[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 45.620485][ T26] audit: type=1800 audit(1570413782.855:25): pid=7993 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 45.657353][ T26] audit: type=1800 audit(1570413782.855:26): pid=7993 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 45.693046][ T26] audit: type=1800 audit(1570413782.865:27): pid=7993 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.10' (ECDSA) to the list of known hosts. 2019/10/07 02:03:14 fuzzer started 2019/10/07 02:03:15 dialing manager at 10.128.0.26:46355 2019/10/07 02:03:16 syscalls: 2523 2019/10/07 02:03:16 code coverage: enabled 2019/10/07 02:03:16 comparison tracing: enabled 2019/10/07 02:03:16 extra coverage: extra coverage is not supported by the kernel 2019/10/07 02:03:16 setuid sandbox: enabled 2019/10/07 02:03:16 namespace sandbox: enabled 2019/10/07 02:03:16 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/07 02:03:16 fault injection: enabled 2019/10/07 02:03:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/07 02:03:16 net packet injection: enabled 2019/10/07 02:03:16 net device setup: enabled 2019/10/07 02:03:16 concurrency sanitizer: /proc/kcsaninfo does not exist 02:04:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="05000800000000000000010000000000000008410000004c001800000000756470000000000000000000000000b603000000000000000000000000080000000000000000000000000000000000000000000000001000"/98], 0x68}}, 0x0) 02:05:00 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x80000, 0x66) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) socket(0xa, 0x1, 0x0) r4 = socket$inet(0xa, 0x801, 0x84) connect$inet(r4, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) syzkaller login: [ 162.842510][ T8161] IPVS: ftp: loaded support on port[0] = 21 [ 162.936480][ T8163] IPVS: ftp: loaded support on port[0] = 21 02:05:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000380)={r3, 0x274}, 0x8) [ 163.089526][ T8161] chnl_net:caif_netlink_parms(): no params data found [ 163.104498][ T8163] chnl_net:caif_netlink_parms(): no params data found [ 163.177115][ T8163] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.186310][ T8163] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.196617][ T8163] device bridge_slave_0 entered promiscuous mode [ 163.205686][ T8161] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.215359][ T8161] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.232716][ T8161] device bridge_slave_0 entered promiscuous mode [ 163.242886][ T8163] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.251647][ T8163] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.261825][ T8163] device bridge_slave_1 entered promiscuous mode 02:05:00 executing program 3: r0 = perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) move_pages(0x0, 0xfffffffffffffd99, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0xb0) [ 163.281628][ T8161] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.289702][ T8161] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.305260][ T8167] IPVS: ftp: loaded support on port[0] = 21 [ 163.316044][ T8161] device bridge_slave_1 entered promiscuous mode [ 163.371383][ T8163] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.419880][ T8161] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.448881][ T8161] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.470645][ T8163] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.506748][ T8161] team0: Port device team_slave_0 added [ 163.529383][ T8161] team0: Port device team_slave_1 added 02:05:00 executing program 4: open(0x0, 0x101000, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x80287010, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6d6f64653d3030303030303030303030303030305752920da869e6c02cfeaabf7d026f01653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303055e43030303030333737372c6d6f64653d30303030303030303030303030303030303030303030302c66756e633d4b455845435f4bb0f9616e4c5f4348080000006f626a5f726f6c653d4d41595f455845432c6861"]) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r1, 0x0) syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) [ 163.620491][ T8161] device hsr_slave_0 entered promiscuous mode [ 163.689695][ T8161] device hsr_slave_1 entered promiscuous mode [ 163.731472][ T8163] team0: Port device team_slave_0 added [ 163.748320][ T8163] team0: Port device team_slave_1 added [ 163.764312][ T8169] IPVS: ftp: loaded support on port[0] = 21 [ 163.813048][ T8171] IPVS: ftp: loaded support on port[0] = 21 02:05:01 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='maps\x00') r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000400)) socket$netlink(0x10, 0x3, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="401bccd3d2bb03000000148c0f34"], 0xe}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40020000000c) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x60008000) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x1, 0x0) [ 163.857655][ T8161] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.864890][ T8161] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.872978][ T8161] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.880708][ T8161] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.950030][ T8163] device hsr_slave_0 entered promiscuous mode [ 163.987735][ T8163] device hsr_slave_1 entered promiscuous mode [ 164.047851][ T8163] debugfs: Directory 'hsr0' with parent '/' already present! [ 164.092820][ T8175] IPVS: ftp: loaded support on port[0] = 21 [ 164.101138][ T8167] chnl_net:caif_netlink_parms(): no params data found [ 164.142180][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.161353][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.230810][ T8161] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.260934][ T8167] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.268752][ T8167] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.276454][ T8167] device bridge_slave_0 entered promiscuous mode [ 164.314248][ T8167] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.321465][ T8167] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.329361][ T8167] device bridge_slave_1 entered promiscuous mode [ 164.353063][ T8167] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.366156][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.376404][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.386971][ T8161] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.397325][ T8167] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.413635][ T8169] chnl_net:caif_netlink_parms(): no params data found [ 164.451585][ T8171] chnl_net:caif_netlink_parms(): no params data found [ 164.491822][ T8167] team0: Port device team_slave_0 added [ 164.499188][ T8167] team0: Port device team_slave_1 added [ 164.521117][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.532137][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.541017][ T8174] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.548171][ T8174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.558753][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.567787][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.576550][ T8174] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.583662][ T8174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.605998][ T8171] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.613696][ T8171] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.621794][ T8171] device bridge_slave_0 entered promiscuous mode [ 164.649513][ T8175] chnl_net:caif_netlink_parms(): no params data found [ 164.674504][ T8171] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.682612][ T8171] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.690761][ T8171] device bridge_slave_1 entered promiscuous mode [ 164.705081][ T8163] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.714556][ T8169] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.721867][ T8169] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.729827][ T8169] device bridge_slave_0 entered promiscuous mode [ 164.738900][ T8169] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.746001][ T8169] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.754026][ T8169] device bridge_slave_1 entered promiscuous mode [ 164.764976][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.788666][ T8171] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.839026][ T8167] device hsr_slave_0 entered promiscuous mode [ 164.897881][ T8167] device hsr_slave_1 entered promiscuous mode [ 164.947459][ T8167] debugfs: Directory 'hsr0' with parent '/' already present! [ 164.956668][ T8171] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.974158][ T8169] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.984895][ T8169] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.014305][ T8169] team0: Port device team_slave_0 added [ 165.027937][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.042270][ T8163] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.054874][ T8169] team0: Port device team_slave_1 added [ 165.065629][ T8175] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.075040][ T8175] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.083686][ T8175] device bridge_slave_0 entered promiscuous mode [ 165.091960][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.101407][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.110213][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.118202][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.126859][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.135911][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.144970][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.159135][ T8171] team0: Port device team_slave_0 added [ 165.165701][ T8175] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.173772][ T8175] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.181875][ T8175] device bridge_slave_1 entered promiscuous mode [ 165.199304][ T8175] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 165.210510][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.221000][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.245034][ T8171] team0: Port device team_slave_1 added [ 165.253500][ T8175] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.284185][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.293153][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.301723][ T8174] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.309025][ T8174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.317028][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.326102][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.335949][ T8174] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.343162][ T8174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.352301][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.361231][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.369914][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.420002][ T8169] device hsr_slave_0 entered promiscuous mode [ 165.487764][ T8169] device hsr_slave_1 entered promiscuous mode [ 165.527447][ T8169] debugfs: Directory 'hsr0' with parent '/' already present! [ 165.591454][ T8171] device hsr_slave_0 entered promiscuous mode [ 165.647828][ T8171] device hsr_slave_1 entered promiscuous mode [ 165.697632][ T8171] debugfs: Directory 'hsr0' with parent '/' already present! [ 165.707706][ T8161] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.739217][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.748763][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.757758][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.766630][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.777403][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.804058][ T8175] team0: Port device team_slave_0 added [ 165.811869][ T8175] team0: Port device team_slave_1 added [ 165.826840][ T8161] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.834948][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.844832][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.877427][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.889981][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.908896][ T8167] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.930561][ T8163] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 165.942363][ T8163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.999455][ T8175] device hsr_slave_0 entered promiscuous mode [ 166.047926][ T8175] device hsr_slave_1 entered promiscuous mode [ 166.087514][ T8175] debugfs: Directory 'hsr0' with parent '/' already present! [ 166.095348][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.103304][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.112317][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.122272][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.132964][ T8167] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.166431][ T8171] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.198265][ T8163] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.206338][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.224136][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.233922][ T8176] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.241246][ T8176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.250380][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.259268][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.270885][ T8176] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.279355][ T8176] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.291170][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.301358][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.335993][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.356815][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.380571][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.393213][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.403274][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.412678][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.421180][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.440458][ T8171] 8021q: adding VLAN 0 to HW filter on device team0 [ 166.462976][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.471201][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.481526][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 02:05:03 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)={0xa0000001}) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0}, 0x0) [ 166.494119][ T8167] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 166.505683][ T8167] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.530817][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.540622][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.551340][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.566071][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.575415][ T8174] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.582592][ T8174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.598714][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.614502][ T8169] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.639931][ T8180] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.651385][ T8180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.660941][ T8180] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.668234][ T8180] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.679742][ T8180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.712303][ T8175] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.728098][ T8167] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.738951][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.755986][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.768870][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.778579][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.789236][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.800480][ T8169] 8021q: adding VLAN 0 to HW filter on device team0 02:05:04 executing program 0: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) [ 166.836097][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.851300][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.869169][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.900179][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.919770][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.940340][ T8171] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 02:05:04 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="a48b12f728db4b2b5d2f2fba4fad273b1ea3e46f905080af4cf9f43b1136655aae84d1d2ce90ccb15322e200000000000000960f53691a655eb6989d32772cf2eebb1f6c785d6382fa7776ea267d32109a5633657b52873b9925f15a5b587ec8eaab2abd683c8ff8640f46e160757c496cd97afe9afbc943c0581476da2e55bac9db8afafc401f6a72bf90cba5701c0f05f6b7ae11ff4b92d979184dfab9ce8c9352ca52edb5b8", 0xa7}], 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 166.957121][ T8171] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.972179][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.986819][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.002656][ T8176] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.009881][ T8176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.019601][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.035517][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 02:05:04 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'default', 0x20, 'user:', '/', 0x20, 0xfa}, 0x2a, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 167.051721][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 167.064833][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 167.086902][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.101371][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.111051][ T8176] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.118235][ T8176] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.126306][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.141885][ T8175] 8021q: adding VLAN 0 to HW filter on device team0 02:05:04 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'default', 0x20, 'user:', '/', 0x20, 0xfa}, 0x2a, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 167.158779][ T8176] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 167.184756][ T2867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 02:05:04 executing program 2: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x0, 0x30}, 0xc) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x10094) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000002c0), 0xc) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="dbe32534e57ce0761c3427d59cd2a1e71cad3639f2c352369b37ec88a3c6925be7c56ff39e6e9f83b3d9d700007e0039a217b234ae6f8dc43a14e25393fa0443e18a0b60e2f4c4684ed8a683f09896a0dd8ce089123e8eea0671b882ea0892d1caf1a2580e7c5aba6e9a7189c86e59f8d752905993340e0d7016bf480984da9fe7082a988d97defa2975ba3cbb1245474a050ec2d08fa32db8bae74f5ad34aadf6165719c79f1cf04ba6b1b7c6a13c5453dd864c581d90dc08c6dfeada3823d6e9f6bdabb3408f9a"], 0x1a000) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0'}, 0xb) [ 167.219823][ T8171] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.239023][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.250044][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.292024][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 167.311706][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 167.323304][ T8181] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.331841][ T8181] bridge0: port 1(bridge_slave_0) entered forwarding state 02:05:04 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'default', 0x20, 'user:', '/', 0x20, 0xfa}, 0x2a, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 167.364568][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 167.379254][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 167.389941][ T8181] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.397070][ T8181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.406588][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.415955][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.425398][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 167.443227][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.452805][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 02:05:04 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r1 = open(0x0, 0x141042, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000580)) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) shmctl$IPC_STAT(0x0, 0x2, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) write$binfmt_script(r2, 0x0, 0x0) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f0000000080)=0xffff) arch_prctl$ARCH_GET_CPUID(0x1011) getresgid(&(0x7f0000000180), 0x0, &(0x7f00000002c0)) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) chdir(&(0x7f00000005c0)='./file0\x00') setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000300)=0x5, 0x4) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fsetxattr$security_selinux(r4, &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x0) r5 = socket(0x40000000000010, 0x2, 0x0) write(r5, &(0x7f0000000000)="260000001000f5680300c10100de96ab8d55ca3810fffff000ba00000000e138060003002ec9", 0x26) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000380)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x7c) [ 167.470113][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.489362][ T8181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 02:05:04 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'default', 0x20, 'user:', '/', 0x20, 0xfa}, 0x2a, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 167.513604][ T8169] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 167.532264][ T8169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.564409][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.584171][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.609803][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 167.680357][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 167.689995][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 167.710131][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 167.726468][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 167.756935][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 167.778466][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 167.804048][ T8251] debugfs: Directory 'loop0' with parent 'block' already present! [ 167.812835][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 167.827950][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 167.836684][ T8174] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 167.866589][ T8169] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 167.876593][ T8175] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 167.923459][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 167.923469][ T26] audit: type=1804 audit(1570413905.155:31): pid=8248 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir714647209/syzkaller.1OmF8Y/1/bus" dev="sda1" ino=16525 res=1 [ 167.943684][ C0] hrtimer: interrupt took 36529 ns [ 168.014383][ T8175] 8021q: adding VLAN 0 to HW filter on device batadv0 02:05:05 executing program 3: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x24d42ca6) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000015) 02:05:05 executing program 0: add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 02:05:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@local, @in6=@empty}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 02:05:05 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x4, &(0x7f00000001c0)=""/48) r1 = open(0x0, 0x141042, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000580)) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, 0x0) shmctl$IPC_STAT(0x0, 0x2, 0x0) shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffd000/0x3000)=nil) write$binfmt_script(r2, 0x0, 0x0) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f0000000080)=0xffff) arch_prctl$ARCH_GET_CPUID(0x1011) getresgid(&(0x7f0000000180), 0x0, &(0x7f00000002c0)) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) chdir(&(0x7f00000005c0)='./file0\x00') setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000300)=0x5, 0x4) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fsetxattr$security_selinux(r4, &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x0) r5 = socket(0x40000000000010, 0x2, 0x0) write(r5, &(0x7f0000000000)="260000001000f5680300c10100de96ab8d55ca3810fffff000ba00000000e138060003002ec9", 0x26) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000380)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0x7c) 02:05:05 executing program 4: open(0x0, 0x101000, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x80287010, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6d6f64653d3030303030303030303030303030305752920da869e6c02cfeaabf7d026f01653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303055e43030303030333737372c6d6f64653d30303030303030303030303030303030303030303030302c66756e633d4b455845435f4bb0f9616e4c5f4348080000006f626a5f726f6c653d4d41595f455845432c6861"]) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r1, 0x0) syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) 02:05:05 executing program 5: open(0x0, 0x101000, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x80287010, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6d6f64653d3030303030303030303030303030305752920da869e6c02cfeaabf7d026f01653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303055e43030303030333737372c6d6f64653d30303030303030303030303030303030303030303030302c66756e633d4b455845435f4bb0f9616e4c5f4348080000006f626a5f726f6c653d4d41595f455845432c6861"]) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r1, 0x0) syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) [ 168.244658][ T8274] ptrace attach of "/root/syz-executor.5"[8273] was attempted by "/root/syz-executor.5"[8274] [ 168.325135][ T8284] encrypted_key: insufficient parameters specified 02:05:05 executing program 0: add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 02:05:05 executing program 5: creat(&(0x7f0000000300)='./file0\x00', 0x22) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000340)={0x7, 0x15, 0x2}, 0x7) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0xbb8) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r6, 0x28007d) sendfile(r6, r6, 0x0, 0x2008000fffffffe) openat$cgroup_type(r3, 0x0, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000400)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0xfffffffffffffd74, 0x2) r7 = epoll_create1(0x0) r8 = epoll_create1(0x0) close(r7) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f0000000780)={0x4000201f}) epoll_ctl$EPOLL_CTL_MOD(r8, 0x3, r7, &(0x7f0000000180)) fcntl$setpipe(r7, 0x407, 0x8) lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:locale_t:s0\x00', 0x1e, 0x2) 02:05:05 executing program 4: open(0x0, 0x101000, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(0x0, 0x1, 0x2) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x80287010, &(0x7f0000000040)) ioctl$sock_bt_hidp_HIDPGETCONNLIST(0xffffffffffffffff, 0x800448d2, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6d6f64653d3030303030303030303030303030305752920da869e6c02cfeaabf7d026f01653d30303030303030303030303030303030303030303030332c6d6f64653d30303030303030303030303055e43030303030333737372c6d6f64653d30303030303030303030303030303030303030303030302c66756e633d4b455845435f4bb0f9616e4c5f4348080000006f626a5f726f6c653d4d41595f455845432c6861"]) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r1, 0x0) syz_open_procfs(0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) 02:05:05 executing program 0: add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 168.510792][ T8293] encrypted_key: insufficient parameters specified 02:05:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@local, @in6=@empty}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) [ 168.742457][ T8304] devpts: called with bogus options [ 168.752878][ T8309] encrypted_key: insufficient parameters specified 02:05:06 executing program 0: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 168.866744][ T8312] encrypted_key: insufficient parameters specified 02:05:06 executing program 3: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000180)=""/28, 0x24d42ca6) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x200000000bd}) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000015) 02:05:06 executing program 4: write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000580)={0x8, "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", 0x1000}, 0x10000005c) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000004c0)={r2, @local, @broadcast}, 0xc) accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='net/fib_trie\x00') r4 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x7, 0x10000) statx(r4, &(0x7f0000000300)='./file0\x00', 0x6000, 0x20, &(0x7f0000000340)) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) getsockopt$inet_udp_int(r5, 0x11, 0x6c, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000000)) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x6, 0x0) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) getdents64(r6, &(0x7f00000005c0)=""/4096, 0x1000) 02:05:06 executing program 1: creat(&(0x7f0000000300)='./file0\x00', 0x22) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000340)={0x7, 0x15, 0x2}, 0x7) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0xbb8) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r6, 0x28007d) sendfile(r6, r6, 0x0, 0x2008000fffffffe) openat$cgroup_type(r3, 0x0, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000400)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0xfffffffffffffd74, 0x2) r7 = epoll_create1(0x0) r8 = epoll_create1(0x0) close(r7) epoll_ctl$EPOLL_CTL_MOD(r8, 0x3, r7, &(0x7f0000000180)) fcntl$setpipe(r7, 0x407, 0x8) lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:locale_t:s0\x00', 0x1e, 0x0) 02:05:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x400300, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@local, @in6=@empty}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 02:05:06 executing program 0: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 169.364620][ T8329] devpts: called with bogus options [ 169.396136][ T8328] encrypted_key: insufficient parameters specified 02:05:06 executing program 1: creat(&(0x7f0000000300)='./file0\x00', 0x22) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000340)={0x7, 0x15, 0x2}, 0x7) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0xbb8) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x1e9042, 0x2) ftruncate(r6, 0x28007d) sendfile(r6, r6, 0x0, 0x2008000fffffffe) openat$cgroup_type(r3, 0x0, 0x2, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000400)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0xfffffffffffffd74, 0x2) r7 = epoll_create1(0x0) r8 = epoll_create1(0x0) close(r7) epoll_ctl$EPOLL_CTL_MOD(r8, 0x3, r7, &(0x7f0000000180)) fcntl$setpipe(r7, 0x407, 0x8) lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:locale_t:s0\x00', 0x1e, 0x0) 02:05:06 executing program 0: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 169.529662][ T8314] devpts: called with bogus options [ 169.544139][ T8348] ------------[ cut here ]------------ [ 169.554371][ T8348] WARNING: CPU: 0 PID: 8348 at fs/readdir.c:150 filldir64+0x524/0x620 [ 169.554441][ T3892] kobject: 'loop2' (00000000d1e150a2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 169.564964][ T8348] Kernel panic - not syncing: panic_on_warn set ... [ 169.564995][ T8348] CPU: 0 PID: 8348 Comm: syz-executor.4 Not tainted 5.4.0-rc1+ #0 [ 169.565001][ T8348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.565006][ T8348] Call Trace: [ 169.565033][ T8348] dump_stack+0x1d8/0x2f8 [ 169.565047][ T8348] panic+0x25c/0x799 [ 169.565059][ T8348] ? __warn+0x105/0x210 [ 169.565075][ T8348] ? filldir64+0x524/0x620 [ 169.590089][ T8350] devpts: called with bogus options [ 169.595700][ T8348] __warn+0x20e/0x210 [ 169.595716][ T8348] ? filldir64+0x524/0x620 [ 169.595729][ T8348] report_bug+0x1b6/0x2f0 [ 169.595737][ T8348] ? filldir64+0x524/0x620 [ 169.595751][ T8348] do_error_trap+0xd7/0x440 [ 169.595765][ T8348] do_invalid_op+0x36/0x40 [ 169.595772][ T8348] ? filldir64+0x524/0x620 [ 169.595784][ T8348] invalid_op+0x23/0x30 [ 169.595803][ T8348] RIP: 0010:filldir64+0x524/0x620 [ 169.618955][ T8353] encrypted_key: insufficient parameters specified [ 169.623450][ T8348] Code: 00 00 c7 03 f2 ff ff ff b8 f2 ff ff ff 48 83 c4 60 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 55 2c b9 ff 0f 0b eb 07 e8 4c 2c b9 ff <0f> 0b 49 83 c6 24 4c 89 f0 48 c1 e8 03 42 8a 04 20 84 c0 0f 85 b6 [ 169.623458][ T8348] RSP: 0018:ffff888059677b88 EFLAGS: 00010283 [ 169.623466][ T8348] RAX: ffffffff81ba0624 RBX: 000000000000000c RCX: 0000000000040000 [ 169.623470][ T8348] RDX: ffffc9000ebaf000 RSI: 00000000000022a6 RDI: 00000000000022a7 [ 169.623476][ T8348] RBP: ffff888059677c10 R08: ffffffff81ba0134 R09: 0000000000000004 [ 169.623480][ T8348] R10: fffffbfff1120afb R11: 0000000000000000 R12: dffffc0000000000 [ 169.623485][ T8348] R13: ffff888059677d30 R14: ffff888059677e88 R15: 000000000000000c [ 169.623510][ T8348] ? filldir64+0x34/0x620 [ 169.623518][ T8348] ? filldir64+0x524/0x620 [ 169.623532][ T8348] ? filldir64+0x524/0x620 [ 169.623548][ T8348] ? _raw_spin_unlock+0x2c/0x50 [ 169.623564][ T8348] ? iunique+0x1d9/0x200 [ 169.661452][ T3892] kobject: 'loop0' (00000000a7915435): kobject_uevent_env [ 169.664822][ T8348] ? ksys_getdents64+0x3f0/0x3f0 [ 169.664833][ T8348] __fat_readdir+0x1320/0x1a50 [ 169.664852][ T8348] ? retint_kernel+0x2b/0x2b [ 169.664878][ T8348] ? __kasan_check_write+0x14/0x20 [ 169.664885][ T8348] ? down_read_killable+0x11e/0x410 [ 169.664898][ T8348] fat_readdir+0x46/0x50 [ 169.664907][ T8348] iterate_dir+0x2a4/0x520 [ 169.664921][ T8348] ksys_getdents64+0x1ea/0x3f0 [ 169.664931][ T8348] ? ksys_getdents64+0x3f0/0x3f0 [ 169.664944][ T8348] __x64_sys_getdents64+0x7a/0x90 [ 169.664959][ T8348] do_syscall_64+0xf7/0x1c0 [ 169.664973][ T8348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 169.664984][ T8348] RIP: 0033:0x459a59 [ 169.664996][ T8348] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 169.665006][ T8348] RSP: 002b:00007f09d9b54c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 169.665016][ T8348] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 169.665022][ T8348] RDX: 0000000000001000 RSI: 00000000200005c0 RDI: 0000000000000008 [ 169.665027][ T8348] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 169.665032][ T8348] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f09d9b556d4 [ 169.665037][ T8348] R13: 00000000004c0533 R14: 00000000004d2c58 R15: 00000000ffffffff [ 169.670984][ T8348] Kernel Offset: disabled [ 169.957084][ T8348] Rebooting in 86400 seconds..