[info] Using makefile-style concurrent boot in runlevel 2. [ 52.425750][ T27] audit: type=1800 audit(1577045449.762:21): pid=7758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 52.469195][ T27] audit: type=1800 audit(1577045449.762:22): pid=7758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.75' (ECDSA) to the list of known hosts. 2019/12/22 20:10:59 fuzzer started 2019/12/22 20:11:01 dialing manager at 10.128.0.105:34873 2019/12/22 20:11:01 syscalls: 2692 2019/12/22 20:11:01 code coverage: enabled 2019/12/22 20:11:01 comparison tracing: enabled 2019/12/22 20:11:01 extra coverage: enabled 2019/12/22 20:11:01 setuid sandbox: enabled 2019/12/22 20:11:01 namespace sandbox: enabled 2019/12/22 20:11:01 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/22 20:11:01 fault injection: enabled 2019/12/22 20:11:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/22 20:11:01 net packet injection: enabled 2019/12/22 20:11:01 net device setup: enabled 2019/12/22 20:11:01 concurrency sanitizer: enabled 2019/12/22 20:11:01 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 71.871096][ T7931] KCSAN: could not find function: 'poll_schedule_timeout' 2019/12/22 20:11:12 adding functions to KCSAN blacklist: '__hrtimer_run_queues' 'n_tty_receive_buf_common' 'ext4_free_inode' 'ext4_free_inodes_count' 'timer_clear_idle' 'taskstats_exit' 'blk_mq_free_request' 'vti_tunnel_xmit' 'ext4_nonda_switch' 'rcu_gp_fqs_loop' 'tick_do_update_jiffies64' 'l2tp_tunnel_del_work' 'pid_update_inode' 'iomap_dio_bio_actor' 'clear_inode' 'fasync_remove_entry' 'tick_nohz_next_event' 'xas_clear_mark' 'kauditd_thread' 'blk_stat_add' 'ext4_writepages' 'vm_area_dup' 'blk_mq_get_request' 'do_exit' 'blk_mq_run_hw_queue' 'audit_log_start' 'mm_update_next_owner' 'tomoyo_check_path_acl' 'rcu_gp_fqs_check_wake' 'lruvec_lru_size' 'echo_char' 'xas_find_marked' 'wbt_issue' 'tomoyo_supervisor' 'ep_poll' 'do_syslog' 'tick_nohz_idle_stop_tick' 'dd_has_work' 'sit_tunnel_xmit' '__rcu_read_unlock' 'do_wait' 'ext4_has_free_clusters' '__snd_rawmidi_transmit_ack' 'run_timer_softirq' 'mod_timer' 'poll_schedule_timeout' 'generic_fillattr' 'file_update_time' 'find_get_pages_range_tag' 'process_srcu' 'blk_mq_dispatch_rq_list' 'sbitmap_queue_clear' 'wbt_done' 'ext4_mb_good_group' 'list_lru_count_one' 'add_timer' 'find_next_bit' 'generic_update_time' '__d_lookup_done' 'virtqueue_disable_cb' '__mark_inode_dirty' 'wbt_wait' 'do_nanosleep' 'tick_sched_do_timer' 'generic_write_end' 'do_try_to_free_pages' 'blk_mq_sched_dispatch_requests' '__ext4_new_inode' 'copy_process' 'ktime_get_real_seconds' 'evict' '__delete_from_page_cache' 20:14:20 executing program 0: socket$packet(0x11, 0x0, 0x300) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000140)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x23f, 0x0) 20:14:20 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000680)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000007961e62273faa6884c44825cc4f142133d4a1cac53819fdae7457ba5d3ba499ec59da4d9b328adb27bfdd1f0db151dc579f7b479da523c05800e77336db7b45ef272ad81871e36fb954d66ceb505dc4cd64e1e10c117862acd26bc795fba6eb128a5848c8c9aac0e237d424d256991b88f67f3802c90a5be30dea5def7b0eee58f25b9e9973be15ab16f0d4718533a4bd5d74b1741876ff02e7990915e2e5746f5435825fcf5be01b8a7d101817166afe02c0a229c7eba75482f1cfb65af99d4e4cb419b118f4ff211e1b27ee4ae57c5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x0, &(0x7f0000000280)="b95b03b700030000009e40f04f031fffffe100004000638877fbac141412e0004301c699da153f08a0e6e380f60104f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b33", 0x0, 0xfd, 0x6000000000000000}, 0x28) [ 263.381857][ T7934] IPVS: ftp: loaded support on port[0] = 21 [ 263.511190][ T7934] chnl_net:caif_netlink_parms(): no params data found [ 263.543109][ T7937] IPVS: ftp: loaded support on port[0] = 21 20:14:20 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40030420}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="040100002500200029bd7000fddbdf25150000009812fe7ee9dc7a072b74232f883d1a6cca7b0f3ca1a132fdc07a95f43805d65879a1677536c81e060761ed381a009389702628edb9805cf9b7fbffaf5f94b170667e26a3973020718ccb109eda419f89b825a616088d3b7f3a2865bad908d6c9f489209a0d2c459e6d351df2894fc58cba2b8696e8a9e37e2c4cd838cc7f73fe34812adca21e53deb7f47f5fa35180bc614d56bac8b97d613c35dd0489be8017a36eeda97d5d39f2a61d22e9a32b8dbe78d27ca899c166514d342f9bab9422b4092bb6e30fbc681d3fcdc9c0acf47501a5c66a5bdf5f1c40f23efab173a9248d"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x1, 0x0, 0x0, ' \x00'}}) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 263.582695][ T7934] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.590738][ T7934] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.598671][ T7934] device bridge_slave_0 entered promiscuous mode [ 263.627062][ T7934] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.634126][ T7934] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.649222][ T7934] device bridge_slave_1 entered promiscuous mode [ 263.700842][ T7941] IPVS: ftp: loaded support on port[0] = 21 [ 263.711715][ T7934] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 263.745841][ T7934] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 263.768625][ T7937] chnl_net:caif_netlink_parms(): no params data found [ 263.801149][ T7934] team0: Port device team_slave_0 added [ 263.818526][ T7934] team0: Port device team_slave_1 added [ 263.853649][ T7937] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.860749][ T7937] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.868898][ T7937] device bridge_slave_0 entered promiscuous mode [ 263.891338][ T7937] bridge0: port 2(bridge_slave_1) entered blocking state 20:14:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$FS_IOC_RESVSP(r0, 0x40305839, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000003}) [ 263.898564][ T7937] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.906559][ T7937] device bridge_slave_1 entered promiscuous mode [ 263.937043][ T7934] device hsr_slave_0 entered promiscuous mode [ 263.975387][ T7934] device hsr_slave_1 entered promiscuous mode [ 264.051753][ T7937] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 264.062071][ T7937] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 264.111105][ T7934] netdevsim netdevsim0 netdevsim0: renamed from eth0 20:14:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x9) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) [ 264.177604][ T7937] team0: Port device team_slave_0 added [ 264.189654][ T7941] chnl_net:caif_netlink_parms(): no params data found [ 264.208781][ T7937] team0: Port device team_slave_1 added [ 264.214509][ T7934] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 264.268432][ T7934] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 264.328715][ T7934] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 264.336283][ T7946] IPVS: ftp: loaded support on port[0] = 21 20:14:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000000040)={0x0, 0xffff}, 0x10) recvfrom$inet(r0, 0x0, 0x100000045, 0x0, 0x0, 0x800e004a9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) readv(r1, &(0x7f0000000840)=[{&(0x7f0000000040)=""/166, 0xa6}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) shutdown(r1, 0x0) [ 264.469271][ T7937] device hsr_slave_0 entered promiscuous mode [ 264.545407][ T7937] device hsr_slave_1 entered promiscuous mode [ 264.585132][ T7937] debugfs: Directory 'hsr0' with parent '/' already present! [ 264.610318][ T7948] IPVS: ftp: loaded support on port[0] = 21 [ 264.632540][ T7950] IPVS: ftp: loaded support on port[0] = 21 [ 264.661252][ T7941] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.668503][ T7941] bridge0: port 1(bridge_slave_0) entered disabled state [ 264.676546][ T7941] device bridge_slave_0 entered promiscuous mode [ 264.700970][ T7941] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.708084][ T7941] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.716747][ T7941] device bridge_slave_1 entered promiscuous mode [ 264.761144][ T7941] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 264.799267][ T7941] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 264.808615][ T7937] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 264.867049][ T7937] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 264.907153][ T7937] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 264.950740][ T7937] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 265.017008][ T7948] chnl_net:caif_netlink_parms(): no params data found [ 265.076378][ T7941] team0: Port device team_slave_0 added [ 265.083339][ T7941] team0: Port device team_slave_1 added [ 265.096953][ T7934] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.132568][ T7946] chnl_net:caif_netlink_parms(): no params data found [ 265.207477][ T7941] device hsr_slave_0 entered promiscuous mode [ 265.245394][ T7941] device hsr_slave_1 entered promiscuous mode [ 265.285108][ T7941] debugfs: Directory 'hsr0' with parent '/' already present! [ 265.318578][ T7934] 8021q: adding VLAN 0 to HW filter on device team0 [ 265.340443][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.348313][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.357441][ T7948] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.364464][ T7948] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.372212][ T7948] device bridge_slave_0 entered promiscuous mode [ 265.381380][ T7948] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.388922][ T7948] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.396824][ T7948] device bridge_slave_1 entered promiscuous mode [ 265.421221][ T7948] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 265.436009][ T7948] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 265.445315][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.453821][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.462490][ T7943] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.469512][ T7943] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.478080][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 265.486387][ T7941] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 265.526871][ T7941] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 265.567051][ T7950] chnl_net:caif_netlink_parms(): no params data found [ 265.592802][ T7948] team0: Port device team_slave_0 added [ 265.601429][ T7941] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 265.657188][ T7941] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 265.724847][ T7948] team0: Port device team_slave_1 added [ 265.730569][ T7946] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.737993][ T7946] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.745941][ T7946] device bridge_slave_0 entered promiscuous mode [ 265.752994][ T7946] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.760083][ T7946] bridge0: port 2(bridge_slave_1) entered disabled state [ 265.768263][ T7946] device bridge_slave_1 entered promiscuous mode [ 265.775745][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.784422][ T2886] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.792936][ T2886] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.799964][ T2886] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.811179][ T7937] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.849341][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 265.858355][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 265.867971][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 265.876578][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.947262][ T7948] device hsr_slave_0 entered promiscuous mode [ 265.985695][ T7948] device hsr_slave_1 entered promiscuous mode [ 266.025119][ T7948] debugfs: Directory 'hsr0' with parent '/' already present! [ 266.039407][ T7946] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.055577][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 266.063806][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 266.072857][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.081864][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 266.089616][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.097334][ T7950] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.104358][ T7950] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.112302][ T7950] device bridge_slave_0 entered promiscuous mode [ 266.120873][ T7950] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.131056][ T7950] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.139100][ T7950] device bridge_slave_1 entered promiscuous mode [ 266.162548][ T7950] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 266.172647][ T7946] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.183699][ T7937] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.193879][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 266.202434][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 266.210794][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 266.219076][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 266.228300][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.237047][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.245835][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.252857][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.260815][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.270233][ T7934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 266.280890][ T7950] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.314366][ T7950] team0: Port device team_slave_0 added [ 266.325728][ T7950] team0: Port device team_slave_1 added [ 266.343957][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.352575][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.361242][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.368333][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.394634][ T7934] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 266.410320][ T7946] team0: Port device team_slave_0 added [ 266.420309][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.429681][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 266.437297][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.444694][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.453875][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.462564][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 266.477997][ T7937] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 266.488599][ T7937] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 266.526673][ T7950] device hsr_slave_0 entered promiscuous mode [ 266.575738][ T7950] device hsr_slave_1 entered promiscuous mode [ 266.625141][ T7950] debugfs: Directory 'hsr0' with parent '/' already present! [ 266.638548][ T7946] team0: Port device team_slave_1 added [ 266.645109][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 266.654378][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 266.663086][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.671776][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 266.680209][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 266.688713][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 266.697004][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 266.705456][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 266.713108][ T7948] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 266.757076][ T7948] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 266.846071][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 266.854146][ T7955] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.868205][ T7948] netdevsim netdevsim4 netdevsim2: renamed from eth2 20:14:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002d00)=[{0x0}, {0x0}, {&(0x7f0000002c40)}], 0x3, &(0x7f0000000780)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129cde3}], 0x1, &(0x7f00000001c0)=""/17, 0x10036, 0x7301}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dRA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x88\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G\x8d;\xfa+\xa2%(}`\xc5L\xbb\xeb~}%\xddr\xbb\xe7\xf4|\xa7b\xeb\xd3\nW\x16\x10:\x0e%\x83\x01KfPXIu\xe5\x7f\x88q%\xaeLcx\x9b\xbc~,\xd1\x94g\xe3\xd8\xfefh\x82\xa0\xe5@', 0x2761, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b80)=@name={0x1e, 0x2, 0x2, {{0x43, 0x2}}}, 0x10, &(0x7f0000000e00)=[{&(0x7f0000000bc0)="9e64c43d335b15800443481a6d9651a7eb9431", 0x13}, {&(0x7f0000000c00)="1f8de56f445d8b5b2881644bcf3f1a81c9586646cd2705925e077a69d839f5eb3a05b46f6578de55c5905821c6eb5cacea6b8c2475e768370be48ec6da835707cd2a1d9402ec44c862ee56b48e16447b54177fdb3e2c99c591f8303d2035511cc2aaa330c0b903d7c59746ef92fd53d7761ed479701a04a63995575d7a55b662cc3fb02d7395ed6796465e69c8863118dd36a6242ec29d52686a37d3a3888e1e55beaae5dceb17eefa8caeb3340b8f52b051bec22a21269ac0b3295f48de09a3b731da487d4ddc849399eaf788df2e1ec3fac07d55272c268d9f6bc9d4c1a6b1", 0xe0}, {&(0x7f0000000d00)="e6a358e5264016dab70b672e60d7369279d6b19e39d7d8508adaf4ec2cafdc6bc891d1305782ae82d0cab36cce9e80a2563f45ef0676288b25", 0x39}, {&(0x7f0000000d40)="989e71448d2a81826812d45ac9b6c0d9c617fc4b1b5718b9fcb20ab195c2dce9782f12a2fc4128b312f573545f8aed223dd24637e826a1e584d68fd8f82d5ce556236132fe042bd6109079c61d5ac8984e706f01e6b1eb8a2257a3e12f7003e6297cc4388514156633d2e1ba09d7fd4cb865c1c1c74debb1a3949bef8d65bccea72ea3", 0x83}], 0x4, &(0x7f0000000e40)="af5b773bca97fd93ba7888073be729ee1bf7bb9693536264faae95d1dacf0dfdc16b81887f1c71a6284e661430e8aaab5eee586084ebec77dbf221b015dc0fed88861836c95205c4dde36ac6d30097c7fe6a8b73f21777f90e24b03d1d8abf2eebde7a2d8f9006b2cc009cbb091e509c652c66f3925e7ccc12087195d656296840993696175e704bc1d42bce53e1dc0710506f76d2f638fff93356ea16aebf05bae00886bc5ccd41cbb7b57c46b1fc0e053bdaa83847deaeae8aa7002509bd34180be39f564fb3", 0xc7, 0x20000000}, 0x4000000) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, &(0x7f00000027c0)=[{0x0}], 0x1}, 0x8000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) [ 266.917226][ T7948] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 266.974810][ T7937] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 267.005055][ C1] hrtimer: interrupt took 27753 ns [ 267.020522][ T7946] device hsr_slave_0 entered promiscuous mode 20:14:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002d00)=[{0x0}, {0x0}, {&(0x7f0000002c40)}], 0x3, &(0x7f0000000780)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129cde3}], 0x1, &(0x7f00000001c0)=""/17, 0x10036, 0x7301}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dRA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x88\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G\x8d;\xfa+\xa2%(}`\xc5L\xbb\xeb~}%\xddr\xbb\xe7\xf4|\xa7b\xeb\xd3\nW\x16\x10:\x0e%\x83\x01KfPXIu\xe5\x7f\x88q%\xaeLcx\x9b\xbc~,\xd1\x94g\xe3\xd8\xfefh\x82\xa0\xe5@', 0x2761, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b80)=@name={0x1e, 0x2, 0x2, {{0x43, 0x2}}}, 0x10, &(0x7f0000000e00)=[{&(0x7f0000000bc0)="9e64c43d335b15800443481a6d9651a7eb9431", 0x13}, {&(0x7f0000000c00)="1f8de56f445d8b5b2881644bcf3f1a81c9586646cd2705925e077a69d839f5eb3a05b46f6578de55c5905821c6eb5cacea6b8c2475e768370be48ec6da835707cd2a1d9402ec44c862ee56b48e16447b54177fdb3e2c99c591f8303d2035511cc2aaa330c0b903d7c59746ef92fd53d7761ed479701a04a63995575d7a55b662cc3fb02d7395ed6796465e69c8863118dd36a6242ec29d52686a37d3a3888e1e55beaae5dceb17eefa8caeb3340b8f52b051bec22a21269ac0b3295f48de09a3b731da487d4ddc849399eaf788df2e1ec3fac07d55272c268d9f6bc9d4c1a6b1", 0xe0}, {&(0x7f0000000d00)="e6a358e5264016dab70b672e60d7369279d6b19e39d7d8508adaf4ec2cafdc6bc891d1305782ae82d0cab36cce9e80a2563f45ef0676288b25", 0x39}, {&(0x7f0000000d40)="989e71448d2a81826812d45ac9b6c0d9c617fc4b1b5718b9fcb20ab195c2dce9782f12a2fc4128b312f573545f8aed223dd24637e826a1e584d68fd8f82d5ce556236132fe042bd6109079c61d5ac8984e706f01e6b1eb8a2257a3e12f7003e6297cc4388514156633d2e1ba09d7fd4cb865c1c1c74debb1a3949bef8d65bccea72ea3", 0x83}], 0x4, &(0x7f0000000e40)="af5b773bca97fd93ba7888073be729ee1bf7bb9693536264faae95d1dacf0dfdc16b81887f1c71a6284e661430e8aaab5eee586084ebec77dbf221b015dc0fed88861836c95205c4dde36ac6d30097c7fe6a8b73f21777f90e24b03d1d8abf2eebde7a2d8f9006b2cc009cbb091e509c652c66f3925e7ccc12087195d656296840993696175e704bc1d42bce53e1dc0710506f76d2f638fff93356ea16aebf05bae00886bc5ccd41cbb7b57c46b1fc0e053bdaa83847deaeae8aa7002509bd34180be39f564fb3", 0xc7, 0x20000000}, 0x4000000) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, &(0x7f00000027c0)=[{0x0}], 0x1}, 0x8000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) [ 267.077524][ T7946] device hsr_slave_1 entered promiscuous mode [ 267.115120][ T7946] debugfs: Directory 'hsr0' with parent '/' already present! [ 267.150450][ T7950] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 267.207140][ T7950] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 267.263138][ T7941] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.282409][ T7941] 8021q: adding VLAN 0 to HW filter on device team0 [ 267.320652][ T7950] netdevsim netdevsim5 netdevsim2: renamed from eth2 20:14:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002d00)=[{0x0}, {0x0}, {&(0x7f0000002c40)}], 0x3, &(0x7f0000000780)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129cde3}], 0x1, &(0x7f00000001c0)=""/17, 0x10036, 0x7301}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dRA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x88\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G\x8d;\xfa+\xa2%(}`\xc5L\xbb\xeb~}%\xddr\xbb\xe7\xf4|\xa7b\xeb\xd3\nW\x16\x10:\x0e%\x83\x01KfPXIu\xe5\x7f\x88q%\xaeLcx\x9b\xbc~,\xd1\x94g\xe3\xd8\xfefh\x82\xa0\xe5@', 0x2761, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b80)=@name={0x1e, 0x2, 0x2, {{0x43, 0x2}}}, 0x10, &(0x7f0000000e00)=[{&(0x7f0000000bc0)="9e64c43d335b15800443481a6d9651a7eb9431", 0x13}, {&(0x7f0000000c00)="1f8de56f445d8b5b2881644bcf3f1a81c9586646cd2705925e077a69d839f5eb3a05b46f6578de55c5905821c6eb5cacea6b8c2475e768370be48ec6da835707cd2a1d9402ec44c862ee56b48e16447b54177fdb3e2c99c591f8303d2035511cc2aaa330c0b903d7c59746ef92fd53d7761ed479701a04a63995575d7a55b662cc3fb02d7395ed6796465e69c8863118dd36a6242ec29d52686a37d3a3888e1e55beaae5dceb17eefa8caeb3340b8f52b051bec22a21269ac0b3295f48de09a3b731da487d4ddc849399eaf788df2e1ec3fac07d55272c268d9f6bc9d4c1a6b1", 0xe0}, {&(0x7f0000000d00)="e6a358e5264016dab70b672e60d7369279d6b19e39d7d8508adaf4ec2cafdc6bc891d1305782ae82d0cab36cce9e80a2563f45ef0676288b25", 0x39}, {&(0x7f0000000d40)="989e71448d2a81826812d45ac9b6c0d9c617fc4b1b5718b9fcb20ab195c2dce9782f12a2fc4128b312f573545f8aed223dd24637e826a1e584d68fd8f82d5ce556236132fe042bd6109079c61d5ac8984e706f01e6b1eb8a2257a3e12f7003e6297cc4388514156633d2e1ba09d7fd4cb865c1c1c74debb1a3949bef8d65bccea72ea3", 0x83}], 0x4, &(0x7f0000000e40)="af5b773bca97fd93ba7888073be729ee1bf7bb9693536264faae95d1dacf0dfdc16b81887f1c71a6284e661430e8aaab5eee586084ebec77dbf221b015dc0fed88861836c95205c4dde36ac6d30097c7fe6a8b73f21777f90e24b03d1d8abf2eebde7a2d8f9006b2cc009cbb091e509c652c66f3925e7ccc12087195d656296840993696175e704bc1d42bce53e1dc0710506f76d2f638fff93356ea16aebf05bae00886bc5ccd41cbb7b57c46b1fc0e053bdaa83847deaeae8aa7002509bd34180be39f564fb3", 0xc7, 0x20000000}, 0x4000000) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, &(0x7f00000027c0)=[{0x0}], 0x1}, 0x8000) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) [ 267.379107][ T7950] netdevsim netdevsim5 netdevsim3: renamed from eth3 20:14:24 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000680)=@filter={'filter\x00', 0xe, 0x4, 0x378, 0x1d8, 0x108, 0x1d8, 0x0, 0x0, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast1, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'rose0\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xff9b) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 267.443404][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.452570][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 267.498017][ T7980] x_tables: duplicate underflow at hook 2 [ 267.527370][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.546905][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.569775][ T7940] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.576851][ T7940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.588852][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.598023][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.609950][ T7940] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.617037][ T7940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.628767][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 267.637893][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 20:14:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000500)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_int(r0, 0x29, 0x6, &(0x7f00000000c0), 0xfdcc) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) [ 267.682174][ T7946] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 267.716653][ T7980] x_tables: duplicate underflow at hook 2 [ 267.747012][ T7946] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 267.772801][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.785660][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 20:14:25 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x200}, 0x10) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) [ 267.798287][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 267.816481][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 267.835210][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 20:14:25 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000440)="c4", 0x24549}], 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000084000000050000001000000000000000"], 0x18}, 0xfc) [ 267.849261][ T7941] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 267.872464][ T7941] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 267.916434][ T7946] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 267.969872][ T7946] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 268.026712][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 268.034953][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 268.043711][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.052272][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 268.060922][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.069647][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 268.084922][ T7948] 8021q: adding VLAN 0 to HW filter on device bond0 20:14:25 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000340), 0x4) [ 268.129760][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 268.141832][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 268.161931][ T7941] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 268.191003][ T7950] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.247479][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.259611][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.279247][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.287362][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.306071][ T7948] 8021q: adding VLAN 0 to HW filter on device team0 [ 268.314750][ T7950] 8021q: adding VLAN 0 to HW filter on device team0 [ 268.344536][ T7946] 8021q: adding VLAN 0 to HW filter on device bond0 [ 268.402924][ T7946] 8021q: adding VLAN 0 to HW filter on device team0 [ 268.417730][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.430275][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.438661][ T7940] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.445713][ T7940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.454071][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.462808][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.471618][ T7940] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.478668][ T7940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.486904][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 268.493324][ T8007] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 268.496074][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 268.522129][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 268.530549][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 268.539487][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 268.548089][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 268.556992][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.565609][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.574058][ T7940] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.581257][ T7940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.589261][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.597108][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.604652][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.613342][ T7940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.621712][ T7940] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.628736][ T7940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.643225][ T7948] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 268.655191][ T7948] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 268.674756][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.683033][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 268.691403][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.700561][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 268.709408][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.718057][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 268.726542][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.734739][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 268.744100][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 268.759638][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.768443][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.779227][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.786305][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.794450][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 268.805723][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 268.813180][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 268.824687][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.844217][ T7948] 8021q: adding VLAN 0 to HW filter on device batadv0 20:14:26 executing program 2: unshare(0x400) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) [ 268.862444][ T7950] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 268.875486][ T7950] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 268.893239][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 268.922707][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 268.944426][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 268.953718][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 268.964625][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 268.973141][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.981764][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 268.992658][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.001035][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 269.009645][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.018022][ T7956] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.025075][ T7956] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.037562][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 269.051496][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 269.070704][ T7950] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 269.078970][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 269.086885][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.094305][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 269.110613][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 269.128485][ T7946] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 269.139277][ T7946] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 269.156769][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 269.165488][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 269.174581][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 269.183358][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 269.192301][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 269.201114][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.209616][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 269.218085][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.226231][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 269.233625][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.246224][ T7946] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 269.255681][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 269.263987][ T7956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 20:14:26 executing program 3: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x19, 0x0, "fb4c2db961120d93f770fe02ca8d5fe057a0a7fb70f73e5ee8beffc1ec31a27c74e7c785a6aa20a90bd0e54c3bd10553c5efb3f3cdf2caebd8ad6934d603970f", "3dc099a62077b61d5b711d2361f791f99629e031e35d384fbdfcd241ea02d00c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0) open(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 269.416232][ T8033] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 269.481976][ T8043] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 269.518314][ T8033] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 269.538196][ T8033] bond2 (uninitialized): Released all slaves 20:14:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x9) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32, @ANYBLOB="00000000e60000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) [ 269.648220][ T8051] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 269.671596][ T8051] bond2 (uninitialized): Released all slaves 20:14:27 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, '\x03\x8a\xa1t\x03n\xd7\xe0\x8f\x93\xdd\x86\xdd'}]}, 0x2000fe6f) 20:14:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x20, 0x0, &(0x7f00000003c0)) 20:14:27 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000140)={0xc00, 0x4004600}) 20:14:27 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1ff, 0xa000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000100)=[0x0], 0x0, 0x0, 0x0, 0x1}) keyctl$update(0x2, r0, &(0x7f0000000440)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c217", 0xc0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) syz_open_pts(0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0xcc, 0x0) 20:14:27 executing program 3: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x19, 0x0, "fb4c2db961120d93f770fe02ca8d5fe057a0a7fb70f73e5ee8beffc1ec31a27c74e7c785a6aa20a90bd0e54c3bd10553c5efb3f3cdf2caebd8ad6934d603970f", "3dc099a62077b61d5b711d2361f791f99629e031e35d384fbdfcd241ea02d00c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0) open(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) 20:14:27 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x7132}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="00038aa174036ed7e08f93dd86dd207664e293132f9711172dcbd1c5f4a586291f63c59cfc00493aa20041cbe7d32a7e60c217fa4cc5"], 0x36) 20:14:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000001c0)=""/150, 0x96}, {0x0, 0x18e}, {0x0}, {0x0}], 0x3eb}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000580)=[{&(0x7f0000000300)=""/169, 0xa9}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f0000000600)=[{&(0x7f00000007c0)=""/245, 0xf5}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) shutdown(r4, 0x0) shutdown(r1, 0x0) [ 270.440794][ T8065] device nr0 entered promiscuous mode 20:14:27 executing program 3: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x19, 0x0, "fb4c2db961120d93f770fe02ca8d5fe057a0a7fb70f73e5ee8beffc1ec31a27c74e7c785a6aa20a90bd0e54c3bd10553c5efb3f3cdf2caebd8ad6934d603970f", "3dc099a62077b61d5b711d2361f791f99629e031e35d384fbdfcd241ea02d00c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0) open(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) 20:14:28 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000580)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x1f000}) faccessat(r3, &(0x7f00000001c0)='./file0\x00', 0x0, 0x400) ioctl$KVM_RUN(r1, 0xae80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') syz_emit_ethernet(0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000000)={0x0, 0x6b9, 0x9}) r4 = socket$inet6(0xa, 0x0, 0x0) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x20005d) r6 = socket$inet6(0xa, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), 0x0) write$binfmt_elf32(r6, &(0x7f0000000880)=ANY=[@ANYBLOB="7f444c4600800000000000000000000002000600ca3f8bca3b0000003800000000ff00f7ffffffffffff1f000200000000000000b500000001000000000000000000bf7f00000000000100000000e40000000000f30c53342165f06202002c95723f067cd870b0aedd69b84b8fe42d000000000000000000007f96d3030709ab4b0096ce0e6629ed4e3fd759498afd3b3de5a97f7fd6b7833a72cd33b2ba197908635ac8452e1f007f783a9ed1d7f3e4"], 0xb0) close(r5) getpid() syz_open_procfs(0x0, 0x0) r7 = creat(&(0x7f0000000100)='./file0\x00', 0x20005d) write$binfmt_elf32(r7, &(0x7f0000000340)=ANY=[@ANYBLOB="7f450100000000c80c0000330000000002000600ca3f8bca3bedb50038"], 0x1d) close(r7) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xfffffffffffffec0) fstat(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getpid() syz_open_procfs(r10, 0x0) r11 = creat(&(0x7f0000000100)='./file0\x00', 0x2) close(r11) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) lstat(&(0x7f0000000640)='./file0\x00', 0x0) sendmsg$netlink(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000700)=[@cred={{0x18, 0x1, 0x2, {0x0, r8, r9}}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, r12}}}, @cred={{0x18}}], 0x48, 0x4000}, 0x1) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r14 = ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r14, 0xae60) r15 = dup3(r13, r14, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4138ae84, 0x0) dup2(r15, 0xffffffffffffffff) ioctl$KVM_CREATE_VM(r15, 0xae01, 0x0) sendmsg$IPVS_CMD_SET_DEST(r15, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="90000000b86f4e877ac3ba98e0af01bc54080000008bf2445a82c0af442fdacd", @ANYRES16, @ANYBLOB="010925bd7000fbdbdf2506000000180001000c0007000000000009000000080004004e210000145ce7611779000300080001000300000008000400050000000700050000000100080006001f00000008000500f8ffffff080004000300000030000300080008003f00000008000800040000000800040081000000140002006272696467653000"], 0x3}, 0x1, 0x0, 0x0, 0x20040080}, 0x20004800) 20:14:28 executing program 3: ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x19, 0x0, "fb4c2db961120d93f770fe02ca8d5fe057a0a7fb70f73e5ee8beffc1ec31a27c74e7c785a6aa20a90bd0e54c3bd10553c5efb3f3cdf2caebd8ad6934d603970f", "3dc099a62077b61d5b711d2361f791f99629e031e35d384fbdfcd241ea02d00c"}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) mlock2(&(0x7f0000ffa000/0x6000)=nil, 0x6000, 0x0) open(0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) 20:14:28 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 270.787737][ T8065] device nr0 entered promiscuous mode 20:14:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = socket(0x800000010, 0x1000000002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492601, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xffffffffffffff77, 0x0, 0x0, 0x0) 20:14:28 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ustat(0x6, 0x0) 20:14:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002d00)=[{0x0}, {0x0}, {&(0x7f0000002c40)}], 0x3, &(0x7f0000000780)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129cde3}], 0x1, &(0x7f00000001c0)=""/17, 0x10036, 0x7301}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dRA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x88\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G\x8d;\xfa+\xa2%(}`\xc5L\xbb\xeb~}%\xddr\xbb\xe7\xf4|\xa7b\xeb\xd3\nW\x16\x10:\x0e%\x83\x01KfPXIu\xe5\x7f\x88q%\xaeLcx\x9b\xbc~,\xd1\x94g\xe3\xd8\xfefh\x82\xa0\xe5@', 0x2761, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b80)=@name={0x1e, 0x2, 0x2, {{0x43, 0x2}}}, 0x10, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000c00)="1f8de56f445d8b5b2881644bcf3f1a81c9586646cd2705925e077a69d839f5eb3a05b46f6578de55c5905821c6eb5cacea6b8c2475e768370be48ec6da835707cd2a1d9402ec44c862ee56b48e16447b54177fdb3e2c99c591f8303d2035511cc2aaa330c0b903d7c59746ef92fd53d7761ed479701a04a63995575d7a55b662cc3fb02d7395ed6796465e69c8863118dd36a6242ec29d52686a37d3a3888e1e55beaae5dceb17eefa8caeb3340b8f52b051bec22a21269ac0b3295f48de09a3b731da487d4ddc849399eaf788df2e1ec3fac07d55272c268d9f6bc9d4c1a6b1", 0xe0}, {&(0x7f0000000d00)="e6a358e5264016dab70b672e60d7369279d6b19e39d7d8508adaf4ec2cafdc6bc891d1305782ae82d0cab36cce9e80a2563f45ef0676288b25", 0x39}, {&(0x7f0000000d40)="989e71448d2a81826812d45ac9b6c0d9c617fc4b1b5718b9fcb20ab195c2dce9782f12a2fc4128b312f573545f8aed223dd24637e826a1e584d68fd8f82d5ce556236132fe042bd6109079c61d5ac8984e706f01e6b1eb8a2257a3e12f7003e6297cc4388514156633d2e1ba09d7fd4cb865c1c1c74debb1a3949bef8d65bccea72ea3bb21dd162439abf17c3a5628bbbbbe90ff44", 0x95}], 0x4, &(0x7f0000000e40)="af5b773bca97fd93ba7888073be729ee1bf7bb9693536264faae95d1dacf0dfdc16b81887f1c71a6284e661430e8aaab5eee586084ebec77dbf221b015dc0fed88861836c95205c4dde36ac6d30097c7fe6a8b73f21777f90e24b03d1d8abf2eebde7a2d8f9006b2cc009cbb091e509c652c66f3925e7ccc12087195d656296840993696175e704bc1d42bce53e1dc0710506f76d2f638fff93356ea16aebf05bae00886bc5ccd41cbb7b57c46b1fc0e053bdaa83847deaeae8aa7002509bd34180be39f564fb3d25424", 0xca, 0x20000000}, 0x4000000) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, &(0x7f00000027c0)=[{0x0}], 0x1}, 0x8000) socketpair(0x1, 0x1, 0x0, 0x0) 20:14:28 executing program 3: bind$nfc_llcp(0xffffffffffffffff, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "6cb782e4ad88b89d1fd309169f44a72107130ee55d660510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39877e4ac714b7ecefa8a934a"}, 0x60) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x6800000000000000, 0x60, &(0x7f00000001c0)={0x0, 'bridge_slave_0\x00'}, 0x18) 20:14:28 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x3, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x74}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:14:28 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50}, 0x50) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000580)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], 0x1f000}) faccessat(r3, &(0x7f00000001c0)='./file0\x00', 0x0, 0x400) ioctl$KVM_RUN(r1, 0xae80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') syz_emit_ethernet(0x0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000000)={0x0, 0x6b9, 0x9}) r4 = socket$inet6(0xa, 0x0, 0x0) r5 = creat(&(0x7f0000000100)='./file0\x00', 0x20005d) r6 = socket$inet6(0xa, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), 0x0) write$binfmt_elf32(r6, &(0x7f0000000880)=ANY=[@ANYBLOB="7f444c4600800000000000000000000002000600ca3f8bca3b0000003800000000ff00f7ffffffffffff1f000200000000000000b500000001000000000000000000bf7f00000000000100000000e40000000000f30c53342165f06202002c95723f067cd870b0aedd69b84b8fe42d000000000000000000007f96d3030709ab4b0096ce0e6629ed4e3fd759498afd3b3de5a97f7fd6b7833a72cd33b2ba197908635ac8452e1f007f783a9ed1d7f3e4"], 0xb0) close(r5) getpid() syz_open_procfs(0x0, 0x0) r7 = creat(&(0x7f0000000100)='./file0\x00', 0x20005d) write$binfmt_elf32(r7, &(0x7f0000000340)=ANY=[@ANYBLOB="7f450100000000c80c0000330000000002000600ca3f8bca3bedb50038"], 0x1d) close(r7) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xfffffffffffffec0) fstat(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getpid() syz_open_procfs(r10, 0x0) r11 = creat(&(0x7f0000000100)='./file0\x00', 0x2) close(r11) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0, 0x0}, &(0x7f0000000600)=0xc) lstat(&(0x7f0000000640)='./file0\x00', 0x0) sendmsg$netlink(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000700)=[@cred={{0x18, 0x1, 0x2, {0x0, r8, r9}}}, @cred={{0x18, 0x1, 0x2, {0x0, 0x0, r12}}}, @cred={{0x18}}], 0x48, 0x4000}, 0x1) r13 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r14 = ioctl$KVM_CREATE_VM(r13, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r14, 0xae60) r15 = dup3(r13, r14, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4138ae84, 0x0) dup2(r15, 0xffffffffffffffff) ioctl$KVM_CREATE_VM(r15, 0xae01, 0x0) sendmsg$IPVS_CMD_SET_DEST(r15, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="90000000b86f4e877ac3ba98e0af01bc54080000008bf2445a82c0af442fdacd", @ANYRES16, @ANYBLOB="010925bd7000fbdbdf2506000000180001000c0007000000000009000000080004004e210000145ce7611779000300080001000300000008000400050000000700050000000100080006001f00000008000500f8ffffff080004000300000030000300080008003f00000008000800040000000800040081000000140002006272696467653000"], 0x3}, 0x1, 0x0, 0x0, 0x20040080}, 0x20004800) 20:14:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0xc000000000000, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x1) 20:14:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffffff) 20:14:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000340)=0x7fffffff, 0x4) [ 271.599462][ T8148] syz-executor.3: vmalloc: allocation failure: 31050559792 bytes, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=syz3,mems_allowed=0-1 [ 271.692017][ T27] kauditd_printk_skb: 8 callbacks suppressed [ 271.692098][ T27] audit: type=1800 audit(1577045669.022:31): pid=8156 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16548 res=0 [ 271.699614][ T8148] CPU: 0 PID: 8148 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 271.727042][ T8148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.737098][ T8148] Call Trace: [ 271.740399][ T8148] dump_stack+0x11d/0x181 [ 271.744736][ T8148] warn_alloc.cold+0x72/0xcf [ 271.747004][ T27] audit: type=1804 audit(1577045669.022:32): pid=8156 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir621294502/syzkaller.ZNlVDy/8/file0" dev="sda1" ino=16548 res=1 [ 271.749338][ T8148] ? pcpu_next_unpop+0x70/0x80 [ 271.749363][ T8148] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 271.749397][ T8148] __vmalloc_node_range+0x373/0x4c0 20:14:29 executing program 4: modify_ldt$write2(0x11, 0x0, 0x0) [ 271.789628][ T8148] ? hashlimit_mt_check_common.isra.0+0x3d9/0xa70 [ 271.796061][ T8148] vmalloc+0x65/0x80 [ 271.799970][ T8148] ? hashlimit_mt_check_common.isra.0+0x3d9/0xa70 [ 271.806518][ T8148] hashlimit_mt_check_common.isra.0+0x3d9/0xa70 [ 271.812825][ T8148] hashlimit_mt_check+0x75/0x90 [ 271.817761][ T8148] ? hashlimit_mt_check_common.isra.0+0xa70/0xa70 [ 271.824173][ T8148] xt_check_match+0x17b/0x3c0 [ 271.828951][ T8148] ? strcmp+0x5e/0x70 [ 271.832927][ T8148] ? try_module_get+0x2f/0x40 [ 271.837586][ T8148] ? mutex_unlock+0x41/0x50 [ 271.842084][ T8148] ? xt_find_match+0x81/0x230 [ 271.846756][ T8148] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.852993][ T8148] find_check_entry.isra.0+0x237/0x550 [ 271.858527][ T8148] ? kvfree+0x6f/0x80 [ 271.862683][ T8148] translate_table+0x762/0xc30 [ 271.867467][ T8148] do_ipt_set_ctl+0x222/0x330 [ 271.872185][ T8148] nf_setsockopt+0x6e/0xb0 [ 271.876605][ T8148] ip_setsockopt+0xed/0x100 [ 271.881158][ T8148] tcp_setsockopt+0x7c/0xc0 [ 271.885664][ T8148] sock_common_setsockopt+0x67/0x90 [ 271.890867][ T8148] __sys_setsockopt+0x1ce/0x370 [ 271.895732][ T8148] __x64_sys_setsockopt+0x70/0x90 [ 271.900767][ T8148] do_syscall_64+0xcc/0x3a0 [ 271.905289][ T8148] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 271.911304][ T8148] RIP: 0033:0x45a919 [ 271.915367][ T8148] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.934972][ T8148] RSP: 002b:00007f5319579c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 271.943379][ T8148] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045a919 [ 271.951348][ T8148] RDX: 0000000000000040 RSI: 000c000000000000 RDI: 0000000000000003 [ 271.959397][ T8148] RBP: 000000000075bf20 R08: 0000000000000001 R09: 0000000000000000 [ 271.967358][ T8148] R10: 0000000020000780 R11: 0000000000000246 R12: 00007f531957a6d4 [ 271.975317][ T8148] R13: 00000000004c9cbc R14: 00000000004e1e70 R15: 00000000ffffffff [ 271.984761][ T8148] Mem-Info: [ 271.988206][ T8148] active_anon:140511 inactive_anon:216 isolated_anon:0 [ 271.988206][ T8148] active_file:7644 inactive_file:36801 isolated_file:0 [ 271.988206][ T8148] unevictable:0 dirty:164 writeback:0 unstable:0 [ 271.988206][ T8148] slab_reclaimable:5200 slab_unreclaimable:15524 [ 271.988206][ T8148] mapped:59105 shmem:285 pagetables:1052 bounce:0 [ 271.988206][ T8148] free:1606173 free_pcp:965 free_cma:0 [ 272.026215][ T8148] Node 0 active_anon:562044kB inactive_anon:864kB active_file:30440kB inactive_file:147204kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:236420kB dirty:752kB writeback:0kB shmem:1140kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 335872kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 272.055567][ T8148] Node 1 active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 272.083134][ T27] audit: type=1804 audit(1577045669.412:33): pid=8159 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir621294502/syzkaller.ZNlVDy/8/file0" dev="sda1" ino=16548 res=1 20:14:29 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 20:14:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002d00)=[{0x0}, {0x0}, {&(0x7f0000002c40)}], 0x3, &(0x7f0000000780)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129cde3}], 0x1, &(0x7f00000001c0)=""/17, 0x10036, 0x7301}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dRA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x88\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G\x8d;\xfa+\xa2%(}`\xc5L\xbb\xeb~}%\xddr\xbb\xe7\xf4|\xa7b\xeb\xd3\nW\x16\x10:\x0e%\x83\x01KfPXIu\xe5\x7f\x88q%\xaeLcx\x9b\xbc~,\xd1\x94g\xe3\xd8\xfefh\x82\xa0\xe5@', 0x2761, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b80)=@name={0x1e, 0x2, 0x2, {{0x43, 0x2}}}, 0x10, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000c00)="1f8de56f445d8b5b2881644bcf3f1a81c9586646cd2705925e077a69d839f5eb3a05b46f6578de55c5905821c6eb5cacea6b8c2475e768370be48ec6da835707cd2a1d9402ec44c862ee56b48e16447b54177fdb3e2c99c591f8303d2035511cc2aaa330c0b903d7c59746ef92fd53d7761ed479701a04a63995575d7a55b662cc3fb02d7395ed6796465e69c8863118dd36a6242ec29d52686a37d3a3888e1e55beaae5dceb17eefa8caeb3340b8f52b051bec22a21269ac0b3295f48de09a3b731da487d4ddc849399eaf788df2e1ec3fac07d55272c268d9f6bc9d4c1a6b1", 0xe0}, {&(0x7f0000000d00)="e6a358e5264016dab70b672e60d7369279d6b19e39d7d8508adaf4ec2cafdc6bc891d1305782ae82d0cab36cce9e80a2563f45ef0676288b25", 0x39}, {&(0x7f0000000d40)="989e71448d2a81826812d45ac9b6c0d9c617fc4b1b5718b9fcb20ab195c2dce9782f12a2fc4128b312f573545f8aed223dd24637e826a1e584d68fd8f82d5ce556236132fe042bd6109079c61d5ac8984e706f01e6b1eb8a2257a3e12f7003e6297cc4388514156633d2e1ba09d7fd4cb865c1c1c74debb1a3949bef8d65bccea72ea3bb21dd162439abf17c3a5628bbbbbe90ff44", 0x95}], 0x4, &(0x7f0000000e40)="af5b773bca97fd93ba7888073be729ee1bf7bb9693536264faae95d1dacf0dfdc16b81887f1c71a6284e661430e8aaab5eee586084ebec77dbf221b015dc0fed88861836c95205c4dde36ac6d30097c7fe6a8b73f21777f90e24b03d1d8abf2eebde7a2d8f9006b2cc009cbb091e509c652c66f3925e7ccc12087195d656296840993696175e704bc1d42bce53e1dc0710506f76d2f638fff93356ea16aebf05bae00886bc5ccd41cbb7b57c46b1fc0e053bdaa83847deaeae8aa7002509bd34180be39f564fb3d25424", 0xca, 0x20000000}, 0x4000000) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000028c0)={0x0, 0x0, &(0x7f00000027c0)=[{0x0}], 0x1}, 0x8000) socketpair(0x1, 0x1, 0x0, 0x0) 20:14:29 executing program 4: [ 272.196220][ T8148] Node 0 DMA free:15908kB min:188kB low:232kB high:276kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 272.233767][ T8148] lowmem_reserve[]: 0 2908 3615 3615 [ 272.239501][ T8148] Node 0 DMA32 free:2598108kB min:35360kB low:44200kB high:53040kB reserved_highatomic:0KB active_anon:46988kB inactive_anon:0kB active_file:728kB inactive_file:109996kB unevictable:0kB writepending:496kB present:3129332kB managed:2980544kB mlocked:0kB kernel_stack:420kB pagetables:1244kB bounce:0kB free_pcp:2196kB local_pcp:1004kB free_cma:0kB 20:14:29 executing program 5: [ 272.344408][ T8148] lowmem_reserve[]: 0 0 707 707 [ 272.357442][ T8148] Node 0 Normal free:20244kB min:8600kB low:10748kB high:12896kB reserved_highatomic:0KB active_anon:496384kB inactive_anon:856kB active_file:29712kB inactive_file:37312kB unevictable:0kB writepending:176kB present:786432kB managed:724520kB mlocked:0kB kernel_stack:3224kB pagetables:2584kB bounce:0kB free_pcp:2008kB local_pcp:1204kB free_cma:0kB [ 272.392360][ T8148] lowmem_reserve[]: 0 0 0 0 [ 272.397002][ T8148] Node 1 Normal free:3808864kB min:45956kB low:57444kB high:68932kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870256kB mlocked:0kB kernel_stack:8kB pagetables:0kB bounce:0kB free_pcp:288kB local_pcp:236kB free_cma:0kB 20:14:29 executing program 5: [ 272.469851][ T27] audit: type=1804 audit(1577045669.802:34): pid=8159 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir621294502/syzkaller.ZNlVDy/8/file0" dev="sda1" ino=16548 res=1 [ 272.581851][ T27] audit: type=1804 audit(1577045669.802:35): pid=8172 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir621294502/syzkaller.ZNlVDy/8/file0" dev="sda1" ino=16548 res=1 20:14:29 executing program 5: 20:14:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffffff) 20:14:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffffff) [ 272.623247][ T8148] lowmem_reserve[]: 0 0 0 0 [ 272.635552][ T8148] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 272.717577][ T8148] Node 0 DMA32: 3*4kB (UME) 1*8kB (E) 2*16kB (UE) 1*32kB (E) 1*64kB (M) 4*128kB (UME) 8*256kB (UE) 3*512kB (UME) 3*1024kB (UM) 2*2048kB (UE) 629*4096kB (M) = 2587796kB [ 272.787432][ T27] audit: type=1800 audit(1577045670.122:36): pid=8184 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16550 res=0 [ 272.802953][ T8148] Node 0 Normal: 651*4kB (M) 565*8kB (ME) 186*16kB (ME) 97*32kB (ME) 56*64kB (ME) 7*128kB (ME) 4*256kB (E) 1*512kB (E) 1*1024kB (E) 0*2048kB 0*4096kB = 20244kB [ 272.828898][ T8148] Node 1 Normal: 2*4kB (ME) 3*8kB (UME) 0*16kB 2*32kB (UM) 2*64kB (UE) 3*128kB (UME) 2*256kB (UM) 1*512kB (U) 2*1024kB (UM) 2*2048kB (UM) 928*4096kB (M) = 3808864kB [ 272.850540][ T8148] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 272.860858][ T8148] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 272.867172][ T27] audit: type=1804 audit(1577045670.132:37): pid=8184 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir044967714/syzkaller.BThMAE/7/file0" dev="sda1" ino=16550 res=1 [ 272.874827][ T8148] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 272.941565][ T8148] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 272.956042][ T27] audit: type=1800 audit(1577045670.182:38): pid=8186 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16554 res=0 [ 272.976709][ T27] audit: type=1804 audit(1577045670.182:39): pid=8186 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir621294502/syzkaller.ZNlVDy/9/file0" dev="sda1" ino=16554 res=1 [ 272.993547][ T8148] 44729 total pagecache pages [ 273.001399][ T27] audit: type=1804 audit(1577045670.242:40): pid=8187 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir044967714/syzkaller.BThMAE/7/file0" dev="sda1" ino=16550 res=1 [ 273.036104][ T8148] 0 pages in swap cache 20:14:30 executing program 3: 20:14:30 executing program 5: 20:14:30 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, 0x0, &(0x7f0000000040)=0x134) [ 273.041728][ T8148] Swap cache stats: add 0, delete 0, find 0/0 [ 273.048235][ T8148] Free swap = 0kB [ 273.052004][ T8148] Total swap = 0kB [ 273.055774][ T8148] 1965979 pages RAM [ 273.059698][ T8148] 0 pages HighMem/MovableOnly [ 273.064420][ T8148] 68172 pages reserved [ 273.068583][ T8148] 0 pages cma reserved 20:14:30 executing program 5: 20:14:30 executing program 1: 20:14:30 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, 0x0, &(0x7f0000000040)=0x134) 20:14:30 executing program 3: 20:14:30 executing program 5: 20:14:30 executing program 1: 20:14:30 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, 0x0, &(0x7f0000000040)=0x134) 20:14:31 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffffff) 20:14:31 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x4, 0x0, &(0x7f0000000040)=0x134) 20:14:31 executing program 5: 20:14:31 executing program 3: 20:14:31 executing program 4: 20:14:31 executing program 1: 20:14:31 executing program 3: 20:14:31 executing program 4: 20:14:31 executing program 5: 20:14:31 executing program 1: 20:14:31 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, &(0x7f0000000040)=0x134) 20:14:31 executing program 3: 20:14:32 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffffff) 20:14:32 executing program 5: 20:14:32 executing program 4: 20:14:32 executing program 1: 20:14:32 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, &(0x7f0000000040)=0x134) 20:14:32 executing program 3: 20:14:32 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, 0x0, &(0x7f0000000040)=0x134) 20:14:32 executing program 5: 20:14:32 executing program 3: 20:14:32 executing program 4: 20:14:32 executing program 1: 20:14:32 executing program 2: socket$inet6(0xa, 0x80003, 0x80) r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, &(0x7f0000000040)=0x134) 20:14:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(0xffffffffffffffff, r0, 0x0, 0xffffffff) 20:14:33 executing program 3: 20:14:33 executing program 4: 20:14:33 executing program 5: 20:14:33 executing program 1: 20:14:33 executing program 2: socket$inet6(0xa, 0x80003, 0x80) r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, &(0x7f0000000040)=0x134) 20:14:33 executing program 5: 20:14:33 executing program 3: 20:14:33 executing program 1: 20:14:33 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendfile(r0, r1, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000000)='./file0\x00', 0x141042, 0x0) sendfile(r3, r0, 0x0, 0xffffffff) 20:14:33 executing program 2: socket$inet6(0xa, 0x80003, 0x80) r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, &(0x7f0000000040)=0x134) 20:14:33 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000100)={r1, 0xffffffffffffffff, 0x8000000000d}, 0x10) [ 276.543901][ T8292] ================================================================== [ 276.552036][ T8292] BUG: KCSAN: data-race in wbc_detach_inode / wbc_detach_inode [ 276.559557][ T8292] [ 276.561882][ T8292] read to 0xffff8881274227ac of 2 bytes by task 8296 on cpu 1: [ 276.569414][ T8292] wbc_detach_inode+0x95/0x520 [ 276.574178][ T8292] __filemap_fdatawrite_range+0x1d4/0x230 [ 276.579890][ T8292] file_write_and_wait_range+0xfd/0x160 [ 276.585438][ T8292] ext4_sync_file+0x266/0xaf0 [ 276.590126][ T8292] vfs_fsync_range+0x82/0x150 [ 276.594794][ T8292] ext4_buffered_write_iter+0x222/0x290 [ 276.600338][ T8292] ext4_file_write_iter+0xf4/0xd40 [ 276.605457][ T8292] do_iter_readv_writev+0x487/0x5b0 [ 276.610660][ T8292] do_iter_write+0x13b/0x3c0 [ 276.615258][ T8292] vfs_iter_write+0x5c/0x80 [ 276.619756][ T8292] iter_file_splice_write+0x530/0x840 [ 276.625129][ T8292] direct_splice_actor+0xa0/0xc0 [ 276.630080][ T8292] splice_direct_to_actor+0x22b/0x540 [ 276.635444][ T8292] do_splice_direct+0x161/0x1e0 [ 276.640286][ T8292] do_sendfile+0x384/0x7f0 [ 276.644693][ T8292] __x64_sys_sendfile64+0x12a/0x140 [ 276.649882][ T8292] do_syscall_64+0xcc/0x3a0 [ 276.654384][ T8292] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 276.660269][ T8292] [ 276.662608][ T8292] write to 0xffff8881274227ac of 2 bytes by task 8292 on cpu 0: [ 276.670232][ T8292] wbc_detach_inode+0x260/0x520 [ 276.675090][ T8292] __filemap_fdatawrite_range+0x1d4/0x230 [ 276.680802][ T8292] filemap_write_and_wait_range+0xb1/0x150 [ 276.686599][ T8292] iomap_dio_rw+0x3a2/0x9a0 [ 276.691094][ T8292] ext4_file_write_iter+0xc38/0xd40 [ 276.696895][ T8292] do_iter_readv_writev+0x487/0x5b0 [ 276.702085][ T8292] do_iter_write+0x13b/0x3c0 [ 276.706667][ T8292] vfs_iter_write+0x5c/0x80 [ 276.711170][ T8292] iter_file_splice_write+0x530/0x840 [ 276.716548][ T8292] direct_splice_actor+0xa0/0xc0 [ 276.721487][ T8292] splice_direct_to_actor+0x22b/0x540 [ 276.726859][ T8292] do_splice_direct+0x161/0x1e0 [ 276.731705][ T8292] do_sendfile+0x384/0x7f0 [ 276.736285][ T8292] __x64_sys_sendfile64+0x12a/0x140 [ 276.741493][ T8292] do_syscall_64+0xcc/0x3a0 [ 276.745997][ T8292] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 276.751884][ T8292] [ 276.754197][ T8292] Reported by Kernel Concurrency Sanitizer on: [ 276.760344][ T8292] CPU: 0 PID: 8292 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 276.768916][ T8292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.778971][ T8292] ================================================================== [ 276.787035][ T8292] Kernel panic - not syncing: panic_on_warn set ... [ 276.793616][ T8292] CPU: 0 PID: 8292 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 276.802186][ T8292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.812228][ T8292] Call Trace: [ 276.815529][ T8292] dump_stack+0x11d/0x181 [ 276.819856][ T8292] panic+0x210/0x640 [ 276.823750][ T8292] ? vprintk_func+0x8d/0x140 [ 276.828338][ T8292] kcsan_report.cold+0xc/0xd [ 276.832938][ T8292] kcsan_setup_watchpoint+0x3fe/0x460 [ 276.838306][ T8292] __tsan_unaligned_write2+0xc7/0x110 [ 276.843670][ T8292] wbc_detach_inode+0x260/0x520 [ 276.848524][ T8292] __filemap_fdatawrite_range+0x1d4/0x230 [ 276.854259][ T8292] filemap_write_and_wait_range+0xb1/0x150 [ 276.860059][ T8292] iomap_dio_rw+0x3a2/0x9a0 [ 276.864562][ T8292] ? ext4_journal_check_start+0x103/0x150 [ 276.870278][ T8292] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.876515][ T8292] ext4_file_write_iter+0xc38/0xd40 [ 276.881706][ T8292] ? ext4_file_write_iter+0xc38/0xd40 [ 276.887084][ T8292] do_iter_readv_writev+0x487/0x5b0 [ 276.892375][ T8292] do_iter_write+0x13b/0x3c0 [ 276.896962][ T8292] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 276.902869][ T8292] vfs_iter_write+0x5c/0x80 [ 276.907372][ T8292] iter_file_splice_write+0x530/0x840 [ 276.912755][ T8292] ? page_cache_pipe_buf_release+0x100/0x100 [ 276.918732][ T8292] direct_splice_actor+0xa0/0xc0 [ 276.923669][ T8292] splice_direct_to_actor+0x22b/0x540 [ 276.929046][ T8292] ? generic_pipe_buf_nosteal+0x20/0x20 [ 276.934611][ T8292] do_splice_direct+0x161/0x1e0 [ 276.939470][ T8292] do_sendfile+0x384/0x7f0 [ 276.943896][ T8292] __x64_sys_sendfile64+0x12a/0x140 [ 276.949213][ T8292] do_syscall_64+0xcc/0x3a0 [ 276.953727][ T8292] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 276.959620][ T8292] RIP: 0033:0x45a919 [ 276.963516][ T8292] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.983200][ T8292] RSP: 002b:00007f1822fb2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 276.991619][ T8292] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a919 [ 276.999583][ T8292] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000003 [ 277.007557][ T8292] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 277.015522][ T8292] R10: 000000007fffffff R11: 0000000000000246 R12: 00007f1822fb36d4 [ 277.023497][ T8292] R13: 00000000004c925e R14: 00000000004e0f88 R15: 00000000ffffffff [ 277.033040][ T8292] Kernel Offset: disabled [ 277.037366][ T8292] Rebooting in 86400 seconds..