[ OK ] Started Getty on tty4. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.107' (ECDSA) to the list of known hosts. 2020/09/15 21:47:20 fuzzer started 2020/09/15 21:47:20 dialing manager at 10.128.0.26:35991 2020/09/15 21:47:21 syscalls: 3335 2020/09/15 21:47:21 code coverage: enabled 2020/09/15 21:47:21 comparison tracing: enabled 2020/09/15 21:47:21 extra coverage: enabled 2020/09/15 21:47:21 setuid sandbox: enabled 2020/09/15 21:47:21 namespace sandbox: enabled 2020/09/15 21:47:21 Android sandbox: /sys/fs/selinux/policy does not exist 2020/09/15 21:47:21 fault injection: enabled 2020/09/15 21:47:21 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/09/15 21:47:21 net packet injection: enabled 2020/09/15 21:47:21 net device setup: enabled 2020/09/15 21:47:21 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/09/15 21:47:21 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/09/15 21:47:21 USB emulation: enabled 2020/09/15 21:47:21 hci packet injection: enabled 21:48:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000002b00)='./file0\x00') 21:48:52 executing program 1: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1296], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f065581fffffff07004000632977fbac14140ee9", 0x0, 0x102, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 21:48:52 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000300)=@vsock, 0x80, 0x0, 0x0, &(0x7f0000000d00)=ANY=[], 0x1f8}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x3, 0x0, 0x1, 0x3f, 0x0, 0x8001, 0xc4002, 0x7, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xfffffff9, 0x0, @perf_bp={&(0x7f0000000740), 0x1}, 0x8, 0xe30d, 0x0, 0x8, 0x62, 0x9, 0x7}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000800)={0x5, 0x70, 0xec, 0x4, 0x30, 0x9, 0x0, 0x0, 0x200, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8003, 0x0, @perf_config_ext={0x0, 0x8}, 0x10524, 0x9, 0x400, 0x4, 0x9, 0xdbf, 0xffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) openat$cgroup_devices(r1, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x200408c4) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) 21:48:53 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000632c77fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 21:48:53 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000632c77fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 21:48:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) syzkaller login: [ 156.708560][ T6890] IPVS: ftp: loaded support on port[0] = 21 [ 156.950860][ T6890] chnl_net:caif_netlink_parms(): no params data found [ 157.125543][ T6892] IPVS: ftp: loaded support on port[0] = 21 [ 157.141153][ T6894] IPVS: ftp: loaded support on port[0] = 21 [ 157.188111][ T6890] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.197339][ T6890] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.206086][ T6890] device bridge_slave_0 entered promiscuous mode [ 157.218650][ T6890] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.226674][ T6890] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.234916][ T6890] device bridge_slave_1 entered promiscuous mode [ 157.323096][ T6890] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 157.381937][ T6890] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 157.391214][ T6896] IPVS: ftp: loaded support on port[0] = 21 [ 157.482664][ T6890] team0: Port device team_slave_0 added [ 157.574875][ T6890] team0: Port device team_slave_1 added [ 157.654545][ T6898] IPVS: ftp: loaded support on port[0] = 21 [ 157.757439][ T6892] chnl_net:caif_netlink_parms(): no params data found [ 157.786742][ T6890] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 157.795182][ T6890] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 157.846042][ T6890] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 157.873302][ T6894] chnl_net:caif_netlink_parms(): no params data found [ 157.905004][ T6890] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 157.912149][ T6890] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 157.941462][ T6890] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 157.979180][ T6906] IPVS: ftp: loaded support on port[0] = 21 [ 158.099602][ T6890] device hsr_slave_0 entered promiscuous mode [ 158.107153][ T6890] device hsr_slave_1 entered promiscuous mode [ 158.169814][ T6892] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.177306][ T6892] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.186705][ T6892] device bridge_slave_0 entered promiscuous mode [ 158.235324][ T6892] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.242997][ T6892] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.250728][ T6892] device bridge_slave_1 entered promiscuous mode [ 158.311575][ T6892] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 158.346317][ T6894] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.359253][ T6894] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.367978][ T6894] device bridge_slave_0 entered promiscuous mode [ 158.384560][ T6892] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 158.433761][ T6894] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.441030][ T6894] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.451543][ T6894] device bridge_slave_1 entered promiscuous mode [ 158.485513][ T6892] team0: Port device team_slave_0 added [ 158.495713][ T6892] team0: Port device team_slave_1 added [ 158.553614][ T6894] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 158.599140][ T6896] chnl_net:caif_netlink_parms(): no params data found [ 158.635090][ T6894] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 158.666716][ T6892] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 158.675357][ T6892] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 158.703685][ T2647] Bluetooth: hci0: command 0x0409 tx timeout [ 158.710716][ T6892] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 158.777231][ T6892] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 158.790409][ T6892] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 158.816459][ T6892] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 158.846672][ T6894] team0: Port device team_slave_0 added [ 158.894900][ T6906] chnl_net:caif_netlink_parms(): no params data found [ 158.906602][ T6898] chnl_net:caif_netlink_parms(): no params data found [ 158.927772][ T6894] team0: Port device team_slave_1 added [ 158.941724][ T23] Bluetooth: hci1: command 0x0409 tx timeout [ 159.048989][ T6894] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 159.057240][ T6894] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 159.085793][ T6894] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 159.091717][ T12] Bluetooth: hci2: command 0x0409 tx timeout [ 159.130404][ T6892] device hsr_slave_0 entered promiscuous mode [ 159.138627][ T6892] device hsr_slave_1 entered promiscuous mode [ 159.146389][ T6892] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 159.154507][ T6892] Cannot create hsr debugfs directory [ 159.176583][ T6894] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 159.183881][ T6894] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 159.209952][ T6894] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 159.297671][ T6896] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.311815][ T6896] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.319644][ T6896] device bridge_slave_0 entered promiscuous mode [ 159.333691][ T6896] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.340811][ T6896] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.342577][ T17] Bluetooth: hci3: command 0x0409 tx timeout [ 159.349438][ T6896] device bridge_slave_1 entered promiscuous mode [ 159.434835][ T6894] device hsr_slave_0 entered promiscuous mode [ 159.446523][ T6894] device hsr_slave_1 entered promiscuous mode [ 159.453733][ T6894] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 159.461273][ T6894] Cannot create hsr debugfs directory [ 159.513826][ T6896] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.532960][ T6890] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 159.563710][ T6906] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.570808][ T6906] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.581828][ T17] Bluetooth: hci4: command 0x0409 tx timeout [ 159.587192][ T6906] device bridge_slave_0 entered promiscuous mode [ 159.597609][ T6896] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 159.626871][ T6898] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.634108][ T6898] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.643805][ T6898] device bridge_slave_0 entered promiscuous mode [ 159.657111][ T6890] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 159.679925][ T6906] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.687827][ T6906] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.696263][ T6906] device bridge_slave_1 entered promiscuous mode [ 159.718610][ T6898] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.728157][ T6898] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.739072][ T6898] device bridge_slave_1 entered promiscuous mode [ 159.748253][ T6890] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 159.768897][ T6890] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 159.811556][ T2647] Bluetooth: hci5: command 0x0409 tx timeout [ 159.838673][ T6896] team0: Port device team_slave_0 added [ 159.857903][ T6898] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.894405][ T6906] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.910127][ T6906] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 159.921362][ T6896] team0: Port device team_slave_1 added [ 159.940762][ T6898] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 160.059030][ T6906] team0: Port device team_slave_0 added [ 160.086700][ T6896] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 160.098274][ T6896] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.124941][ T6896] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 160.138199][ T6896] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 160.145388][ T6896] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.172409][ T6896] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 160.197207][ T6898] team0: Port device team_slave_0 added [ 160.205240][ T6906] team0: Port device team_slave_1 added [ 160.238727][ T6898] team0: Port device team_slave_1 added [ 160.319401][ T6898] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 160.327758][ T6898] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.356403][ T6898] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 160.373980][ T6906] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 160.392250][ T6906] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.419464][ T6906] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 160.435477][ T6896] device hsr_slave_0 entered promiscuous mode [ 160.444858][ T6896] device hsr_slave_1 entered promiscuous mode [ 160.451399][ T6896] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 160.459790][ T6896] Cannot create hsr debugfs directory [ 160.469584][ T6898] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 160.478422][ T6898] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.507866][ T6898] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 160.521786][ T6892] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 160.531142][ T6906] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 160.546245][ T6906] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 160.574186][ T6906] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 160.614175][ T6892] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 160.629692][ T6892] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 160.642537][ T6892] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 160.738717][ T6898] device hsr_slave_0 entered promiscuous mode [ 160.746388][ T6898] device hsr_slave_1 entered promiscuous mode [ 160.753287][ T6898] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 160.760853][ T6898] Cannot create hsr debugfs directory [ 160.791781][ T23] Bluetooth: hci0: command 0x041b tx timeout [ 160.826831][ T6906] device hsr_slave_0 entered promiscuous mode [ 160.836885][ T6906] device hsr_slave_1 entered promiscuous mode [ 160.844722][ T6906] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 160.852520][ T6906] Cannot create hsr debugfs directory [ 160.870117][ T6894] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 160.937268][ T6894] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 160.950088][ T6894] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 161.012665][ T17] Bluetooth: hci1: command 0x041b tx timeout [ 161.014165][ T6894] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 161.160251][ T6896] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 161.172512][ T17] Bluetooth: hci2: command 0x041b tx timeout [ 161.189397][ T6896] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 161.233018][ T6896] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 161.292561][ T6890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.299572][ T6896] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 161.358410][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.370893][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.397950][ T6890] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.412862][ T23] Bluetooth: hci3: command 0x041b tx timeout [ 161.423898][ T6892] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.451976][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.464968][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.473783][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.481017][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.527142][ T3930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.535517][ T3930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.547051][ T3930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.555726][ T3930] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.562895][ T3930] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.583465][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.593657][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.601372][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.636638][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.659534][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.661073][ T23] Bluetooth: hci4: command 0x041b tx timeout [ 161.676007][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.686099][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.711939][ T6898] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 161.736649][ T6898] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 161.751321][ T6892] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.772433][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.787400][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.815310][ T6898] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 161.860550][ T3930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.870629][ T3930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.885195][ T3930] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.892364][ T3930] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.900684][ T3930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 161.913159][ T3930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 161.921461][ T3930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.934268][ T3930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.946744][ T3930] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.953883][ T3930] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.964188][ T3930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 161.978104][ T3930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 161.989509][ T6898] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 161.996504][ T17] Bluetooth: hci5: command 0x041b tx timeout [ 162.026102][ T6906] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 162.039659][ T6906] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 162.064980][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.076201][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.100489][ T6894] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.115292][ T6906] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 162.126743][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.159872][ T6896] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.170225][ T6890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.180814][ T6906] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 162.209392][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.220216][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.260448][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.269672][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.279017][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.288593][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.297168][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.311266][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.323551][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.337669][ T6894] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.375311][ T6892] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 162.385790][ T6892] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 162.402302][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.410791][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.425296][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.436147][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.449501][ T6896] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.486590][ T6890] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.497681][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.506011][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 162.514954][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 162.523483][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.533232][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.542460][ T2647] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.549544][ T2647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.557429][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.566443][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.575504][ T2647] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.582652][ T2647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.630733][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.639464][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.655912][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.667673][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.679434][ T2647] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.686575][ T2647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.698405][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.707361][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.717139][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.725724][ T2647] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.732884][ T2647] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.740485][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.749499][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.758650][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.767668][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.777056][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.785266][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.808820][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.818695][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.828026][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.855229][ T17] Bluetooth: hci0: command 0x040f tx timeout [ 162.902730][ T6892] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.941874][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.950927][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.976749][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.986836][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 162.995124][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 163.004646][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.048682][ T6894] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 163.063960][ T6894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.072720][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.081231][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.090320][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 163.100160][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.111238][ T23] Bluetooth: hci1: command 0x040f tx timeout [ 163.117361][ T2469] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.130752][ T2469] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.140400][ T2469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.154524][ T2469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.186352][ T6898] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.212062][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 163.220414][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.235610][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.244904][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.254453][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.263025][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.271701][ T6890] device veth0_vlan entered promiscuous mode [ 163.283907][ T17] Bluetooth: hci2: command 0x040f tx timeout [ 163.302989][ T6896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.369012][ T6890] device veth1_vlan entered promiscuous mode [ 163.384863][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 163.396036][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 163.404610][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 163.414649][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.456933][ T6894] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.478942][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 163.488050][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.498097][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.507337][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.522665][ T6898] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.522690][ T23] Bluetooth: hci3: command 0x040f tx timeout [ 163.537280][ T6892] device veth0_vlan entered promiscuous mode [ 163.560826][ T6892] device veth1_vlan entered promiscuous mode [ 163.580718][ T6906] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.591469][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.599693][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.607814][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 163.616436][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 163.624045][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 163.643369][ T6896] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.674774][ T2469] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 163.685222][ T2469] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.695769][ T2469] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.704923][ T2469] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.712062][ T2469] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.720707][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.741742][ T23] Bluetooth: hci4: command 0x040f tx timeout [ 163.779655][ T6906] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.789306][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 163.802226][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 163.810857][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 163.820537][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 163.833474][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.846003][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.855915][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.863072][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.875960][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.887809][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.896067][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 163.905031][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 163.918277][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 163.926977][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 163.935691][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.968251][ T6890] device veth0_macvtap entered promiscuous mode [ 163.987959][ T6890] device veth1_macvtap entered promiscuous mode [ 163.996287][ T6894] device veth0_vlan entered promiscuous mode [ 164.009312][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 164.018626][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 164.027164][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 164.036593][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 164.046024][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 164.055852][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 164.062506][ T17] Bluetooth: hci5: command 0x040f tx timeout [ 164.065184][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.099132][ T6892] device veth0_macvtap entered promiscuous mode [ 164.132287][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 164.145480][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.154618][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.163720][ T8194] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.170772][ T8194] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.178836][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.187965][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.197186][ T8194] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.204323][ T8194] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.212817][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.222058][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.237369][ T6892] device veth1_macvtap entered promiscuous mode [ 164.255489][ T6894] device veth1_vlan entered promiscuous mode [ 164.282376][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 164.290662][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 164.300703][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.309725][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.318160][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.327787][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.337243][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.346277][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 164.355962][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 164.365008][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.395000][ T6898] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 164.405532][ T6898] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 164.432936][ T6896] device veth0_vlan entered promiscuous mode [ 164.449862][ T6890] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 164.463171][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 164.471426][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 164.489758][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 164.499926][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.509102][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.518273][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.527226][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.536474][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.546005][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.555136][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 164.564562][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 164.584290][ T6896] device veth1_vlan entered promiscuous mode [ 164.599286][ T6890] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 164.611319][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.625002][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.635426][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.646545][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.655382][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 164.664499][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 164.702768][ T6890] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.720783][ T6890] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.730225][ T6890] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.739613][ T6890] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.767907][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.777459][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.788295][ T6892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 164.799862][ T6892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.813905][ T6892] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 164.845288][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 164.855907][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 164.866390][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 164.875296][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 164.883980][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 164.894560][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 164.908377][ T6898] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.925478][ T6892] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 164.936911][ T17] Bluetooth: hci0: command 0x0419 tx timeout [ 164.949481][ T6892] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 164.961216][ T6892] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 164.976623][ T6892] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.988000][ T6892] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.998021][ T6892] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 165.007209][ T6892] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 165.036900][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 165.045589][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 165.064265][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.074439][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 165.084183][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.093552][ T2647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.115547][ T6896] device veth0_macvtap entered promiscuous mode [ 165.127578][ T6906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.166082][ T6896] device veth1_macvtap entered promiscuous mode [ 165.175776][ T23] Bluetooth: hci1: command 0x0419 tx timeout [ 165.185369][ T6894] device veth0_macvtap entered promiscuous mode [ 165.248525][ T6894] device veth1_macvtap entered promiscuous mode [ 165.314775][ T6896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.333183][ T17] Bluetooth: hci2: command 0x0419 tx timeout [ 165.351885][ T6896] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.365654][ T6896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.376562][ T6896] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.405496][ T6896] batman_adv: batadv0: Interface activated: batadv_slave_0 21:49:02 executing program 0: [ 165.450986][ T6894] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.477585][ T6894] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.500348][ T6894] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 165.519851][ T6894] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.532190][ T6894] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 21:49:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x20, 0x4da, 0x1044, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f00000001c0)={0x0, 0x0, 0x5, &(0x7f0000000100)={0x5, 0xf, 0x5}}) [ 165.561772][ T6894] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.576706][ T6894] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 165.583096][ T23] Bluetooth: hci3: command 0x0419 tx timeout [ 165.591002][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 165.603784][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 165.622699][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 165.630999][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 165.640668][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 165.650660][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.661407][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 165.671144][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 165.680594][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 165.690568][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 165.734770][ T6896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.761099][ T6896] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.786252][ T6896] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.801004][ T6896] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.812083][ T3930] Bluetooth: hci4: command 0x0419 tx timeout [ 165.820080][ T6896] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 165.836443][ T6894] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.851429][ T6894] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.864284][ T6894] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.875542][ T6894] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.886473][ T6894] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 165.898505][ T6894] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 165.912167][ T6894] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 165.958829][ T6906] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.971700][ C1] hrtimer: interrupt took 41910 ns [ 165.973177][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 165.994533][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 166.022512][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 166.032331][ T23] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 166.067991][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.106355][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 166.141492][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 166.150324][ T3930] Bluetooth: hci5: command 0x0419 tx timeout [ 166.211612][ T6894] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.227210][ T6894] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.236645][ T6894] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.246717][ T6894] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.269014][ T6896] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.280971][ T6896] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.292068][ T23] usb 1-1: Using ep0 maxpacket: 32 [ 166.334750][ T6896] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.361149][ T6896] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.434765][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 166.486685][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 166.510221][ T23] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 166.527826][ T6898] device veth0_vlan entered promiscuous mode [ 166.586893][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 166.609722][ T8194] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 166.639283][ T6898] device veth1_vlan entered promiscuous mode [ 166.702351][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 166.711233][ T2687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 166.732213][ T23] usb 1-1: New USB device found, idVendor=04da, idProduct=1044, bcdDevice= 0.40 [ 166.741319][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 21:49:03 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c6138b7c754ff41c5d3cd1b6e0fe6ea2cd36efecfe2dd9f9ec1e7b23b2ede490fd56769cfa6c3a468000000c6f5512db3e2be521da27d76ce970484283a08b2e8b7f6d1f5e423f03c9a2834ea16", 0xa1}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, 0x78) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 166.757609][ T23] usb 1-1: Product: syz [ 166.774060][ T23] usb 1-1: Manufacturer: syz [ 166.812281][ T23] usb 1-1: SerialNumber: syz [ 166.845303][ T23] usbip-host 1-1: 1-1 is not in match_busid table... skip! [ 166.850964][ T8231] ptrace attach of "/root/syz-executor.1"[8230] was attempted by "/root/syz-executor.1"[8231] 21:49:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x36}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 166.900230][ T6906] device veth0_vlan entered promiscuous mode 21:49:03 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x12a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x37) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 166.942462][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 166.950986][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 21:49:03 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c6138b7c754ff41c5d3cd1b6e0fe6ea2cd36efecfe2dd9f9ec1e7b23b2ede49", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 167.025539][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 167.043529][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 167.075748][ T6898] device veth0_macvtap entered promiscuous mode [ 167.119215][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 167.135829][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready 21:49:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local, 0x400, 0x2}, 0x20) 21:49:04 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x2e}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 167.168484][ T8245] ptrace attach of "/root/syz-executor.2"[8244] was attempted by "/root/syz-executor.2"[8245] [ 167.172766][ T8247] ptrace attach of "/root/syz-executor.1"[8246] was attempted by "/root/syz-executor.1"[8247] [ 167.189912][ T8179] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 167.288071][ T6906] device veth1_vlan entered promiscuous mode 21:49:04 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2f9, 0x304, &(0x7f0000000040)="b90103600040f000009e0ff008001fffffe100004000632c77fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 167.343076][ T6898] device veth1_macvtap entered promiscuous mode 21:49:04 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c6138b7c754ff41c5d3cd1b6e0fe6ea2cd36efecfe2dd9f9ec1e7b23b2ede490fd56769cfa6c3a468000000c6f5512db3e2be521da27d76ce970484283a08b2e8b7f6d1", 0x97}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, 0x78) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 167.482511][ T6898] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 167.542911][ T6898] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.571377][ T8261] ptrace attach of "/root/syz-executor.1"[8259] was attempted by "/root/syz-executor.1"[8261] [ 167.586858][ T6898] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 167.621283][ T6898] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.648752][ T6898] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 167.675762][ T6898] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.690550][ T6898] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 167.714406][ T6898] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.737786][ T6898] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 167.770648][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 167.781295][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 167.803856][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 167.814363][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 167.870834][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 167.890993][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 167.913515][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 167.927462][ T6898] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 167.943688][ T6898] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.955485][ T6898] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 167.967420][ T6898] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 167.979320][ T6898] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 167.991221][ T6898] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.002552][ T6898] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 168.036411][ T6898] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.068989][ T6898] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 168.077511][ T6906] device veth0_macvtap entered promiscuous mode [ 168.086944][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 168.099987][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 168.110578][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 168.139967][ T6906] device veth1_macvtap entered promiscuous mode [ 168.153999][ T6898] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.164173][ T6898] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.173076][ T6898] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.181943][ T6898] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.225725][ T6906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.243108][ T6906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.253938][ T6906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.267019][ T6906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.278628][ T6906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.289133][ T6906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.299520][ T6906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.310089][ T6906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.320175][ T6906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 168.331751][ T6906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.343824][ T6906] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 168.357792][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 168.368239][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 168.382790][ T6906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 168.397046][ T6906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.407980][ T6906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 168.418518][ T6906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.428780][ T6906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 168.439305][ T6906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.449503][ T6906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 168.463018][ T6906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.472982][ T6906] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 168.483473][ T6906] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 168.495401][ T6906] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 168.511627][ T8225] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 168.521613][ T8225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 168.535043][ T6906] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.620673][ T6906] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.635863][ T6906] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.655750][ T6906] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.739395][ T23] usb 1-1: USB disconnect, device number 2 21:49:05 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x1d00, 0x0) 21:49:05 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b5ea791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7", 0x5c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 21:49:05 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="6653070000053c27", 0x8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0xee00}}}, 0x78) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 21:49:05 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1f5583624999c4665398664c3dd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4da035fcb039c7c6138b7c754ff41c5d3cd1b6eabd323eb69bf5ec29954", 0x60}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 21:49:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x39}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 21:49:05 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x88, 0x2a, 0x0, 0x300) [ 169.079260][ T8287] ptrace attach of "/root/syz-executor.2"[8284] was attempted by "/root/syz-executor.2"[8287] 21:49:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0xd}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 21:49:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x99}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 21:49:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x34}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 169.148728][ T8293] ptrace attach of "/root/syz-executor.5"[8292] was attempted by "/root/syz-executor.5"[8293] 21:49:06 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c6138b7c754ff41c5d3cd1b6e0fe6ea2cd36efecfe2dd9f9ec1e7b23b2ede490fd56769cfa6c3a468000000c6f5512db3e2be521da27d76ce970484283a08b2e8b7f6d1f5e423f03c9a2834ea16fae061", 0xa4}], 0x4, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, 0x78) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 21:49:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x2a}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 21:49:06 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1f5583624999c4665398664c3dd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4da035fcb039c7c6138b7c754ff41c5d3cd1b6eabd323eb69bf5ec29954197b556477f9a0d9d4f33ff3f3bfd238a216648e8cf5811c54dac5866b3158828cc5330ba05bbb041e42d520ae699d21dcaec99e9550bd20178af0b7f2", 0x9d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 21:49:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x2f}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 21:49:06 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:06 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1f5583624999c4665398664c3dd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4da035fcb039c7c6138b7c754ff41c5d3cd1b6eabd323eb69bf5ec29954197b556477f9a0d9d4f33ff3f3bfd238a216648e8cf5811c54dac5866b3158828cc5330ba05bbb041e42d520ae699d21dcaec99e9550bd20178af0b7f2be56f2e1e108ea1c7e3eb1bf3a7063654e67c917d52b9410c70ca6e79461d45e560f", 0xbf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 21:49:06 executing program 1: sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x5}, @FOU_ATTR_PEER_PORT={0x6}, @FOU_ATTR_PEER_V4={0x8, 0x8, @remote}, @FOU_ATTR_TYPE={0x5}, @FOU_ATTR_IPPROTO={0x5}, @FOU_ATTR_PORT={0x6}]}, 0x44}}, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 169.369317][ T8307] ptrace attach of "/root/syz-executor.1"[8306] was attempted by "/root/syz-executor.1"[8307] 21:49:06 executing program 5: syz_read_part_table(0x0, 0x0, &(0x7f0000000080)) 21:49:06 executing program 3: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) 21:49:06 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_hsr\x00', 0x3}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) ioctl(r0, 0x8936, &(0x7f0000000000)) setsockopt$inet6_group_source_req(r1, 0x29, 0x4e, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) 21:49:06 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:06 executing program 2: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) shutdown(r0, 0x0) [ 169.537636][ T8322] ptrace attach of "/root/syz-executor.2"[8320] was attempted by "/root/syz-executor.2"[8322] [ 169.570069][ T8325] ptrace attach of "/root/syz-executor.1"[8324] was attempted by "/root/syz-executor.1"[8325] 21:49:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:06 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 21:49:06 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:06 executing program 5: 21:49:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000006240)=[{{&(0x7f0000000040)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3c}}, 0x10, 0x0}}, {{0x0, 0x0, 0x0, 0x3e8}}], 0x2, 0x0) 21:49:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x23}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 21:49:06 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timerfd_create(0x6, 0x0) 21:49:06 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:06 executing program 5: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x10) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) ppoll(&(0x7f0000000080)=[{r2, 0x110}, {}], 0x2, &(0x7f0000000100)={r4}, 0x0, 0x0) 21:49:07 executing program 0: unshare(0x64040600) ioctl$CHAR_RAW_ROGET(0xffffffffffffffff, 0x125e, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) 21:49:07 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b5ea791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd56769320e2cbce6da8ed832f5", 0x89}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 21:49:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:07 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) gettid() prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:07 executing program 5: 21:49:07 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) gettid() prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) [ 170.218206][ T8372] IPVS: ftp: loaded support on port[0] = 21 21:49:07 executing program 2: [ 170.267441][ T8385] ptrace attach of "/root/syz-executor.2"[8381] was attempted by "/root/syz-executor.2"[8385] 21:49:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:07 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) gettid() prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:07 executing program 1: 21:49:07 executing program 5: [ 170.557160][ T7] tipc: TX() has been purged, node left! 21:49:07 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x3a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000040), &(0x7f0000000100)=0x8) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) 21:49:07 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(0x0, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:07 executing program 5: r0 = socket(0x2a, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f0000000080)={0x1, 0x3234564e, 0x3, @stepwise={0x80000001, 0x6, 0x5e57108a, 0x400000, 0x9, 0x404}}) getsockname(r0, &(0x7f0000016d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000016dc0)=0x80) socket$nl_route(0x10, 0x3, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4000, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=@dellink={0x20, 0x11, 0x1, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, 0x28}}, 0x20}}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f0000000140)={0x1, 0x70, 0xff, 0x9, 0x80, 0x2, 0x0, 0x4, 0x2000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x4, 0x100000000}, 0x100, 0x80000000, 0xfd, 0x4, 0x57af, 0x3, 0x9}, r6, 0x10, r1, 0x6) 21:49:07 executing program 1: r0 = socket$inet6(0xa, 0x800, 0xffd) r1 = creat(&(0x7f0000000080)='./file0\x00', 0xb8) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) syz_open_procfs$namespace(r2, &(0x7f0000000180)='ns/mnt\x00') read(r0, &(0x7f0000001100)=""/4096, 0x1000) ioctl$SOUND_PCM_READ_BITS(r1, 0x80045005, &(0x7f00000000c0)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000100)={{0x6c, @rand_addr=0x64010101, 0x4e22, 0x2, 'wlc\x00', 0x1b, 0x3, 0x3}, {@multicast2, 0x4e21, 0x2, 0x80, 0xff}}, 0x44) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r4, 0x8983, &(0x7f00000001c0)={0x3, 'netdevsim0\x00', {0x8000}, 0x5}) 21:49:07 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x1, 0xffffffffffffffff) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) unlink(&(0x7f0000000040)='./file0\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) connect$caif(r8, &(0x7f00000002c0)=@util={0x25, "ced01ebdb78a2ffefa808859fcb40707"}, 0x18) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x7e, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, 0x1407, 0x1, 0x70bd28, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r6}]}, 0xfffffffffffffffb}, 0x1, 0x0, 0x0, 0x4001}, 0x40810) unshare(0x20400) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 21:49:07 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(0x0, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:07 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1f5583624999c4665398664c3dd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4da035fcb039c7c6138b7c754ff41c5d3cd1b6eabd323eb69bf5ec29954197b556477f9a0d9d4f33ff3f3bfd238a216648e8cf5811c54dac5866b3158828cc5330ba05bbb041e42d520ae699d21dcaec99e9550bd20178af0", 0x9b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 21:49:07 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(0x0, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:07 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000006c0)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b5ea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be07", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 21:49:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0xb}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 21:49:07 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="1f5583624999c4665398664c3dd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4da035fcb039c7c6138b7c754ff41c5d3cd1b6eabd323eb69bf5ec29954197b556477f9a0d9d4f33ff3f3bfd238a216648e8cf5811c54dac5866b315882", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 21:49:07 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = gettid() tkill(r2, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:08 executing program 2: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x20, 0x4da, 0x1044, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f00000001c0)={0x0, 0x0, 0x19, &(0x7f0000000100)={0x5, 0xf, 0x19, 0x1, [@ss_container_id={0x14, 0x10, 0x4, 0x0, "3f89d4f8863576e94c7891b5208ebce7"}]}}) 21:49:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000001100)={&(0x7f0000000d40)=@abs, 0x6e, 0x0}, 0x0) 21:49:08 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c6138b7c754ff41c5d3cd1b6e0fe6ea2cd36efecfe2dd9f9ec1e7a468000000c6f5512db3e2be521da27d76ce970484283a08b2e8b7f6d1f5e423f03c9a2834ea16fae061560e99078f31ca8bf504b33eadc73de7d558e6cc117020738b489415dcd2915460ae92b656c94ef3dd3cbd0c72f53506392367fbec61fd98c0d9441950e6f32a68cd57ed5dc9bde0ce033c0a", 0xe4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:49:08 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010500)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x1400}, {&(0x7f0000010a00)="4379d52700000000001000000000000002000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xa6, 0x200000}, {&(0x7f0000010b00)="000000000000000000000000000000000000000000000000000000002964039d", 0x20, 0x200fe0}, {&(0x7f0000010c00)="00000000000000000000000000000000000000000000000000000006001700000001", 0x22, 0x2011e0}, {&(0x7f0000011600)="00000000000000000000000000000000000000000000000000000001000000004379d52700000000001000000000000002000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011700)="000000000000000000000000000000000000000000000000000000002964039d", 0x20, 0x205fe0}, {0x0, 0x0, 0x3e00000}], 0x0, &(0x7f0000012400)) 21:49:08 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = gettid() tkill(r2, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:08 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) timerfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:08 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = gettid() tkill(r2, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:08 executing program 5: openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) [ 171.387676][ T8476] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 171.397757][ T8476] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 171.418769][ T8476] F2FS-fs (loop0): invalid crc_offset: 0 21:49:08 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) timerfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) [ 171.432083][ T3930] usb 3-1: new high-speed USB device number 2 using dummy_hcd 21:49:08 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) setxattr$trusted_overlay_nlink(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 21:49:08 executing program 5: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x0, 0x0) syncfs(r0) close(r0) inotify_init() [ 171.486238][ T8476] F2FS-fs (loop0): Mismatch valid blocks 1 vs. 0 [ 171.501457][ T8476] F2FS-fs (loop0): Failed to initialize F2FS segment manager (-117) [ 171.608659][ T8476] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 171.634419][ T8476] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 171.664445][ T8476] F2FS-fs (loop0): invalid crc_offset: 0 [ 171.682218][ T3930] usb 3-1: Using ep0 maxpacket: 32 [ 171.694720][ T8476] F2FS-fs (loop0): Failed to initialize F2FS segment manager (-4) [ 171.902437][ T3930] usb 3-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 172.112339][ T3930] usb 3-1: New USB device found, idVendor=04da, idProduct=1044, bcdDevice= 0.40 [ 172.121426][ T3930] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 172.142012][ T3930] usb 3-1: Product: syz [ 172.146269][ T3930] usb 3-1: Manufacturer: syz [ 172.150868][ T3930] usb 3-1: SerialNumber: syz [ 172.183454][ T3930] usbip-host 3-1: 3-1 is not in match_busid table... skip! 21:49:11 executing program 2: 21:49:11 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = gettid() tkill(r0, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:11 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) timerfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:11 executing program 5: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x0, 0x0) syncfs(0xffffffffffffffff) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) 21:49:11 executing program 1: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x0, 0x0) syncfs(r0) close(r0) inotify_init1(0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 21:49:11 executing program 0: [ 174.135305][ T2469] usb 3-1: USB disconnect, device number 2 21:49:11 executing program 1: 21:49:11 executing program 5: 21:49:11 executing program 0: 21:49:11 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = gettid() tkill(r0, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:11 executing program 2: 21:49:11 executing program 1: 21:49:11 executing program 5: 21:49:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:11 executing program 0: 21:49:11 executing program 2: 21:49:11 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = gettid() tkill(r0, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:11 executing program 5: 21:49:11 executing program 1: 21:49:11 executing program 2: 21:49:11 executing program 0: 21:49:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:11 executing program 1: 21:49:11 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() tkill(r2, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:11 executing program 2: 21:49:11 executing program 5: 21:49:11 executing program 0: 21:49:11 executing program 3: r0 = timerfd_create(0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:11 executing program 1: 21:49:11 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() tkill(r2, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:11 executing program 2: 21:49:12 executing program 0: 21:49:12 executing program 5: 21:49:12 executing program 3: r0 = timerfd_create(0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:12 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() tkill(r2, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:12 executing program 2: 21:49:12 executing program 1: 21:49:12 executing program 0: 21:49:12 executing program 5: 21:49:12 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() tkill(r2, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:12 executing program 3: r0 = timerfd_create(0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:12 executing program 1: 21:49:12 executing program 2: 21:49:12 executing program 0: 21:49:12 executing program 5: 21:49:12 executing program 2: 21:49:12 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = timerfd_create(0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:12 executing program 0: 21:49:12 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() tkill(r2, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:12 executing program 1: 21:49:12 executing program 5: 21:49:12 executing program 2: 21:49:12 executing program 0: 21:49:12 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = timerfd_create(0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:12 executing program 1: 21:49:12 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() tkill(r2, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:12 executing program 5: 21:49:12 executing program 0: 21:49:12 executing program 2: 21:49:12 executing program 1: 21:49:12 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = timerfd_create(0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:12 executing program 5: 21:49:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:13 executing program 0: 21:49:13 executing program 2: 21:49:13 executing program 1: 21:49:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) timerfd_create(0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:13 executing program 5: 21:49:13 executing program 0: 21:49:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:13 executing program 2: 21:49:13 executing program 1: 21:49:13 executing program 5: 21:49:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) timerfd_create(0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:13 executing program 0: 21:49:13 executing program 2: 21:49:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:13 executing program 1: 21:49:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) timerfd_create(0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:13 executing program 2: 21:49:13 executing program 5: 21:49:13 executing program 0: 21:49:13 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:13 executing program 1: 21:49:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:13 executing program 2: 21:49:13 executing program 5: 21:49:13 executing program 0: 21:49:13 executing program 1: 21:49:13 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:13 executing program 2: 21:49:13 executing program 5: 21:49:13 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:14 executing program 0: 21:49:14 executing program 1: 21:49:14 executing program 2: 21:49:14 executing program 5: 21:49:14 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:14 executing program 0: 21:49:14 executing program 1: 21:49:14 executing program 2: 21:49:14 executing program 5: 21:49:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:14 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:14 executing program 0: 21:49:14 executing program 1: socket$kcm(0x10, 0x0, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/pid\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x2fd, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030700009e40f088641fffffe103004000638477fbac14143fe0004301c699da153f08a0e6e380f60105f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x5b00}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xb, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) 21:49:14 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, 0x0}, 0x0) 21:49:14 executing program 5: syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0) 21:49:14 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000400)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 21:49:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 21:49:14 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/1, 0x3}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:49:14 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x102}) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', @broadcast}) 21:49:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 21:49:14 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 177.924822][ T8701] mmap: syz-executor.0 (8701) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 21:49:14 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() tkill(r2, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) [ 178.014828][ T8711] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) 21:49:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x0) 21:49:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000400)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 21:49:15 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() tkill(r2, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) [ 178.211305][ T8711] device syzkaller1 entered promiscuous mode 21:49:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x0) 21:49:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000400)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 21:49:15 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() tkill(r2, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:15 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x15, 0x5, 0x0, &(0x7f0000000240)) 21:49:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d00000009000e00010040d5ae7d0200ff050005", 0x2e}], 0x1}, 0x80) socket$kcm(0x29, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x8104, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0c480e000d000000e8bd6efb250709000e000100240d48ff050005001201", 0x2e}], 0x1}, 0x1000000000000) 21:49:17 executing program 4: clone(0x4000010006dfd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) prctl$PR_SET_SECCOMP(0x7, 0x0, 0x0) 21:49:17 executing program 2: mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) 21:49:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = timerfd_create(0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open_tree(0xffffffffffffff9c, 0x0, 0x0) 21:49:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 21:49:17 executing program 1: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000380)='./bus\x00') creat(&(0x7f0000000400)='./bus\x00', 0x0) r0 = open(&(0x7f0000000200)='./bus\x00', 0x10103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) ftruncate(r0, 0xcf01) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) [ 181.043165][ T8775] ================================================================== [ 181.051951][ T8775] BUG: KASAN: null-ptr-deref in PageHuge+0x19/0x170 [ 181.059419][ T8775] Read of size 8 at addr 0000000000000000 by task syz-executor.1/8775 [ 181.067593][ T8775] [ 181.069969][ T8775] CPU: 0 PID: 8775 Comm: syz-executor.1 Not tainted 5.9.0-rc5-next-20200915-syzkaller #0 [ 181.079781][ T8775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.089854][ T8775] Call Trace: [ 181.093174][ T8775] dump_stack+0x198/0x1fb [ 181.096676][ T8782] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.5'. [ 181.097537][ T8775] ? PageHuge+0x19/0x170 [ 181.111055][ T8775] ? PageHuge+0x19/0x170 [ 181.115312][ T8775] kasan_report.cold+0x5/0x37 [ 181.120010][ T8775] ? PageHuge+0x19/0x170 [ 181.125227][ T8775] check_memory_region+0x13d/0x180 [ 181.130360][ T8775] PageHuge+0x19/0x170 [ 181.134447][ T8775] find_get_incore_page+0x165/0x2e0 [ 181.139684][ T8775] mincore_page+0x1e/0x310 [ 181.144111][ T8775] __mincore_unmapped_range+0x171/0x2c0 [ 181.149676][ T8775] mincore_pte_range+0x69f/0x980 [ 181.154640][ T8775] ? __do_sys_mincore+0x7a0/0x7a0 [ 181.159774][ T8775] __walk_page_range+0xeed/0x22c0 [ 181.164826][ T8775] ? walk_page_test+0x78/0x180 [ 181.169620][ T8775] walk_page_range+0x20d/0x400 [ 181.174396][ T8775] ? __walk_page_range+0x22c0/0x22c0 [ 181.179722][ T8775] ? vmacache_update+0xce/0x140 [ 181.184584][ T8775] __do_sys_mincore+0x279/0x7a0 [ 181.189450][ T8775] do_syscall_64+0x2d/0x70 [ 181.193874][ T8775] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 181.199785][ T8775] RIP: 0033:0x45d5f9 [ 181.203682][ T8775] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.223309][ T8775] RSP: 002b:00007f8d6b294c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 181.231744][ T8775] RAX: ffffffffffffffda RBX: 0000000000020ac0 RCX: 000000000045d5f9 [ 181.239731][ T8775] RDX: 0000000000000000 RSI: 0000000000400000 RDI: 0000000020000000 [ 181.247716][ T8775] RBP: 000000000118cf80 R08: 0000000000000000 R09: 0000000000000000 [ 181.255705][ T8775] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118cf4c [ 181.264311][ T8775] R13: 00007ffd32a131cf R14: 00007f8d6b2959c0 R15: 000000000118cf4c [ 181.272317][ T8775] ================================================================== [ 181.280415][ T8775] Disabling lock debugging due to kernel taint [ 181.288230][ T8775] Kernel panic - not syncing: panic_on_warn set ... [ 181.294837][ T8775] CPU: 0 PID: 8775 Comm: syz-executor.1 Tainted: G B 5.9.0-rc5-next-20200915-syzkaller #0 [ 181.306046][ T8775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.316106][ T8775] Call Trace: [ 181.319410][ T8775] dump_stack+0x198/0x1fb [ 181.323748][ T8775] ? hugetlb_register_node+0x1c0/0x270 [ 181.329214][ T8775] panic+0x347/0x7c0 [ 181.333120][ T8775] ? __warn_printk+0xf3/0xf3 [ 181.337713][ T8775] ? PageHuge+0x19/0x170 [ 181.341970][ T8775] ? trace_hardirqs_on+0x51/0x1c0 [ 181.347001][ T8775] ? PageHuge+0x19/0x170 [ 181.351244][ T8775] ? PageHuge+0x19/0x170 [ 181.355490][ T8775] end_report+0x58/0x5e [ 181.359650][ T8775] kasan_report.cold+0xd/0x37 [ 181.364354][ T8775] ? PageHuge+0x19/0x170 [ 181.368602][ T8775] check_memory_region+0x13d/0x180 [ 181.373720][ T8775] PageHuge+0x19/0x170 [ 181.377791][ T8775] find_get_incore_page+0x165/0x2e0 [ 181.382995][ T8775] mincore_page+0x1e/0x310 [ 181.387420][ T8775] __mincore_unmapped_range+0x171/0x2c0 [ 181.392984][ T8775] mincore_pte_range+0x69f/0x980 [ 181.397949][ T8775] ? __do_sys_mincore+0x7a0/0x7a0 [ 181.402989][ T8775] __walk_page_range+0xeed/0x22c0 [ 181.408027][ T8775] ? walk_page_test+0x78/0x180 [ 181.412805][ T8775] walk_page_range+0x20d/0x400 [ 181.417576][ T8775] ? __walk_page_range+0x22c0/0x22c0 [ 181.422871][ T8775] ? vmacache_update+0xce/0x140 [ 181.427726][ T8775] __do_sys_mincore+0x279/0x7a0 [ 181.432586][ T8775] do_syscall_64+0x2d/0x70 [ 181.437008][ T8775] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 181.442931][ T8775] RIP: 0033:0x45d5f9 [ 181.446927][ T8775] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.466627][ T8775] RSP: 002b:00007f8d6b294c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 181.475048][ T8775] RAX: ffffffffffffffda RBX: 0000000000020ac0 RCX: 000000000045d5f9 [ 181.483027][ T8775] RDX: 0000000000000000 RSI: 0000000000400000 RDI: 0000000020000000 [ 181.491004][ T8775] RBP: 000000000118cf80 R08: 0000000000000000 R09: 0000000000000000 [ 181.504193][ T8775] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118cf4c [ 181.512179][ T8775] R13: 00007ffd32a131cf R14: 00007f8d6b2959c0 R15: 000000000118cf4c [ 181.521251][ T8775] Kernel Offset: disabled [ 181.525572][ T8775] Rebooting in 86400 seconds..