[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.10.24' (ECDSA) to the list of known hosts. 2020/06/23 17:15:54 fuzzer started 2020/06/23 17:15:54 dialing manager at 10.128.0.105:42469 2020/06/23 17:15:54 syscalls: 3103 2020/06/23 17:15:54 code coverage: enabled 2020/06/23 17:15:54 comparison tracing: enabled 2020/06/23 17:15:54 extra coverage: enabled 2020/06/23 17:15:54 setuid sandbox: enabled 2020/06/23 17:15:54 namespace sandbox: enabled 2020/06/23 17:15:54 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/23 17:15:54 fault injection: enabled 2020/06/23 17:15:54 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/23 17:15:54 net packet injection: enabled 2020/06/23 17:15:54 net device setup: enabled 2020/06/23 17:15:54 concurrency sanitizer: enabled 2020/06/23 17:15:54 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/23 17:15:54 USB emulation: enabled 2020/06/23 17:15:55 suppressing KCSAN reports in functions: 'ext4_free_inode' 'ext4_mb_good_group' 'exit_signals' 'wg_packet_send_staged_packets' '__ext4_new_inode' 'page_counter_charge' 'expire_timers' 'do_nanosleep' 17:15:59 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) dup3(r1, r0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000007c0), 0x0, 0x0) syzkaller login: [ 37.169525][ T8645] IPVS: ftp: loaded support on port[0] = 21 17:15:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) [ 37.239939][ T8645] chnl_net:caif_netlink_parms(): no params data found [ 37.275729][ T8645] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.282888][ T8645] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.291135][ T8645] device bridge_slave_0 entered promiscuous mode [ 37.298814][ T8645] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.305893][ T8645] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.314302][ T8645] device bridge_slave_1 entered promiscuous mode [ 37.330367][ T8645] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.340836][ T8645] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.358642][ T8645] team0: Port device team_slave_0 added [ 37.365416][ T8645] team0: Port device team_slave_1 added [ 37.380758][ T8645] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.388040][ T8645] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.422634][ T8645] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.438903][ T8800] IPVS: ftp: loaded support on port[0] = 21 [ 37.448428][ T8645] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.455378][ T8645] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 37.483821][ T8645] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 17:15:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000de18e758a4f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) [ 37.568649][ T8645] device hsr_slave_0 entered promiscuous mode [ 37.597129][ T8645] device hsr_slave_1 entered promiscuous mode 17:16:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000540)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 37.687750][ T8836] IPVS: ftp: loaded support on port[0] = 21 [ 37.719346][ T8800] chnl_net:caif_netlink_parms(): no params data found [ 37.847884][ T8645] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 37.878210][ T8645] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 37.917884][ T8800] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.925009][ T8800] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.937107][ T8800] device bridge_slave_0 entered promiscuous mode [ 37.947445][ T8800] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.954461][ T8800] bridge0: port 2(bridge_slave_1) entered disabled state 17:16:00 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 37.963577][ T8800] device bridge_slave_1 entered promiscuous mode [ 37.970726][ T8645] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 38.001177][ T8836] chnl_net:caif_netlink_parms(): no params data found [ 38.003518][ T9000] IPVS: ftp: loaded support on port[0] = 21 [ 38.037872][ T8800] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.056299][ T8645] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 38.082884][ T8800] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.120019][ T8800] team0: Port device team_slave_0 added [ 38.151620][ T8800] team0: Port device team_slave_1 added [ 38.159722][ T8645] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.166914][ T8645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.174197][ T8645] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.181281][ T8645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.219475][ T9122] IPVS: ftp: loaded support on port[0] = 21 [ 38.256943][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 38.276272][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.305964][ T8836] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.316395][ T8836] bridge0: port 1(bridge_slave_0) entered disabled state 17:16:00 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, @val={@val={0x8100}}, {@ipv6}}, 0x0) [ 38.323959][ T8836] device bridge_slave_0 entered promiscuous mode [ 38.337125][ T8800] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.344068][ T8800] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.372479][ T8800] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 38.400267][ T8836] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.407448][ T8836] bridge0: port 2(bridge_slave_1) entered disabled state [ 38.417678][ T8836] device bridge_slave_1 entered promiscuous mode [ 38.425265][ T8645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.435109][ T8800] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 38.442214][ T8800] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 38.468289][ T8800] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.494144][ T8836] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 38.504748][ T8836] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 38.523071][ T9000] chnl_net:caif_netlink_parms(): no params data found [ 38.537711][ T9221] IPVS: ftp: loaded support on port[0] = 21 [ 38.538703][ T8645] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.559353][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 38.567888][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 38.590848][ T8836] team0: Port device team_slave_0 added [ 38.598647][ T8836] team0: Port device team_slave_1 added [ 38.616824][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 38.625137][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 38.633709][ T5031] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.640757][ T5031] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.648683][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 38.657140][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 38.665220][ T5031] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.672236][ T5031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.679838][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 38.688336][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 38.696833][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 38.705163][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 38.713745][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 38.722080][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 38.730606][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 38.738687][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 38.797224][ T8800] device hsr_slave_0 entered promiscuous mode [ 38.847202][ T8800] device hsr_slave_1 entered promiscuous mode [ 38.885958][ T8800] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 38.893520][ T8800] Cannot create hsr debugfs directory [ 38.921655][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 38.949697][ T8645] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.960536][ T8645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 38.968657][ T8836] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 38.975592][ T8836] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.002097][ T8836] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.017840][ T9000] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.024863][ T9000] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.032940][ T9000] device bridge_slave_0 entered promiscuous mode [ 39.041071][ T9000] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.048611][ T9000] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.056167][ T9000] device bridge_slave_1 entered promiscuous mode [ 39.062924][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 39.071387][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.088689][ T8836] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.095622][ T8836] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.122363][ T8836] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.144492][ T9122] chnl_net:caif_netlink_parms(): no params data found [ 39.163712][ T9000] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.182620][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 39.190239][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 39.208773][ T9000] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.227398][ T8645] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.236929][ T8800] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 39.269760][ T8800] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 39.349994][ T8800] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 39.410595][ T8800] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 39.547172][ T8836] device hsr_slave_0 entered promiscuous mode [ 39.575918][ T8836] device hsr_slave_1 entered promiscuous mode [ 39.616912][ T8836] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 39.624451][ T8836] Cannot create hsr debugfs directory [ 39.646814][ T9122] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.653909][ T9122] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.661668][ T9122] device bridge_slave_0 entered promiscuous mode [ 39.669535][ T9122] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.676724][ T9122] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.684247][ T9122] device bridge_slave_1 entered promiscuous mode [ 39.694133][ T9000] team0: Port device team_slave_0 added [ 39.700538][ T9221] chnl_net:caif_netlink_parms(): no params data found [ 39.723669][ T9122] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 39.734555][ T9000] team0: Port device team_slave_1 added [ 39.760876][ T9122] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 39.776982][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 39.785336][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.794476][ T9000] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 39.801771][ T9000] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.828428][ T9000] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 39.840713][ T9000] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 39.847722][ T9000] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 39.873983][ T9000] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 39.904534][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 39.912775][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.935729][ T8645] device veth0_vlan entered promiscuous mode [ 39.952605][ T9122] team0: Port device team_slave_0 added [ 39.959042][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 39.966622][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 40.037321][ T9000] device hsr_slave_0 entered promiscuous mode [ 40.075864][ T9000] device hsr_slave_1 entered promiscuous mode [ 40.115623][ T9000] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 40.123226][ T9000] Cannot create hsr debugfs directory [ 40.135042][ T8645] device veth1_vlan entered promiscuous mode [ 40.144006][ T9221] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.151337][ T9221] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.159328][ T9221] device bridge_slave_0 entered promiscuous mode [ 40.166655][ T9122] team0: Port device team_slave_1 added [ 40.172247][ T9221] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.179483][ T9221] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.187279][ T9221] device bridge_slave_1 entered promiscuous mode [ 40.206044][ T8836] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 40.250695][ T8836] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 40.289952][ T8836] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 40.347734][ T8836] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 40.402371][ T9221] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 40.411859][ T9122] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.419930][ T9122] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.445947][ T9122] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 40.458588][ T9122] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 40.465797][ T9122] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.492286][ T9122] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 40.506622][ T9221] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 40.520229][ T8800] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.532192][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 40.540087][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 40.548753][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 40.557173][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 40.569924][ T8645] device veth0_macvtap entered promiscuous mode [ 40.582297][ T9221] team0: Port device team_slave_0 added [ 40.589725][ T9221] team0: Port device team_slave_1 added [ 40.595361][ T9000] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 40.646699][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 40.659603][ T8645] device veth1_macvtap entered promiscuous mode [ 40.673065][ T9000] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 40.756952][ T9122] device hsr_slave_0 entered promiscuous mode [ 40.805609][ T9122] device hsr_slave_1 entered promiscuous mode [ 40.845429][ T9122] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 40.853014][ T9122] Cannot create hsr debugfs directory [ 40.863856][ T8800] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.875621][ T9221] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.882550][ T9221] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.909408][ T9221] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 40.921762][ T9221] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 40.929418][ T9221] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.955627][ T9221] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 40.966798][ T9000] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 41.018659][ T9000] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 41.077321][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 41.084727][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 41.112807][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 41.122113][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.130687][ T9144] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.137751][ T9144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.147725][ T8645] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.197005][ T9221] device hsr_slave_0 entered promiscuous mode [ 41.245593][ T9221] device hsr_slave_1 entered promiscuous mode [ 41.295317][ T9221] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 41.302869][ T9221] Cannot create hsr debugfs directory [ 41.327665][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 41.336085][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 41.344439][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.353361][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 41.362068][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.372360][ T5031] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.379412][ T5031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.390489][ T8645] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.419397][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 41.429934][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 41.441045][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 41.562474][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 41.573575][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 41.582120][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 41.590569][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 41.665184][ T9221] netdevsim netdevsim5 netdevsim0: renamed from eth0 17:16:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) dup3(r1, r0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000007c0), 0x0, 0x0) [ 41.707245][ T9221] netdevsim netdevsim5 netdevsim1: renamed from eth1 17:16:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) dup3(r1, r0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000007c0), 0x0, 0x0) [ 41.760932][ T8800] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 41.773936][ T8800] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 17:16:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) dup3(r1, r0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000007c0), 0x0, 0x0) [ 41.814771][ T8836] 8021q: adding VLAN 0 to HW filter on device bond0 [ 41.822818][ T9221] netdevsim netdevsim5 netdevsim2: renamed from eth2 17:16:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) dup3(r1, r0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000007c0), 0x0, 0x0) [ 41.877082][ T9221] netdevsim netdevsim5 netdevsim3: renamed from eth3 17:16:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) dup3(r1, r0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000007c0), 0x0, 0x0) [ 41.926741][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 41.938048][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 41.955787][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 41.967105][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 17:16:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) dup3(r1, r0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000007c0), 0x0, 0x0) [ 41.976909][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 41.985579][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.993596][ T9122] netdevsim netdevsim4 netdevsim0: renamed from eth0 17:16:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) dup3(r1, r0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000007c0), 0x0, 0x0) [ 42.036773][ T9122] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 42.071873][ T9000] 8021q: adding VLAN 0 to HW filter on device bond0 [ 42.087117][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 42.097875][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.106820][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.125085][ T9122] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 42.177070][ T9122] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 42.208625][ T8836] 8021q: adding VLAN 0 to HW filter on device team0 [ 42.222143][ T9000] 8021q: adding VLAN 0 to HW filter on device team0 [ 42.234290][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.242465][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.261207][ T8800] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 42.268775][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 42.277581][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.286059][ T5031] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.293076][ T5031] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.300840][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 42.308395][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 42.315842][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 42.324118][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.332238][ T5031] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.339287][ T5031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.347175][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 42.355627][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.363733][ T5031] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.370768][ T5031] bridge0: port 1(bridge_slave_0) entered forwarding state [ 42.378437][ T5031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 42.410741][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 42.418645][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 42.426363][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 42.434732][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 42.443174][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 42.451623][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 42.459967][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 42.468429][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 42.476679][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 42.484664][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 42.493089][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 42.501323][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 42.508341][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 42.516394][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 42.524694][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 42.533245][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 42.541570][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 42.559155][ T8836] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 42.573120][ T8836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 42.591195][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 42.605812][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 42.613617][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 42.623205][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 42.631638][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 42.640212][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 42.648330][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 42.656653][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.669041][ T9000] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 42.681613][ T9000] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 42.701727][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 42.710459][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 42.719020][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 42.727766][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 42.742664][ T9221] 8021q: adding VLAN 0 to HW filter on device bond0 [ 42.753565][ T8800] device veth0_vlan entered promiscuous mode [ 42.767137][ T8800] device veth1_vlan entered promiscuous mode [ 42.774111][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 42.782867][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 42.791740][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 42.800017][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 42.807575][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 42.821476][ T9122] 8021q: adding VLAN 0 to HW filter on device bond0 [ 42.830154][ T8836] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 42.838413][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 42.846482][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 42.853843][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.861750][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.870132][ T9221] 8021q: adding VLAN 0 to HW filter on device team0 [ 42.882593][ T9000] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 42.901012][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 42.909740][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 42.917174][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 42.929662][ T9122] 8021q: adding VLAN 0 to HW filter on device team0 [ 42.951727][ T8800] device veth0_macvtap entered promiscuous mode [ 42.958775][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 42.967472][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 42.975135][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 42.983539][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 42.992091][ T8239] bridge0: port 1(bridge_slave_0) entered blocking state [ 42.999116][ T8239] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.006835][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 43.015298][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 43.023724][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 43.032231][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 43.053224][ T8800] device veth1_macvtap entered promiscuous mode [ 43.063193][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 43.071068][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 43.079172][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 43.087055][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 43.095629][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 43.103705][ T3842] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.110748][ T3842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.118689][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 43.127217][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 43.135511][ T3842] bridge0: port 1(bridge_slave_0) entered blocking state [ 43.142516][ T3842] bridge0: port 1(bridge_slave_0) entered forwarding state [ 43.150278][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 43.158809][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 43.167355][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 43.175719][ T3842] bridge0: port 2(bridge_slave_1) entered blocking state [ 43.182796][ T3842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 43.190471][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 43.199162][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 43.207313][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.215659][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 43.226215][ T8836] device veth0_vlan entered promiscuous mode [ 43.230938][ T8836] device veth1_vlan entered promiscuous mode [ 43.249375][ T8800] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 43.249379][ T8800] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.250053][ T8800] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 43.252521][ T8800] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 43.252525][ T8800] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.253072][ T8800] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 43.260723][ T9221] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 43.260795][ T9221] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 43.277508][ T9122] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 43.277517][ T9122] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 43.285585][ T8836] device veth0_macvtap entered promiscuous mode [ 43.288394][ T8836] device veth1_macvtap entered promiscuous mode [ 43.298335][ T9221] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 43.437096][ T9000] device veth0_vlan entered promiscuous mode [ 43.444514][ T8836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 43.455527][ T8836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.465864][ T8836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 43.476696][ T8836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.487422][ T8836] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 43.494692][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 43.502738][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.510498][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.518589][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 43.526750][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 43.534455][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 43.543116][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 43.551846][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 43.560379][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 43.568804][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 43.577131][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.585527][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 43.593661][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 43.602143][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 43.610887][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 43.619422][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 43.627865][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 43.636428][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 43.645190][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 43.653410][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 43.662064][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 43.670537][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.679036][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 43.687443][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 43.696048][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 43.703997][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 43.712659][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 43.720950][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 43.729485][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 43.737759][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 43.745872][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 43.754231][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 43.762724][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 43.770473][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 43.777953][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 43.785518][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 43.793824][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 43.805003][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 43.812916][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 43.820621][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 43.828697][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 43.836670][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 43.844151][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 43.852003][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 43.870326][ T9000] device veth1_vlan entered promiscuous mode [ 43.898331][ T8836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 43.908965][ T8836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.919724][ T8836] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 43.930434][ T8836] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 43.941216][ T8836] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 43.952264][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 43.960071][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 43.967696][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 43.976596][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 43.987713][ T9122] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 44.123899][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 44.132588][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready 17:16:06 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) dup3(r1, r0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000007c0), 0x0, 0x0) [ 44.240258][ T9000] device veth0_macvtap entered promiscuous mode [ 44.266925][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 44.276567][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 44.286881][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.306830][ T9000] device veth1_macvtap entered promiscuous mode [ 44.324906][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 44.333858][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 44.344813][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 44.364662][ C0] hrtimer: interrupt took 17216 ns [ 44.370401][ T9000] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 44.384174][ T9000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.396541][ T9000] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 44.406995][ T9000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.419544][ T9000] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 17:16:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) [ 44.431668][ T9000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.446587][ T9000] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 44.461984][ T9221] device veth0_vlan entered promiscuous mode [ 44.469911][ T9122] device veth0_vlan entered promiscuous mode [ 44.481351][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 44.492109][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.505779][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 44.513796][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 44.524593][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 44.533719][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 44.542812][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.551133][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.559751][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 44.567935][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 44.583436][ T9000] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 44.595353][ T9000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.605295][ T9000] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 44.615755][ T9000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.626364][ T9000] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 44.638117][ T9000] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 44.649600][ T9000] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 44.661467][ T9221] device veth1_vlan entered promiscuous mode [ 44.669615][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 44.677547][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 44.686209][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 44.703824][ T9122] device veth1_vlan entered promiscuous mode [ 44.847038][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 44.856476][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 44.864358][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 44.881971][ T9221] device veth0_macvtap entered promiscuous mode 17:16:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000540)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 44.900494][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 44.911315][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.924009][ T9221] device veth1_macvtap entered promiscuous mode [ 44.932860][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 44.941657][ T8239] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 44.955668][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 44.975060][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 44.992955][ T9122] device veth0_macvtap entered promiscuous mode [ 45.010623][ T9221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 45.021206][ T9221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.033308][ T9221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 45.046018][ T9221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.057573][ T9221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 45.068023][ T9221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.077868][ T9221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 45.088382][ T9221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.098925][ T9221] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 45.107947][ T9122] device veth1_macvtap entered promiscuous mode [ 45.116496][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 45.124367][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 45.132126][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 45.140448][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.150915][ T9221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 45.161970][ T9221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.171896][ T9221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 45.182404][ T9221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.192221][ T9221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 45.202891][ T9221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.212700][ T9221] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 45.223114][ T9221] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.233790][ T9221] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 45.244294][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 45.252784][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 45.359917][ T9122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 45.370446][ T9122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.380368][ T9122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 45.391486][ T9122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.401334][ T9122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 45.411810][ T9122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.421637][ T9122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 45.432051][ T9122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.441930][ T9122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 45.452395][ T9122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.463266][ T9122] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 45.544908][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 45.566147][ T9144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 45.585883][ T9122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 45.597053][ T9122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.616767][ T9122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 45.644516][ T9122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.654327][ T9122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 45.670606][ T9122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.681213][ T9122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 45.692165][ T9122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.704616][ T9122] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 45.716048][ T9122] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 45.726985][ T9122] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 45.736863][ T9933] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 45.819916][ T9933] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:16:08 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:16:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) dup3(r1, r0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000007c0), 0x0, 0x0) 17:16:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000de18e758a4f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 17:16:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:16:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000540)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 17:16:08 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, @val={@val={0x8100}}, {@ipv6}}, 0x0) 17:16:08 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:16:08 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:16:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x3}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000540)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 17:16:08 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:16:08 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:16:08 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:16:08 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:16:08 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, @val={@val={0x8100}}, {@ipv6}}, 0x0) 17:16:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000de18e758a4f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 17:16:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}]}, 0x50}}, 0x0) 17:16:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000de18e758a4f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 17:16:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000de18e758a4f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 17:16:08 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:16:08 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x4, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 17:16:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000de18e758a4f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 17:16:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) dup3(r1, r0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000007c0), 0x0, 0x0) 17:16:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000de18e758a4f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 17:16:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) dup3(r1, r0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000007c0), 0x0, 0x0) 17:16:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000de18e758a4f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 17:16:09 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, @val={@val={0x8100}}, {@ipv6}}, 0x0) 17:16:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x16, 0x0, 0x0, 0x0, 0x0, "00000000107447b28be94e2a0d00"}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x3ff, 0x0, 0x0, 0x6, 0x0, "04f19cb31bd7b000"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 17:16:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 17:16:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) dup3(r1, r0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000007c0), 0x0, 0x0) 17:16:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000de18e758a4f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 17:16:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 17:16:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 17:16:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 17:16:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x16, 0x0, 0x0, 0x0, 0x0, "00000000107447b28be94e2a0d00"}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x3ff, 0x0, 0x0, 0x6, 0x0, "04f19cb31bd7b000"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 17:16:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x16, 0x0, 0x0, 0x0, 0x0, "00000000107447b28be94e2a0d00"}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x3ff, 0x0, 0x0, 0x6, 0x0, "04f19cb31bd7b000"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 17:16:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 17:16:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 17:16:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 17:16:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000de18e758a4f0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x19, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000}, 0x28) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x11, 0x0, 0x0) 17:16:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x16, 0x0, 0x0, 0x0, 0x0, "00000000107447b28be94e2a0d00"}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x3ff, 0x0, 0x0, 0x6, 0x0, "04f19cb31bd7b000"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 17:16:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 17:16:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x16, 0x0, 0x0, 0x0, 0x0, "00000000107447b28be94e2a0d00"}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x3ff, 0x0, 0x0, 0x6, 0x0, "04f19cb31bd7b000"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 17:16:09 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 17:16:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 17:16:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x16, 0x0, 0x0, 0x0, 0x0, "00000000107447b28be94e2a0d00"}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x3ff, 0x0, 0x0, 0x6, 0x0, "04f19cb31bd7b000"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 17:16:09 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) 17:16:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x16, 0x0, 0x0, 0x0, 0x0, "00000000107447b28be94e2a0d00"}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x3ff, 0x0, 0x0, 0x6, 0x0, "04f19cb31bd7b000"}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 17:16:09 executing program 2: setrlimit(0x40000000000008, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) 17:16:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 17:16:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 17:16:09 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x83, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) fchmod(r1, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) 17:16:09 executing program 2: setrlimit(0x40000000000008, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) 17:16:09 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) 17:16:09 executing program 3: setrlimit(0x40000000000008, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) 17:16:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 17:16:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000100)={0x0, 0x1e2}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:16:09 executing program 2: setrlimit(0x40000000000008, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) 17:16:09 executing program 3: setrlimit(0x40000000000008, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) 17:16:09 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) 17:16:09 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) [ 47.619120][T10128] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 17:16:10 executing program 3: setrlimit(0x40000000000008, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) 17:16:10 executing program 2: setrlimit(0x40000000000008, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x4}, 0x3c) 17:16:10 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x83, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) fchmod(r1, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) 17:16:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) 17:16:10 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) 17:16:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000100)={0x0, 0x1e2}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:16:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000100)={0x0, 0x1e2}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:16:10 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) [ 47.942308][ T27] audit: type=1800 audit(1592932570.277:2): pid=10113 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=15761 res=0 17:16:10 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) 17:16:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x83, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) fchmod(r1, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) [ 48.050007][T10162] kvm [10153]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000026 [ 48.057126][T10161] kvm [10154]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000026 17:16:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) [ 48.090243][T10162] kvm [10153]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000005a [ 48.096584][T10161] kvm [10154]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000005a [ 48.119183][T10162] kvm [10153]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000005d 17:16:10 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) [ 48.132765][T10161] kvm [10154]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000005d [ 48.152561][T10162] kvm [10153]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000004a [ 48.166761][T10161] kvm [10154]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x4000004a 17:16:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) 17:16:10 executing program 2: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x83, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) fchmod(r1, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) [ 48.191343][T10162] kvm [10153]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000016 [ 48.206455][T10161] kvm [10154]: vcpu0, guest rIP: 0x145 Hyper-V unhandled rdmsr: 0x40000016 17:16:11 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x83, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) fchmod(r1, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) 17:16:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000100)={0x0, 0x1e2}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:16:11 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) 17:16:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000100)={0x0, 0x1e2}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:16:11 executing program 2: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x83, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) fchmod(r1, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) 17:16:11 executing program 0: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x83, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) fchmod(r1, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) 17:16:11 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) 17:16:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000100)={0x0, 0x1e2}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:16:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f0000000100)={0x0, 0x1e2}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x40000007, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, @perf_config_ext, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:16:11 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) 17:16:11 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) 17:16:11 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) 17:16:12 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x83, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) fchmod(r1, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) 17:16:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000040)=0x38) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r3, 0x0) setresuid(r1, 0x0, r3) 17:16:12 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) 17:16:12 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) 17:16:12 executing program 2: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x83, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) fchmod(r1, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) 17:16:12 executing program 0: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x83, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) fchmod(r1, 0x0) lsetxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='security.evm\x00', 0x0, 0x0, 0x0) 17:16:12 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) 17:16:12 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) 17:16:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000040)=0x38) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r3, 0x0) setresuid(r1, 0x0, r3) 17:16:12 executing program 3: r0 = syz_open_dev$audion(0x0, 0xb4, 0x100) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={0x0, &(0x7f0000000700)=""/214, &(0x7f00000000c0)="6b319ef33cdde3cbea16c7c2439616c4e2a130a185704e9eaf1a09b1c18787ccad1c089283d20569454a561251b8939870f3c52e0174db5d85ed6252576e48ac6f7e5a624140de32c581faec720579b8aa84adcbfc2c24005b3448", &(0x7f0000000800)="f1a3bbd2d5bd2a52afb542b1414e51f39b16cd02e2d35a791e285b85cb902ae110656f716ec1bde123706e56e001905f18bc632ff4f3325d8eb65611c42a41e010e38cd26ee17f36eaa2676e20c0695da53c9c6059551c64bdadc9ec441d60157babadeea37c79ca8bba700eb5136d595e9dfca1e59d5e88002d9e69a021401b72d7fc3b6523f8a8578d496fc86f2febdb5db2fd558905d52341072341694a", 0x1}, 0x38) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev, @in6=@loopback}, {0x0, 0x0, 0x6}, {0x0, 0x0, 0x0, 0x2}}, {{@in=@local}, 0x0, @in6=@local}}, 0xe8) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r3, &(0x7f0000000000)) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, 0x0, &(0x7f00000006c0)) syz_emit_ethernet(0x4a, &(0x7f00000008c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffe78fd03c987660c771a491b4ffffffff91000000bd00b7c3f149f0f920b6ad2aeb08bf10190000000000990e0000000000000000000000000000000000000000000000000000000000c367f01396adf515baa246a101d131dc08a0f1885770a3c33c217db9d622def9b1a350f95c1daff468946a58fd741ad637daee9908157a76e94d50ab5ab80e21f313d55caa26b8853fddd2302f3b882647c29244d7bd3aa90cbf8dc88ce24ef254e8f6c63604d656904c6f18"], 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x7a, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}]}, &(0x7f0000000180)=0x10) socket$inet(0x2, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r6 = socket$netlink(0x10, 0x3, 0x1b) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r5, &(0x7f0000000000)={@void, @val, @mpls={[], @ipv4=@tcp={{0x5, 0x4, 0x3, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {{0x0, 0x883e, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}, 0x32) 17:16:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f0000000000)=[{0x15, 0x0, 0x0, 0xfffff03c}, {0x6}]}, 0x10) 17:16:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000040)=0x38) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r3, 0x0) setresuid(r1, 0x0, r3) [ 50.557878][T10255] ================================================================== [ 50.565978][T10255] BUG: KCSAN: data-race in __xa_clear_mark / xas_find_marked [ 50.573324][T10255] [ 50.575640][T10255] write to 0xffff8880bb52dfb0 of 8 bytes by task 7 on cpu 0: [ 50.582990][T10255] __xa_clear_mark+0x229/0x350 [ 50.587737][T10255] test_clear_page_writeback+0x245/0x440 [ 50.593362][T10255] end_page_writeback+0x8e/0xf0 [ 50.598225][T10255] ext4_finish_bio+0x419/0x480 [ 50.602973][T10255] ext4_release_io_end+0x98/0x200 [ 50.607981][T10255] ext4_end_io_rsv_work+0x2f6/0x350 [ 50.614030][T10255] process_one_work+0x3cb/0x990 [ 50.618861][T10255] worker_thread+0x665/0xbe0 [ 50.623435][T10255] kthread+0x210/0x220 [ 50.627491][T10255] ret_from_fork+0x1f/0x30 [ 50.631882][T10255] [ 50.634196][T10255] read to 0xffff8880bb52dfb0 of 8 bytes by task 10255 on cpu 1: [ 50.642681][T10255] xas_find_marked+0x22f/0x6b0 [ 50.647434][T10255] find_get_pages_range_tag+0xa4/0x570 [ 50.652882][T10255] pagevec_lookup_range_tag+0x37/0x50 [ 50.658239][T10255] __filemap_fdatawait_range+0xab/0x1b0 [ 50.663766][T10255] file_write_and_wait_range+0xea/0x120 [ 50.669302][T10255] ext4_sync_file+0xe2/0x680 [ 50.673869][T10255] vfs_fsync_range+0x107/0x120 [ 50.678618][T10255] ext4_buffered_write_iter+0x34e/0x390 [ 50.684144][T10255] ext4_file_write_iter+0x4a3/0xfd0 [ 50.689326][T10255] __vfs_write+0x2d8/0x340 [ 50.693733][T10255] vfs_write+0x19b/0x350 [ 50.697962][T10255] ksys_write+0xce/0x180 [ 50.702196][T10255] __x64_sys_write+0x3e/0x50 [ 50.706794][T10255] do_syscall_64+0x71/0x120 [ 50.711286][T10255] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 50.717152][T10255] [ 50.719461][T10255] Reported by Kernel Concurrency Sanitizer on: [ 50.725597][T10255] CPU: 1 PID: 10255 Comm: syz-executor.0 Not tainted 5.8.0-rc2-syzkaller #0 [ 50.734248][T10255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.744288][T10255] ================================================================== [ 50.752331][T10255] Kernel panic - not syncing: panic_on_warn set ... [ 50.758912][T10255] CPU: 1 PID: 10255 Comm: syz-executor.0 Not tainted 5.8.0-rc2-syzkaller #0 [ 50.767566][T10255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 50.778565][T10255] Call Trace: [ 50.781843][T10255] dump_stack+0x10f/0x19d [ 50.786159][T10255] panic+0x1f8/0x63a [ 50.790038][T10255] ? vprintk_emit+0x44a/0x4f0 [ 50.794705][T10255] kcsan_report+0x684/0x690 [ 50.799196][T10255] ? kcsan_setup_watchpoint+0x453/0x4d0 [ 50.804730][T10255] ? xas_find_marked+0x22f/0x6b0 [ 50.809653][T10255] ? find_get_pages_range_tag+0xa4/0x570 [ 50.815268][T10255] ? pagevec_lookup_range_tag+0x37/0x50 [ 50.820889][T10255] ? __filemap_fdatawait_range+0xab/0x1b0 [ 50.826596][T10255] ? file_write_and_wait_range+0xea/0x120 [ 50.832300][T10255] ? ext4_sync_file+0xe2/0x680 [ 50.837053][T10255] ? vfs_fsync_range+0x107/0x120 [ 50.841984][T10255] ? ext4_buffered_write_iter+0x34e/0x390 [ 50.847697][T10255] ? ext4_file_write_iter+0x4a3/0xfd0 [ 50.853060][T10255] ? __vfs_write+0x2d8/0x340 [ 50.857641][T10255] ? vfs_write+0x19b/0x350 [ 50.862041][T10255] ? ksys_write+0xce/0x180 [ 50.866438][T10255] ? __x64_sys_write+0x3e/0x50 [ 50.871194][T10255] ? do_syscall_64+0x71/0x120 [ 50.875870][T10255] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 50.881940][T10255] ? __rcu_read_unlock+0x4b/0x260 [ 50.886984][T10255] kcsan_setup_watchpoint+0x453/0x4d0 [ 50.892351][T10255] xas_find_marked+0x22f/0x6b0 [ 50.897107][T10255] find_get_pages_range_tag+0xa4/0x570 [ 50.902557][T10255] pagevec_lookup_range_tag+0x37/0x50 [ 50.907919][T10255] __filemap_fdatawait_range+0xab/0x1b0 [ 50.913454][T10255] file_write_and_wait_range+0xea/0x120 [ 50.918987][T10255] ext4_sync_file+0xe2/0x680 [ 50.923566][T10255] ? tsan.module_ctor+0x10/0x10 [ 50.928405][T10255] vfs_fsync_range+0x107/0x120 [ 50.933165][T10255] ext4_buffered_write_iter+0x34e/0x390 [ 50.938702][T10255] ext4_file_write_iter+0x4a3/0xfd0 [ 50.943894][T10255] ? aa_file_perm+0x129/0xe00 [ 50.948645][T10255] ? do_filp_open+0x15e/0x1d0 [ 50.953328][T10255] __vfs_write+0x2d8/0x340 [ 50.957737][T10255] vfs_write+0x19b/0x350 [ 50.961967][T10255] ksys_write+0xce/0x180 [ 50.966199][T10255] __x64_sys_write+0x3e/0x50 [ 50.970775][T10255] do_syscall_64+0x71/0x120 [ 50.975269][T10255] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 50.981144][T10255] RIP: 0033:0x45cb09 [ 50.985012][T10255] Code: Bad RIP value. [ 50.989060][T10255] RSP: 002b:00007fcb184aac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 50.997457][T10255] RAX: ffffffffffffffda RBX: 000000000050dd00 RCX: 000000000045cb09 [ 51.005414][T10255] RDX: 00000000fffffc41 RSI: 0000000020001440 RDI: 0000000000000003 [ 51.013379][T10255] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 51.021336][T10255] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 51.029295][T10255] R13: 0000000000000d1d R14: 00000000004cf765 R15: 00007fcb184ab6d4 [ 51.038603][T10255] Kernel Offset: disabled [ 51.042912][T10255] Rebooting in 86400 seconds..