x0, 0x0, @remote, @remote, [@routing={0x2f}], '\x00\x00eX\x00\x00\x00'}}}}}}}, 0x0) [ 305.173816][T10291] loop3: p5 start 1 is beyond EOD, truncated [ 305.270889][T10291] loop3: p6 size 1073741824 extends beyond EOD, truncated [ 305.314279][T10291] loop3: p7 size 32768 extends beyond EOD, truncated [ 305.375772][T10291] loop3: p8 start 1 is beyond EOD, truncated [ 305.398293][T10291] loop3: p9 size 1073741824 extends beyond EOD, truncated [ 305.425786][T10291] loop3: p10 size 32768 extends beyond EOD, truncated [ 305.435791][T10291] loop3: p11 start 1 is beyond EOD, truncated [ 305.444154][T10291] loop3: p12 size 1073741824 extends beyond EOD, truncated [ 305.454060][T10291] loop3: p13 size 32768 extends beyond EOD, truncated [ 305.463643][T10291] loop3: p14 start 1 is beyond EOD, truncated [ 305.472586][T10291] loop3: p15 size 1073741824 extends beyond EOD, truncated [ 305.497851][T10291] loop3: p16 size 32768 extends beyond EOD, truncated [ 305.507129][T10291] loop3: p17 start 1 is beyond EOD, truncated [ 305.513314][T10291] loop3: p18 size 1073741824 extends beyond EOD, truncated [ 305.522087][T10291] loop3: p19 size 32768 extends beyond EOD, truncated [ 305.530196][T10291] loop3: p20 start 1 is beyond EOD, truncated [ 305.536266][T10291] loop3: p21 size 1073741824 extends beyond EOD, truncated [ 305.548872][T10291] loop3: p22 size 32768 extends beyond EOD, truncated [ 305.559266][T10291] loop3: p23 start 1 is beyond EOD, truncated [ 305.570503][T10291] loop3: p24 size 1073741824 extends beyond EOD, truncated [ 305.583366][T10291] loop3: p25 size 32768 extends beyond EOD, truncated [ 305.591304][T10291] loop3: p26 start 1 is beyond EOD, truncated [ 305.597422][T10291] loop3: p27 size 1073741824 extends beyond EOD, truncated [ 305.605939][T10291] loop3: p28 size 32768 extends beyond EOD, truncated [ 305.613600][T10291] loop3: p29 start 1 is beyond EOD, truncated [ 305.619777][T10291] loop3: p30 size 1073741824 extends beyond EOD, truncated [ 305.627541][T10291] loop3: p31 size 32768 extends beyond EOD, truncated [ 305.636301][T10291] loop3: p32 start 1 is beyond EOD, truncated [ 305.642537][T10291] loop3: p33 size 1073741824 extends beyond EOD, truncated [ 305.651098][T10291] loop3: p34 size 32768 extends beyond EOD, truncated [ 305.658749][T10291] loop3: p35 start 1 is beyond EOD, truncated [ 305.664812][T10291] loop3: p36 size 1073741824 extends beyond EOD, truncated [ 305.673083][T10291] loop3: p37 size 32768 extends beyond EOD, truncated [ 305.680925][T10291] loop3: p38 start 1 is beyond EOD, truncated [ 305.687061][T10291] loop3: p39 size 1073741824 extends beyond EOD, truncated [ 305.695083][T10291] loop3: p40 size 32768 extends beyond EOD, truncated [ 305.702923][T10291] loop3: p41 start 1 is beyond EOD, truncated [ 305.709093][T10291] loop3: p42 size 1073741824 extends beyond EOD, truncated [ 305.716939][T10291] loop3: p43 size 32768 extends beyond EOD, truncated [ 305.724573][T10291] loop3: p44 start 1 is beyond EOD, truncated [ 305.730724][T10291] loop3: p45 size 1073741824 extends beyond EOD, truncated [ 305.740115][T10291] loop3: p46 size 32768 extends beyond EOD, truncated [ 305.747491][T10291] loop3: p47 start 1 is beyond EOD, truncated [ 305.753632][T10291] loop3: p48 size 1073741824 extends beyond EOD, truncated [ 305.762528][T10291] loop3: p49 size 32768 extends beyond EOD, truncated [ 305.770298][T10291] loop3: p50 start 1 is beyond EOD, truncated [ 305.776372][T10291] loop3: p51 size 1073741824 extends beyond EOD, truncated [ 305.784605][T10291] loop3: p52 size 32768 extends beyond EOD, truncated [ 305.792304][T10291] loop3: p53 start 1 is beyond EOD, truncated [ 305.798536][T10291] loop3: p54 size 1073741824 extends beyond EOD, truncated [ 305.806885][T10291] loop3: p55 size 32768 extends beyond EOD, truncated [ 305.814427][T10291] loop3: p56 start 1 is beyond EOD, truncated [ 305.820531][T10291] loop3: p57 size 1073741824 extends beyond EOD, truncated [ 305.828643][T10291] loop3: p58 size 32768 extends beyond EOD, truncated [ 305.836031][T10291] loop3: p59 start 1 is beyond EOD, truncated [ 305.842146][T10291] loop3: p60 size 1073741824 extends beyond EOD, truncated [ 305.852582][T10291] loop3: p61 size 32768 extends beyond EOD, truncated [ 305.860122][T10291] loop3: p62 start 1 is beyond EOD, truncated [ 305.866196][T10291] loop3: p63 size 1073741824 extends beyond EOD, truncated [ 305.874202][T10291] loop3: p64 size 32768 extends beyond EOD, truncated [ 305.881962][T10291] loop3: p65 start 1 is beyond EOD, truncated [ 305.888028][T10291] loop3: p66 size 1073741824 extends beyond EOD, truncated [ 305.895907][T10291] loop3: p67 size 32768 extends beyond EOD, truncated [ 305.904214][T10291] loop3: p68 start 1 is beyond EOD, truncated [ 305.910344][T10291] loop3: p69 size 1073741824 extends beyond EOD, truncated [ 305.918357][T10291] loop3: p70 size 32768 extends beyond EOD, truncated [ 305.925829][T10291] loop3: p71 start 1 is beyond EOD, truncated [ 305.931974][T10291] loop3: p72 size 1073741824 extends beyond EOD, truncated [ 305.939954][T10291] loop3: p73 size 32768 extends beyond EOD, truncated [ 305.947337][T10291] loop3: p74 start 1 is beyond EOD, truncated [ 305.953459][T10291] loop3: p75 size 1073741824 extends beyond EOD, truncated [ 305.962077][T10291] loop3: p76 size 32768 extends beyond EOD, truncated [ 305.970055][T10291] loop3: p77 start 1 is beyond EOD, truncated [ 305.976126][T10291] loop3: p78 size 1073741824 extends beyond EOD, truncated [ 305.984171][T10291] loop3: p79 size 32768 extends beyond EOD, truncated [ 305.991966][T10291] loop3: p80 start 1 is beyond EOD, truncated [ 305.998343][T10291] loop3: p81 size 1073741824 extends beyond EOD, truncated [ 306.006138][T10291] loop3: p82 size 32768 extends beyond EOD, truncated [ 306.014090][T10291] loop3: p83 start 1 is beyond EOD, truncated [ 306.020225][T10291] loop3: p84 size 1073741824 extends beyond EOD, truncated [ 306.028106][T10291] loop3: p85 size 32768 extends beyond EOD, truncated [ 306.035498][T10291] loop3: p86 start 1 is beyond EOD, truncated [ 306.042197][T10291] loop3: p87 size 1073741824 extends beyond EOD, truncated [ 306.050389][T10291] loop3: p88 size 32768 extends beyond EOD, truncated [ 306.057795][T10291] loop3: p89 start 1 is beyond EOD, truncated [ 306.063928][T10291] loop3: p90 size 1073741824 extends beyond EOD, truncated [ 306.072495][T10291] loop3: p91 size 32768 extends beyond EOD, truncated [ 306.080268][T10291] loop3: p92 start 1 is beyond EOD, truncated [ 306.086334][T10291] loop3: p93 size 1073741824 extends beyond EOD, truncated [ 306.094296][T10291] loop3: p94 size 32768 extends beyond EOD, truncated [ 306.102051][T10291] loop3: p95 start 1 is beyond EOD, truncated [ 306.108169][T10291] loop3: p96 size 1073741824 extends beyond EOD, truncated [ 306.115952][T10291] loop3: p97 size 32768 extends beyond EOD, truncated [ 306.124999][T10291] loop3: p98 start 1 is beyond EOD, truncated [ 306.131110][T10291] loop3: p99 size 1073741824 extends beyond EOD, truncated [ 306.139289][T10291] loop3: p100 size 32768 extends beyond EOD, truncated [ 306.146748][T10291] loop3: p101 start 1 is beyond EOD, truncated [ 306.152948][T10291] loop3: p102 size 1073741824 extends beyond EOD, truncated [ 306.161249][T10291] loop3: p103 size 32768 extends beyond EOD, truncated [ 306.169324][T10291] loop3: p104 start 1 is beyond EOD, truncated [ 306.175475][T10291] loop3: p105 size 1073741824 extends beyond EOD, truncated [ 306.184870][T10291] loop3: p106 size 32768 extends beyond EOD, truncated [ 306.192851][T10291] loop3: p107 start 1 is beyond EOD, truncated [ 306.199060][T10291] loop3: p108 size 1073741824 extends beyond EOD, truncated [ 306.207011][T10291] loop3: p109 size 32768 extends beyond EOD, truncated [ 306.214830][T10291] loop3: p110 start 1 is beyond EOD, truncated [ 306.221055][T10291] loop3: p111 size 1073741824 extends beyond EOD, truncated [ 306.229246][T10291] loop3: p112 size 32768 extends beyond EOD, truncated [ 306.236722][T10291] loop3: p113 start 1 is beyond EOD, truncated [ 306.242956][T10291] loop3: p114 size 1073741824 extends beyond EOD, truncated [ 306.250876][T10291] loop3: p115 size 32768 extends beyond EOD, truncated [ 306.258655][T10291] loop3: p116 start 1 is beyond EOD, truncated [ 306.264810][T10291] loop3: p117 size 1073741824 extends beyond EOD, truncated [ 306.272854][T10291] loop3: p118 size 32768 extends beyond EOD, truncated [ 306.281057][T10291] loop3: p119 start 1 is beyond EOD, truncated [ 306.287216][T10291] loop3: p120 size 1073741824 extends beyond EOD, truncated [ 306.296095][T10291] loop3: p121 size 32768 extends beyond EOD, truncated [ 306.304483][T10291] loop3: p122 start 1 is beyond EOD, truncated [ 306.310711][T10291] loop3: p123 size 1073741824 extends beyond EOD, truncated [ 306.318968][T10291] loop3: p124 size 32768 extends beyond EOD, truncated [ 306.326433][T10291] loop3: p125 start 1 is beyond EOD, truncated [ 306.332675][T10291] loop3: p126 size 1073741824 extends beyond EOD, truncated [ 306.341400][T10291] loop3: p127 size 32768 extends beyond EOD, truncated [ 306.349058][T10291] loop3: p128 start 1 is beyond EOD, truncated [ 306.355222][T10291] loop3: p129 size 1073741824 extends beyond EOD, truncated [ 306.363577][T10291] loop3: p130 size 32768 extends beyond EOD, truncated [ 306.371251][T10291] loop3: p131 start 1 is beyond EOD, truncated [ 306.377404][T10291] loop3: p132 size 1073741824 extends beyond EOD, truncated [ 306.385493][T10291] loop3: p133 size 32768 extends beyond EOD, truncated [ 306.393011][T10291] loop3: p134 start 1 is beyond EOD, truncated [ 306.400503][T10291] loop3: p135 size 1073741824 extends beyond EOD, truncated [ 306.408567][T10291] loop3: p136 size 32768 extends beyond EOD, truncated [ 306.416153][T10291] loop3: p137 start 1 is beyond EOD, truncated [ 306.422543][T10291] loop3: p138 size 1073741824 extends beyond EOD, truncated [ 306.431045][T10291] loop3: p139 size 32768 extends beyond EOD, truncated [ 306.438803][T10291] loop3: p140 start 1 is beyond EOD, truncated [ 306.445021][T10291] loop3: p141 size 1073741824 extends beyond EOD, truncated [ 306.453406][T10291] loop3: p142 size 32768 extends beyond EOD, truncated [ 306.461284][T10291] loop3: p143 start 1 is beyond EOD, truncated [ 306.467437][T10291] loop3: p144 size 1073741824 extends beyond EOD, truncated [ 306.475568][T10291] loop3: p145 size 32768 extends beyond EOD, truncated [ 306.483419][T10291] loop3: p146 start 1 is beyond EOD, truncated [ 306.489661][T10291] loop3: p147 size 1073741824 extends beyond EOD, truncated [ 306.497599][T10291] loop3: p148 size 32768 extends beyond EOD, truncated [ 306.505587][T10291] loop3: p149 start 1 is beyond EOD, truncated [ 306.512960][T10291] loop3: p150 size 1073741824 extends beyond EOD, truncated [ 306.527140][T10291] loop3: p151 size 32768 extends beyond EOD, truncated [ 306.534817][T10291] loop3: p152 start 1 is beyond EOD, truncated [ 306.541041][T10291] loop3: p153 size 1073741824 extends beyond EOD, truncated [ 306.549158][T10291] loop3: p154 size 32768 extends beyond EOD, truncated [ 306.556630][T10291] loop3: p155 start 1 is beyond EOD, truncated [ 306.563794][T10291] loop3: p156 size 1073741824 extends beyond EOD, truncated [ 306.571857][T10291] loop3: p157 size 32768 extends beyond EOD, truncated [ 306.579737][T10291] loop3: p158 start 1 is beyond EOD, truncated [ 306.585962][T10291] loop3: p159 size 1073741824 extends beyond EOD, truncated [ 306.594050][T10291] loop3: p160 size 32768 extends beyond EOD, truncated [ 306.602834][T10291] loop3: p161 start 1 is beyond EOD, truncated [ 306.609074][T10291] loop3: p162 size 1073741824 extends beyond EOD, truncated [ 306.617168][T10291] loop3: p163 size 32768 extends beyond EOD, truncated [ 306.625551][T10291] loop3: p164 start 1 is beyond EOD, truncated [ 306.631933][T10291] loop3: p165 size 1073741824 extends beyond EOD, truncated [ 306.640248][T10291] loop3: p166 size 32768 extends beyond EOD, truncated [ 306.647702][T10291] loop3: p167 start 1 is beyond EOD, truncated [ 306.653931][T10291] loop3: p168 size 1073741824 extends beyond EOD, truncated [ 306.662218][T10291] loop3: p169 size 32768 extends beyond EOD, truncated [ 306.670133][T10291] loop3: p170 start 1 is beyond EOD, truncated [ 306.676286][T10291] loop3: p171 size 1073741824 extends beyond EOD, truncated [ 306.685519][T10291] loop3: p172 size 32768 extends beyond EOD, truncated [ 306.694236][T10291] loop3: p173 start 1 is beyond EOD, truncated [ 306.700516][T10291] loop3: p174 size 1073741824 extends beyond EOD, truncated [ 306.708688][T10291] loop3: p175 size 32768 extends beyond EOD, truncated [ 306.716136][T10291] loop3: p176 start 1 is beyond EOD, truncated [ 306.722393][T10291] loop3: p177 size 1073741824 extends beyond EOD, truncated [ 306.731034][T10291] loop3: p178 size 32768 extends beyond EOD, truncated [ 306.738742][T10291] loop3: p179 start 1 is beyond EOD, truncated [ 306.744896][T10291] loop3: p180 size 1073741824 extends beyond EOD, truncated [ 306.752954][T10291] loop3: p181 size 32768 extends beyond EOD, truncated [ 306.760897][T10291] loop3: p182 start 1 is beyond EOD, truncated [ 306.767187][T10291] loop3: p183 size 1073741824 extends beyond EOD, truncated [ 306.775248][T10291] loop3: p184 size 32768 extends beyond EOD, truncated [ 306.783509][T10291] loop3: p185 start 1 is beyond EOD, truncated [ 306.789762][T10291] loop3: p186 size 1073741824 extends beyond EOD, truncated [ 306.797638][T10291] loop3: p187 size 32768 extends beyond EOD, truncated [ 306.805239][T10291] loop3: p188 start 1 is beyond EOD, truncated [ 306.811424][T10291] loop3: p189 size 1073741824 extends beyond EOD, truncated [ 306.820381][T10291] loop3: p190 size 32768 extends beyond EOD, truncated [ 306.827842][T10291] loop3: p191 start 1 is beyond EOD, truncated [ 306.834120][T10291] loop3: p192 size 1073741824 extends beyond EOD, truncated [ 306.843940][T10291] loop3: p193 size 32768 extends beyond EOD, truncated [ 306.851592][T10291] loop3: p194 start 1 is beyond EOD, truncated [ 306.857791][T10291] loop3: p195 size 1073741824 extends beyond EOD, truncated [ 306.865832][T10291] loop3: p196 size 32768 extends beyond EOD, truncated [ 306.873333][T10291] loop3: p197 start 1 is beyond EOD, truncated [ 306.879568][T10291] loop3: p198 size 1073741824 extends beyond EOD, truncated [ 306.887405][T10291] loop3: p199 size 32768 extends beyond EOD, truncated [ 306.895239][T10291] loop3: p200 start 1 is beyond EOD, truncated [ 306.901454][T10291] loop3: p201 size 1073741824 extends beyond EOD, truncated [ 306.909373][T10291] loop3: p202 size 32768 extends beyond EOD, truncated [ 306.916857][T10291] loop3: p203 start 1 is beyond EOD, truncated [ 306.923088][T10291] loop3: p204 size 1073741824 extends beyond EOD, truncated [ 306.931039][T10291] loop3: p205 size 32768 extends beyond EOD, truncated [ 306.938787][T10291] loop3: p206 start 1 is beyond EOD, truncated [ 306.944942][T10291] loop3: p207 size 1073741824 extends beyond EOD, truncated [ 306.954266][T10291] loop3: p208 size 32768 extends beyond EOD, truncated [ 306.962198][T10291] loop3: p209 start 1 is beyond EOD, truncated [ 306.968480][T10291] loop3: p210 size 1073741824 extends beyond EOD, truncated [ 306.976414][T10291] loop3: p211 size 32768 extends beyond EOD, truncated [ 306.984079][T10291] loop3: p212 start 1 is beyond EOD, truncated [ 306.990267][T10291] loop3: p213 size 1073741824 extends beyond EOD, truncated [ 306.998214][T10291] loop3: p214 size 32768 extends beyond EOD, truncated [ 307.005763][T10291] loop3: p215 start 1 is beyond EOD, truncated [ 307.012342][T10291] loop3: p216 size 1073741824 extends beyond EOD, truncated [ 307.020633][T10291] loop3: p217 size 32768 extends beyond EOD, truncated [ 307.028174][T10291] loop3: p218 start 1 is beyond EOD, truncated [ 307.034328][T10291] loop3: p219 size 1073741824 extends beyond EOD, truncated [ 307.042609][T10291] loop3: p220 size 32768 extends beyond EOD, truncated [ 307.050257][T10291] loop3: p221 start 1 is beyond EOD, truncated [ 307.056454][T10291] loop3: p222 size 1073741824 extends beyond EOD, truncated [ 307.065268][T10291] loop3: p223 size 32768 extends beyond EOD, truncated [ 307.072922][T10291] loop3: p224 start 1 is beyond EOD, truncated [ 307.079973][T10291] loop3: p225 size 1073741824 extends beyond EOD, truncated [ 307.087881][T10291] loop3: p226 size 32768 extends beyond EOD, truncated [ 307.095580][T10291] loop3: p227 start 1 is beyond EOD, truncated [ 307.101789][T10291] loop3: p228 size 1073741824 extends beyond EOD, truncated [ 307.109846][T10291] loop3: p229 size 32768 extends beyond EOD, truncated [ 307.117331][T10291] loop3: p230 start 1 is beyond EOD, truncated [ 307.123922][T10291] loop3: p231 size 1073741824 extends beyond EOD, truncated [ 307.132399][T10291] loop3: p232 size 32768 extends beyond EOD, truncated [ 307.140212][T10291] loop3: p233 start 1 is beyond EOD, truncated [ 307.146363][T10291] loop3: p234 size 1073741824 extends beyond EOD, truncated [ 307.154500][T10291] loop3: p235 size 32768 extends beyond EOD, truncated [ 307.163170][T10291] loop3: p236 start 1 is beyond EOD, truncated [ 307.170268][T10291] loop3: p237 size 1073741824 extends beyond EOD, truncated [ 307.178326][T10291] loop3: p238 size 32768 extends beyond EOD, truncated [ 307.185851][T10291] loop3: p239 start 1 is beyond EOD, truncated [ 307.192068][T10291] loop3: p240 size 1073741824 extends beyond EOD, truncated [ 307.200342][T10291] loop3: p241 size 32768 extends beyond EOD, truncated [ 307.207825][T10291] loop3: p242 start 1 is beyond EOD, truncated [ 307.214586][T10291] loop3: p243 size 1073741824 extends beyond EOD, truncated [ 307.222854][T10291] loop3: p244 size 32768 extends beyond EOD, truncated [ 307.230745][T10291] loop3: p245 start 1 is beyond EOD, truncated [ 307.236896][T10291] loop3: p246 size 1073741824 extends beyond EOD, truncated [ 307.245108][T10291] loop3: p247 size 32768 extends beyond EOD, truncated [ 307.252605][T10291] loop3: p248 start 1 is beyond EOD, truncated [ 307.258980][T10291] loop3: p249 size 1073741824 extends beyond EOD, truncated [ 307.266854][T10291] loop3: p250 size 32768 extends beyond EOD, truncated [ 307.274544][T10291] loop3: p251 start 1 is beyond EOD, truncated [ 307.282022][T10291] loop3: p252 size 1073741824 extends beyond EOD, truncated [ 307.290161][T10291] loop3: p253 size 32768 extends beyond EOD, truncated [ 307.297628][T10291] loop3: p254 start 1 is beyond EOD, truncated [ 307.303858][T10291] loop3: p255 size 1073741824 extends beyond EOD, truncated 23:58:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/492], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000180)={@local, @rand_addr="054fecd9633ab624218a0f241fdd0d32", @local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x247b02ae, r4}) 23:58:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f0000000200), 0x0, 0x2) 23:58:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) sendfile(r1, r0, &(0x7f0000000100)=0x8, 0x1f) fchdir(r0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, 0x0, 0xc0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000740)='cgroup.controllers\x00', 0x275a, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @loopback=0x7f000014}, {0x2, 0x0, @loopback=0x7f000600}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x27}) sendmsg$IPCTNL_MSG_EXP_NEW(r2, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"/319], 0x140}, 0x1, 0x0, 0x0, 0x4040800}, 0x4040014) 23:58:57 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="8c000000122bb627de6a875420000000000000000000000000000000000000000000000000000000000000000000000000000200000000004721597fc1b7b7d53839ef011988f80e9020eaa7fc08751a79dcab1b4d"], 0x1}}, 0x0) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3772", 0xff7c}], 0x1) 23:58:57 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="020182ffffff01000000ff07000000ffffffa5000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 23:58:57 executing program 5: syz_emit_ethernet(0x76, &(0x7f0000000500)={@broadcast, @random="8fb3f65e32d9", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x40, 0x3a, 0x0, @local={0xfe, 0x80, [0x3, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "7f112d", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x3d], [], @dev}, @remote, [@fragment={0x29}], "1876f17ac1232b5a"}}}}}}}, 0x0) 23:58:58 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x200000000801, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$uinput_user_dev(r0, &(0x7f0000000080)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400003]}, 0x45c) 23:58:58 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) [ 307.679619][T10367] input: syz1 as /devices/virtual/input/input7 [ 307.685558][T10340] loop0: p1 p2 p3 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 [ 307.685568][T10340] loop0: partition table partially beyond EOD, truncated 23:58:58 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x4) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20004000, 0x0, 0xffffff23) [ 307.685804][T10340] loop0: p1 start 1 is beyond EOD, truncated [ 307.685816][T10340] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 307.686920][T10340] loop0: p3 size 2 extends beyond EOD, truncated [ 307.688041][T10340] loop0: p4 size 32768 extends beyond EOD, truncated [ 307.692627][T10340] loop0: p5 start 1 is beyond EOD, truncated [ 307.692641][T10340] loop0: p6 size 1073741824 extends beyond EOD, truncated [ 307.693808][T10340] loop0: p7 size 32768 extends beyond EOD, truncated [ 307.694987][T10340] loop0: p8 start 1 is beyond EOD, truncated [ 307.695000][T10340] loop0: p9 size 1073741824 extends beyond EOD, truncated [ 307.696352][T10340] loop0: p10 size 32768 extends beyond EOD, truncated [ 307.697565][T10340] loop0: p11 start 1 is beyond EOD, truncated [ 307.697578][T10340] loop0: p12 size 1073741824 extends beyond EOD, truncated [ 307.715592][T10340] loop0: p13 size 32768 extends beyond EOD, truncated [ 307.731390][T10340] loop0: p14 start 1 is beyond EOD, truncated [ 307.731404][T10340] loop0: p15 size 1073741824 extends beyond EOD, truncated [ 307.733675][T10340] loop0: p16 size 32768 extends beyond EOD, truncated [ 307.735949][T10340] loop0: p17 start 1 is beyond EOD, truncated [ 307.735962][T10340] loop0: p18 size 1073741824 extends beyond EOD, truncated [ 307.743057][T10340] loop0: p19 size 32768 extends beyond EOD, truncated [ 307.751751][T10340] loop0: p20 start 1 is beyond EOD, truncated [ 307.751764][T10340] loop0: p21 size 1073741824 extends beyond EOD, truncated [ 307.756801][T10340] loop0: p22 size 32768 extends beyond EOD, truncated [ 307.766148][T10340] loop0: p23 start 1 is beyond EOD, truncated [ 307.766162][T10340] loop0: p24 size 1073741824 extends beyond EOD, truncated [ 307.772863][T10340] loop0: p25 size 32768 extends beyond EOD, truncated [ 307.779061][T10340] loop0: p26 start 1 is beyond EOD, truncated [ 307.779074][T10340] loop0: p27 size 1073741824 extends beyond EOD, truncated [ 307.780227][T10340] loop0: p28 size 32768 extends beyond EOD, truncated [ 307.789356][T10340] loop0: p29 start 1 is beyond EOD, truncated [ 307.789370][T10340] loop0: p30 size 1073741824 extends beyond EOD, truncated [ 307.792812][T10340] loop0: p31 size 32768 extends beyond EOD, truncated [ 307.797260][T10340] loop0: p32 start 1 is beyond EOD, truncated [ 307.797273][T10340] loop0: p33 size 1073741824 extends beyond EOD, truncated [ 307.800882][T10340] loop0: p34 size 32768 extends beyond EOD, truncated [ 308.135009][T10367] input: syz1 as /devices/virtual/input/input8 23:58:58 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa91000000810000000806002108000604"], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 23:58:58 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x24048000, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r1, r0) sendmsg$SMC_PNETID_DEL(r2, &(0x7f0000000600)={&(0x7f00000004c0), 0xc, &(0x7f00000005c0)={0x0}}, 0x20004800) [ 308.294004][T10340] loop0: p35 start 1 is beyond EOD, truncated 23:58:58 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="8c000000122bb627de6a875420000000000000000000000000000000000000000000000000000000000000000000000000000200000000004721597fc1b7b7d53839ef011988f80e9020eaa7fc08751a79dcab1b4d"], 0x1}}, 0x0) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449710f20c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3772", 0xff7c}], 0x1) [ 308.359620][T10340] loop0: p36 size 1073741824 extends beyond EOD, truncated [ 308.419129][T10340] loop0: p37 size 32768 extends beyond EOD, truncated [ 308.500725][T10340] loop0: p38 start 1 is beyond EOD, truncated 23:58:59 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @rand_addr, 0x0, 0x0, 'none\x00', 0x0, 0x3ff}, {@rand_addr=0x400}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setuid(0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) chdir(0x0) 23:58:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000240)='./file1\x00', 0x141142, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440), 0xfffffc41) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x1070c5, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x1c500) 23:58:59 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) r2 = dup2(r1, r0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000100)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40106309, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0}}], 0x12, 0x1000000, 0x0}) [ 308.948228][T10340] loop0: p39 size 1073741824 extends beyond EOD, truncated [ 308.949211][T10340] loop0: p40 size 32768 extends beyond EOD, truncated [ 308.950125][T10340] loop0: p41 start 1 is beyond EOD, truncated 23:58:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) r6 = socket$netlink(0x10, 0x3, 0xb) getsockopt$sock_linger(r6, 0x1, 0xd, &(0x7f0000000300), &(0x7f0000000340)=0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xf0ffffff, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xd, r8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 308.950139][T10340] loop0: p42 size 1073741824 extends beyond EOD, truncated [ 308.950990][T10340] loop0: p43 size 32768 extends beyond EOD, truncated [ 308.951925][T10340] loop0: p44 start 1 is beyond EOD, truncated [ 308.951939][T10340] loop0: p45 size 1073741824 extends beyond EOD, truncated [ 308.952822][T10340] loop0: p46 size 32768 extends beyond EOD, truncated [ 308.953737][T10340] loop0: p47 start 1 is beyond EOD, truncated [ 308.953749][T10340] loop0: p48 size 1073741824 extends beyond EOD, truncated [ 308.954709][T10340] loop0: p49 size 32768 extends beyond EOD, truncated [ 308.956573][T10340] loop0: p50 start 1 is beyond EOD, truncated [ 308.956586][T10340] loop0: p51 size 1073741824 extends beyond EOD, truncated [ 308.980670][T10340] loop0: p52 size 32768 extends beyond EOD, truncated [ 308.998428][T10340] loop0: p53 start 1 is beyond EOD, truncated [ 308.998440][T10340] loop0: p54 size 1073741824 extends beyond EOD, truncated [ 309.040467][T10340] loop0: p55 size 32768 extends beyond EOD, truncated [ 309.097130][T10340] loop0: p56 start 1 is beyond EOD, truncated [ 309.097144][T10340] loop0: p57 size 1073741824 extends beyond EOD, truncated [ 309.098332][T10340] loop0: p58 size 32768 extends beyond EOD, truncated [ 309.099493][T10340] loop0: p59 start 1 is beyond EOD, truncated [ 309.099503][T10340] loop0: p60 size 1073741824 extends beyond EOD, truncated [ 309.106950][T10340] loop0: p61 size 32768 extends beyond EOD, truncated [ 309.107949][T10340] loop0: p62 start 1 is beyond EOD, truncated [ 309.107962][T10340] loop0: p63 size 1073741824 extends beyond EOD, truncated [ 309.109543][T10340] loop0: p64 size 32768 extends beyond EOD, truncated [ 309.110502][T10340] loop0: p65 start 1 is beyond EOD, truncated [ 309.110515][T10340] loop0: p66 size 1073741824 extends beyond EOD, truncated [ 309.114767][T10340] loop0: p67 size 32768 extends beyond EOD, truncated [ 309.125087][T10458] binder: 10457:10458 unknown command 0 [ 309.125107][T10458] binder: 10457:10458 ioctl c0306201 20000100 returned -22 [ 309.148359][T10340] loop0: p68 start 1 is beyond EOD, truncated [ 309.148393][T10340] loop0: p69 size 1073741824 extends beyond EOD, truncated [ 309.162922][T10340] loop0: p70 size 32768 extends beyond EOD, truncated [ 309.244831][T10467] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 309.245139][T10467] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 1, start 00040000) [ 309.245148][T10467] FAT-fs (loop3): Filesystem has been set read-only [ 309.258574][T10340] loop0: p71 start 1 is beyond EOD, truncated [ 309.258587][T10340] loop0: p72 size 1073741824 extends beyond EOD, truncated [ 309.259601][T10340] loop0: p73 size 32768 extends beyond EOD, truncated [ 309.260551][T10340] loop0: p74 start 1 is beyond EOD, truncated [ 309.260564][T10340] loop0: p75 size 1073741824 extends beyond EOD, truncated [ 309.261470][T10340] loop0: p76 size 32768 extends beyond EOD, truncated [ 309.262419][T10340] loop0: p77 start 1 is beyond EOD, truncated [ 309.262430][T10340] loop0: p78 size 1073741824 extends beyond EOD, truncated [ 309.263606][T10340] loop0: p79 size 32768 extends beyond EOD, truncated [ 309.272687][T10340] loop0: p80 start 1 is beyond EOD, truncated [ 309.272701][T10340] loop0: p81 size 1073741824 extends beyond EOD, truncated [ 309.289168][T10340] loop0: p82 size 32768 extends beyond EOD, truncated [ 309.301559][T10340] loop0: p83 start 1 is beyond EOD, truncated [ 309.301573][T10340] loop0: p84 size 1073741824 extends beyond EOD, truncated [ 309.315774][T10340] loop0: p85 size 32768 extends beyond EOD, truncated [ 309.320726][T10340] loop0: p86 start 1 is beyond EOD, truncated [ 309.320739][T10340] loop0: p87 size 1073741824 extends beyond EOD, truncated [ 309.338569][T10340] loop0: p88 size 32768 extends beyond EOD, truncated [ 309.353812][ T27] audit: type=1804 audit(1585871939.924:59): pid=10464 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir945241898/syzkaller.kOI10N/44/file0/file0" dev="loop5" ino=26 res=1 [ 309.424833][T10340] loop0: p89 start 1 is beyond EOD, truncated [ 309.751704][T10340] loop0: p90 size 1073741824 extends beyond EOD, truncated [ 309.799279][T10340] loop0: p91 size 32768 extends beyond EOD, truncated [ 309.826668][T10340] loop0: p92 start 1 is beyond EOD, truncated [ 309.845441][T10340] loop0: p93 size 1073741824 extends beyond EOD, truncated [ 309.891724][T10340] loop0: p94 size 32768 extends beyond EOD, truncated [ 310.066088][T10340] loop0: p95 start 1 is beyond EOD, truncated [ 310.126565][T10340] loop0: p96 size 1073741824 extends beyond EOD, truncated [ 310.171836][T10340] loop0: p97 size 32768 extends beyond EOD, truncated [ 310.257803][T10340] loop0: p98 start 1 is beyond EOD, truncated [ 310.361365][T10340] loop0: p99 size 1073741824 extends beyond EOD, truncated [ 310.458507][T10340] loop0: p100 size 32768 extends beyond EOD, truncated [ 310.551602][T10340] loop0: p101 start 1 is beyond EOD, truncated [ 310.586114][T10340] loop0: p102 size 1073741824 extends beyond EOD, truncated [ 310.658685][T10340] loop0: p103 size 32768 extends beyond EOD, truncated [ 310.721070][T10340] loop0: p104 start 1 is beyond EOD, truncated [ 310.781096][T10340] loop0: p105 size 1073741824 extends beyond EOD, truncated [ 310.858012][T10340] loop0: p106 size 32768 extends beyond EOD, truncated [ 310.925051][T10340] loop0: p107 start 1 is beyond EOD, truncated [ 310.990408][T10340] loop0: p108 size 1073741824 extends beyond EOD, truncated [ 311.074184][T10340] loop0: p109 size 32768 extends beyond EOD, truncated [ 311.140974][T10340] loop0: p110 start 1 is beyond EOD, truncated [ 311.207578][T10340] loop0: p111 size 1073741824 extends beyond EOD, truncated [ 311.287774][T10340] loop0: p112 size 32768 extends beyond EOD, truncated [ 311.362498][T10495] gretap0: refused to change device tx_queue_len [ 311.387063][T10340] loop0: p113 start 1 is beyond EOD, truncated [ 311.437487][T10340] loop0: p114 size 1073741824 extends beyond EOD, truncated [ 311.478926][T10495] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 311.499089][T10340] loop0: p115 size 32768 extends beyond EOD, truncated [ 311.514215][T10340] loop0: p116 start 1 is beyond EOD, truncated [ 311.548157][T10340] loop0: p117 size 1073741824 extends beyond EOD, truncated [ 311.568359][T10340] loop0: p118 size 32768 extends beyond EOD, truncated [ 311.577807][ T9479] general protection fault, probably for non-canonical address 0xdffffc0000000021: 0000 [#1] PREEMPT SMP KASAN [ 311.589515][ T9479] KASAN: null-ptr-deref in range [0x0000000000000108-0x000000000000010f] [ 311.597921][ T9479] CPU: 1 PID: 9479 Comm: syz-executor.3 Not tainted 5.6.0-rc3-next-20200228-syzkaller #0 [ 311.607711][ T9479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.617876][ T9479] RIP: 0010:destroy_workqueue+0x2e/0x6b0 [ 311.623502][ T9479] Code: 49 89 fe 41 55 41 54 55 53 48 83 ec 08 e8 8a 6a 26 00 49 8d be 08 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 e0 05 00 00 49 8b 9e 08 01 00 00 48 85 db 74 19 [ 311.643213][ T9479] RSP: 0018:ffffc90002107cc8 EFLAGS: 00010206 [ 311.649270][ T9479] RAX: dffffc0000000000 RBX: 0000000000000002 RCX: 0000000000000000 [ 311.657246][ T9479] RDX: 0000000000000021 RSI: ffffffff814c2af6 RDI: 0000000000000108 [ 311.665214][ T9479] RBP: ffff888218ac70f0 R08: ffff88805ab5a240 R09: fffffbfff185270a [ 311.673180][ T9479] R10: fffffbfff1852709 R11: ffffffff8c29384f R12: ffff888218ac7000 [ 311.681145][ T9479] R13: ffff888218ac7004 R14: 0000000000000000 R15: 0000000000004c01 [ 311.689146][ T9479] FS: 00000000029e1940(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 311.698085][ T9479] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 311.704662][ T9479] CR2: 00007ffdf2fd9fc8 CR3: 000000005ab2e000 CR4: 00000000001406e0 [ 311.712632][ T9479] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 311.720601][ T9479] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 311.728563][ T9479] Call Trace: [ 311.731914][ T9479] __loop_clr_fd+0x185/0x1280 [ 311.736596][ T9479] lo_ioctl+0x2b4/0x1460 [ 311.740844][ T9479] ? __loop_clr_fd+0x1280/0x1280 [ 311.745842][ T9479] blkdev_ioctl+0x25b/0x660 [ 311.750340][ T9479] ? blkdev_common_ioctl+0x1770/0x1770 [ 311.755837][ T9479] block_ioctl+0xe9/0x130 [ 311.760173][ T9479] ? blkdev_fallocate+0x3f0/0x3f0 [ 311.765231][ T9479] ksys_ioctl+0x11a/0x180 [ 311.769564][ T9479] __x64_sys_ioctl+0x6f/0xb0 [ 311.774183][ T9479] ? lockdep_hardirqs_on+0x417/0x5d0 [ 311.779480][ T9479] do_syscall_64+0xf6/0x790 [ 311.784072][ T9479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.789964][ T9479] RIP: 0033:0x45c6b7 [ 311.793853][ T9479] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.813449][ T9479] RSP: 002b:00007ffd7f14caf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 311.821852][ T9479] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045c6b7 [ 311.829818][ T9479] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000003 [ 311.837779][ T9479] RBP: 000000000000005a R08: 0000000000000000 R09: 000000000000000a [ 311.845743][ T9479] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000000 [ 311.853722][ T9479] R13: 00007ffd7f14cb30 R14: 000000000004b731 R15: 00007ffd7f14cb40 [ 311.861694][ T9479] Modules linked in: [ 311.897546][T10340] loop0: p119 start 1 is beyond EOD, truncated [ 311.928412][T10340] loop0: p120 size 1073741824 extends beyond EOD, truncated [ 312.034773][T10340] loop0: p121 size 32768 extends beyond EOD, truncated [ 312.092795][ T9479] ---[ end trace db3e36415112f17b ]--- [ 312.096267][T10340] loop0: p122 start 1 is beyond EOD, truncated [ 312.103344][ T9479] RIP: 0010:destroy_workqueue+0x2e/0x6b0 [ 312.107812][T10340] loop0: p123 size 1073741824 extends beyond EOD, truncated [ 312.158783][T10340] loop0: p124 size 32768 extends beyond EOD, truncated [ 312.198394][T10340] loop0: p125 start 1 is beyond EOD, truncated [ 312.204585][T10340] loop0: p126 size 1073741824 extends beyond EOD, truncated [ 312.216434][ T9479] Code: 49 89 fe 41 55 41 54 55 53 48 83 ec 08 e8 8a 6a 26 00 49 8d be 08 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 e0 05 00 00 49 8b 9e 08 01 00 00 48 85 db 74 19 [ 312.308776][T10340] loop0: p127 size 32768 extends beyond EOD, truncated [ 312.354800][T10340] loop0: p128 start 1 is beyond EOD, truncated [ 312.397359][T10340] loop0: p129 size 1073741824 extends beyond EOD, truncated [ 312.408697][ T9479] RSP: 0018:ffffc90002107cc8 EFLAGS: 00010206 [ 312.414774][ T9479] RAX: dffffc0000000000 RBX: 0000000000000002 RCX: 0000000000000000 [ 312.427290][T10340] loop0: p130 size 32768 extends beyond EOD, truncated [ 312.431458][ T9479] RDX: 0000000000000021 RSI: ffffffff814c2af6 RDI: 0000000000000108 [ 312.462526][T10340] loop0: p131 start 1 is beyond EOD, truncated [ 312.493067][T10340] loop0: p132 size 1073741824 extends beyond EOD, truncated [ 312.531600][ T9479] RBP: ffff888218ac70f0 R08: ffff88805ab5a240 R09: fffffbfff185270a [ 312.540486][T10340] loop0: p133 size 32768 extends beyond EOD, truncated [ 312.563139][T10340] loop0: p134 start 1 is beyond EOD, truncated [ 312.575711][ T9479] R10: fffffbfff1852709 R11: ffffffff8c29384f R12: ffff888218ac7000 [ 312.595659][T10340] loop0: p135 size 1073741824 extends beyond EOD, truncated [ 312.657187][ T9479] R13: ffff888218ac7004 R14: 0000000000000000 R15: 0000000000004c01 [ 312.668109][T10340] loop0: p136 size 32768 extends beyond EOD, truncated [ 312.682568][T10340] loop0: p137 start 1 is beyond EOD, truncated [ 312.688771][ T9479] FS: 00000000029e1940(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 312.700955][ T9479] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 312.707548][ T9479] CR2: 00007f9767a40050 CR3: 000000005ab2e000 CR4: 00000000001406e0 [ 312.722889][T10340] loop0: p138 size 1073741824 extends beyond EOD, truncated [ 312.728127][ T9479] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 312.761439][T10340] loop0: p139 size 32768 extends beyond EOD, truncated [ 312.778166][ T9479] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 312.786146][ T9479] Kernel panic - not syncing: Fatal exception [ 312.793649][ T9479] Kernel Offset: disabled [ 312.797967][ T9479] Rebooting in 86400 seconds..