[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 54.202270][ T26] audit: type=1800 audit(1572288158.531:25): pid=8372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 54.246466][ T26] audit: type=1800 audit(1572288158.531:26): pid=8372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 54.270817][ T26] audit: type=1800 audit(1572288158.531:27): pid=8372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.25' (ECDSA) to the list of known hosts. 2019/10/28 18:42:49 fuzzer started 2019/10/28 18:42:50 dialing manager at 10.128.0.26:44167 2019/10/28 18:42:50 syscalls: 2541 2019/10/28 18:42:50 code coverage: enabled 2019/10/28 18:42:50 comparison tracing: enabled 2019/10/28 18:42:50 extra coverage: extra coverage is not supported by the kernel 2019/10/28 18:42:50 setuid sandbox: enabled 2019/10/28 18:42:50 namespace sandbox: enabled 2019/10/28 18:42:50 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/28 18:42:50 fault injection: enabled 2019/10/28 18:42:50 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/28 18:42:50 net packet injection: enabled 2019/10/28 18:42:50 net device setup: enabled 2019/10/28 18:42:50 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 18:44:31 executing program 0: r0 = socket(0x10, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x31, &(0x7f0000000040)={0x0, 0x0}, 0x10) 18:44:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x7d}) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x7e}) syzkaller login: [ 167.056915][ T8537] IPVS: ftp: loaded support on port[0] = 21 18:44:31 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x2, &(0x7f0000000280), &(0x7f0000000240)=0x92) [ 167.177602][ T8539] IPVS: ftp: loaded support on port[0] = 21 [ 167.277737][ T8537] chnl_net:caif_netlink_parms(): no params data found [ 167.383890][ T8537] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.391442][ T8537] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.400788][ T8537] device bridge_slave_0 entered promiscuous mode [ 167.415206][ T8543] IPVS: ftp: loaded support on port[0] = 21 [ 167.441264][ T8537] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.448414][ T8537] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.456396][ T8537] device bridge_slave_1 entered promiscuous mode [ 167.474584][ T8539] chnl_net:caif_netlink_parms(): no params data found 18:44:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=0x7, 0x12) [ 167.536122][ T8537] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.575922][ T8537] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 167.623447][ T8537] team0: Port device team_slave_0 added [ 167.629914][ T8539] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.637055][ T8539] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.647462][ T8539] device bridge_slave_0 entered promiscuous mode [ 167.656187][ T8537] team0: Port device team_slave_1 added [ 167.666551][ T8539] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.691759][ T8539] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.700143][ T8539] device bridge_slave_1 entered promiscuous mode 18:44:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000002c0)={0x2, 0x0, [{0x1}, {0x80000008, 0x1a0}]}) [ 167.831870][ T8537] device hsr_slave_0 entered promiscuous mode [ 167.869294][ T8537] device hsr_slave_1 entered promiscuous mode [ 167.930234][ T8539] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 167.948029][ T8548] IPVS: ftp: loaded support on port[0] = 21 [ 167.975849][ T8545] IPVS: ftp: loaded support on port[0] = 21 [ 167.983410][ T8539] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 167.997287][ T8543] chnl_net:caif_netlink_parms(): no params data found 18:44:32 executing program 5: r0 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) close(r1) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$SIOCSIFHWADDR(r1, 0x8937, &(0x7f0000000080)={'bridge_slave_1\x00', @random="01003a1e2410"}) [ 168.070889][ T8539] team0: Port device team_slave_0 added [ 168.097165][ T8539] team0: Port device team_slave_1 added [ 168.109814][ T8537] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.117140][ T8537] bridge0: port 2(bridge_slave_1) entered forwarding state [ 168.124708][ T8537] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.131791][ T8537] bridge0: port 1(bridge_slave_0) entered forwarding state [ 168.232422][ T8539] device hsr_slave_0 entered promiscuous mode [ 168.259362][ T8539] device hsr_slave_1 entered promiscuous mode [ 168.299097][ T8539] debugfs: Directory 'hsr0' with parent '/' already present! [ 168.306759][ T8543] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.313984][ T8543] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.322365][ T8543] device bridge_slave_0 entered promiscuous mode [ 168.332862][ T8543] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.340742][ T8543] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.348302][ T8543] device bridge_slave_1 entered promiscuous mode [ 168.365046][ T8551] IPVS: ftp: loaded support on port[0] = 21 [ 168.380253][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.388238][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.443603][ T8543] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 168.471034][ T8545] chnl_net:caif_netlink_parms(): no params data found [ 168.488240][ T8543] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 168.516848][ T8543] team0: Port device team_slave_0 added [ 168.524170][ T8543] team0: Port device team_slave_1 added [ 168.611057][ T8543] device hsr_slave_0 entered promiscuous mode [ 168.659450][ T8543] device hsr_slave_1 entered promiscuous mode [ 168.699128][ T8543] debugfs: Directory 'hsr0' with parent '/' already present! [ 168.783868][ T8548] chnl_net:caif_netlink_parms(): no params data found [ 168.795536][ T8551] chnl_net:caif_netlink_parms(): no params data found [ 168.874725][ T8548] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.882423][ T8548] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.890080][ T8548] device bridge_slave_0 entered promiscuous mode [ 168.897562][ T8548] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.904761][ T8548] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.915610][ T8548] device bridge_slave_1 entered promiscuous mode [ 168.924936][ T8545] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.932210][ T8545] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.939900][ T8545] device bridge_slave_0 entered promiscuous mode [ 168.946994][ T8551] bridge0: port 1(bridge_slave_0) entered blocking state [ 168.954624][ T8551] bridge0: port 1(bridge_slave_0) entered disabled state [ 168.962704][ T8551] device bridge_slave_0 entered promiscuous mode [ 168.977864][ T8545] bridge0: port 2(bridge_slave_1) entered blocking state [ 168.986275][ T8545] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.994075][ T8545] device bridge_slave_1 entered promiscuous mode [ 169.017044][ T8551] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.024197][ T8551] bridge0: port 2(bridge_slave_1) entered disabled state [ 169.033456][ T8551] device bridge_slave_1 entered promiscuous mode [ 169.056354][ T8551] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.078432][ T8548] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.095302][ T8548] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 169.113019][ T8551] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 169.123280][ T8545] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 169.134677][ T8545] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 169.157641][ T8537] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.180703][ T8551] team0: Port device team_slave_0 added [ 169.188447][ T8548] team0: Port device team_slave_0 added [ 169.197212][ T8548] team0: Port device team_slave_1 added [ 169.217397][ T8551] team0: Port device team_slave_1 added [ 169.235755][ T8545] team0: Port device team_slave_0 added [ 169.243130][ T8545] team0: Port device team_slave_1 added [ 169.254502][ T8537] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.291605][ T8548] device hsr_slave_0 entered promiscuous mode [ 169.339605][ T8548] device hsr_slave_1 entered promiscuous mode [ 169.379338][ T8548] debugfs: Directory 'hsr0' with parent '/' already present! [ 169.394958][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.403338][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.431616][ T8539] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.502295][ T8551] device hsr_slave_0 entered promiscuous mode [ 169.539330][ T8551] device hsr_slave_1 entered promiscuous mode [ 169.579120][ T8551] debugfs: Directory 'hsr0' with parent '/' already present! [ 169.620798][ T8545] device hsr_slave_0 entered promiscuous mode [ 169.669660][ T8545] device hsr_slave_1 entered promiscuous mode [ 169.709343][ T8545] debugfs: Directory 'hsr0' with parent '/' already present! [ 169.717010][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 169.725989][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 169.734933][ T3022] bridge0: port 1(bridge_slave_0) entered blocking state [ 169.742020][ T3022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 169.750266][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 169.758720][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 169.767149][ T3022] bridge0: port 2(bridge_slave_1) entered blocking state [ 169.774196][ T3022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 169.803868][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 169.842396][ T8543] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.857113][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 169.865799][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 169.874425][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 169.884387][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 169.893084][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 169.901841][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.909804][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.918567][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 169.926727][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 169.935075][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 169.948939][ T8539] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.992979][ T8543] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.015519][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.027098][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.035857][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.046364][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.054380][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.065736][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.074323][ T8550] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.081415][ T8550] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.089543][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.097966][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.106318][ T8550] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.113350][ T8550] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.121573][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.132988][ T8537] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.175054][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.183633][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.192910][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.199962][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.209802][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.218241][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.226794][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.233866][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.243032][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.251800][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.260459][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.268794][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.277286][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.285219][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.310442][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.321783][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.332446][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.348339][ T8539] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 170.359602][ T8539] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.384385][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.392671][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.401755][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.410792][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.418935][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.427792][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.461163][ T8548] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.472601][ T8543] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 170.483773][ T8543] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 170.498746][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.507732][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 170.516504][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 170.525149][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 170.533451][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 170.542090][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 170.550438][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 170.558599][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 170.567847][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 170.576140][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 170.592950][ T8539] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.611066][ T8543] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.625880][ T8537] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 170.643356][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 170.656498][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 170.677637][ T8548] 8021q: adding VLAN 0 to HW filter on device team0 [ 170.729264][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.737770][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.769802][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.776924][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.787202][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.805426][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.813927][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.821002][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.830506][ T3022] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 170.853337][ T8545] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.873023][ T8556] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.882778][ T8556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.902171][ T8551] 8021q: adding VLAN 0 to HW filter on device bond0 [ 170.935636][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 170.968184][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 18:44:35 executing program 1: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r0, &(0x7f0000000100)=""/9, 0x9) 18:44:35 executing program 2: r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x3ad, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000002000010000000000000000000200000009000000000000000b00000008880e0000000000080013009a381a7d33b05849fd2fcb82db06dad6"], 0x30}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 171.009445][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.048604][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 18:44:35 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x5, &(0x7f0000000200)=0xffffffff, 0x4) [ 171.094373][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 18:44:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) [ 171.146006][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.171212][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.206902][ T8545] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.225103][ T8551] 8021q: adding VLAN 0 to HW filter on device team0 [ 171.253391][ T8548] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 171.264527][ T8548] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 171.277840][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 171.287117][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 171.298088][ C0] hrtimer: interrupt took 29745 ns 18:44:35 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, 0x0) [ 171.305446][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 171.336022][ T8594] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:44:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f00000003c0)=0x6, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000002c0)="fa01711425a6b42ddc5c46757f6b420f356f4f008ce309074327bfdd3558461fe59a8fd6186e0a11a693ed5f54b054e87042b72df1ce9aa8d1c176bea1239e42ab4119d8ebba7d7572e655238e8156a75410f44a7665b186275f2182aeae9570569bea3a5a5e22475ef4d24a9fa031de380e0d1a5ddf665a39fa4317200e1cf4457dd6a9c3a948a4d159e7c13db66c42327db092a6924604db4343b6386fd648d7e27be1cfc4ebcd71ff34048236cd59a7d4401307f3277e5ed875001a30134ed752a5b811689ab9c8", 0x2a2b178a6daa88db, 0x5, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x42, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) [ 171.337334][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 171.427489][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 171.469828][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 171.478266][ T8592] netlink: 'syz-executor.2': attribute type 19 has an invalid length. [ 171.556442][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 171.574681][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 171.619925][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.628418][ T8550] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.635560][ T8550] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.654597][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 18:44:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) [ 171.663573][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.675933][ T8550] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.683219][ T8550] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.695292][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.709999][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 18:44:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) [ 171.753749][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 171.766963][ T8550] bridge0: port 1(bridge_slave_0) entered blocking state [ 171.774098][ T8550] bridge0: port 1(bridge_slave_0) entered forwarding state [ 171.790004][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 171.798836][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 171.812786][ T8550] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.819872][ T8550] bridge0: port 2(bridge_slave_1) entered forwarding state [ 171.827484][ T8550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 171.843885][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.855568][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 171.910604][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.964905][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 171.990116][ T8617] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 172.018320][ T8548] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.026337][ T8589] netlink: 'syz-executor.2': attribute type 19 has an invalid length. [ 172.103612][ T8545] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 172.145514][ T8545] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 172.173616][ T8551] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 18:44:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) [ 172.201818][ T8551] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 172.223331][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.246956][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.255731][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 172.288097][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 172.305410][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.326584][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.335278][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.343767][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.375920][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.407439][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.432300][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 172.453017][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 172.485126][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 172.495800][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 172.507830][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 172.518125][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 172.546348][ T8545] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.553913][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.562971][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 172.578661][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 172.586398][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 172.600174][ T8551] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 172.670131][ T8638] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 18:44:37 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=0x7, 0x12) 18:44:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) 18:44:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) 18:44:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) 18:44:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) 18:44:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) [ 173.075477][ T8668] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:44:37 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=0x7, 0x12) [ 173.134428][ T8659] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 173.156355][ T8653] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:44:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) 18:44:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) 18:44:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) 18:44:37 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000000c0)=0x7, 0x12) 18:44:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) 18:44:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) 18:44:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) 18:44:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) 18:44:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) [ 173.799799][ T8697] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 18:44:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) 18:44:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) 18:44:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0800450000640000000000019078ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400083400000000000000000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$P9_RSTATu(r6, &(0x7f0000000400)={0xfffffebe, 0x7d, 0x0, {{0x500, 0xfa, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x04nodevselfwmd5sum[vboxnet0ppp0%', 0x17, 'ppp1procvmnet1\xdd)wlan0+]', 0x91, 'cgroupppp1(\\\x18?\x82u\x1a\xac\xf2\xde\x8c\xca%`\xc6\xfb0.%\x90>\xc3Kd}D!\v%\xbf\xc2\r\xc5\xe8\xa0*-\xf8[R\xf4m\x93F\xb7\xaf\x13\x00\xe8\xb5}\xb4P\x87\xc0n\xed\xb2\xcd\x84H\xb0h(\x01\xbf\xf8\xc8\xfa\xe1\xa1\x85@\xac2X\xe40\'TJ\x83\xb3\xf2\xc8\x12f65f\x04D\xfc\xfc\xb2}\xe5\xbf\xe6\x91k\x8f\x82\x91r\xc0\xcc\b\xff\xdf\xda\xcc7\xa4n@O3\xbd\xb1AE\xa1\xd6!\x8d\x17\x8b\xa3\xb3\xf0\xbd\xb7UH'}, 0xa, '/dev/nbd#\x00'}}, 0x119) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x7}}}, 0x88) r7 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r8, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r7, &(0x7f00000001c0)=ANY=[], 0x0) fallocate(r7, 0x10, 0x0, 0x8000) fallocate(r1, 0x4, 0x0, 0x100000001) set_thread_area(0x0) write$apparmor_current(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYBLOB], 0x1) [ 174.092981][ T8713] kasan: CONFIG_KASAN_INLINE enabled [ 174.098581][ T8713] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 174.106735][ T8713] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 174.113665][ T8713] CPU: 0 PID: 8713 Comm: syz-executor.1 Not tainted 5.4.0-rc5-next-20191028 #0 [ 174.122589][ T8713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.132681][ T8713] RIP: 0010:ip_sublist_rcv+0x5c0/0x940 [ 174.138137][ T8713] Code: 0f 85 2f 01 00 00 e8 ff f9 59 fb 48 8b 85 00 ff ff ff 48 8d b8 e8 0e 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 64 03 00 00 48 8b 85 00 ff ff ff 4c 8b a0 e8 0e [ 174.157743][ T8713] RSP: 0018:ffff8880615173c8 EFLAGS: 00010206 [ 174.163808][ T8713] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000814e000 [ 174.171790][ T8713] RDX: 00000000000001dd RSI: ffffffff86197031 RDI: 0000000000000ee8 [ 174.179755][ T8713] RBP: ffff8880615174f0 R08: ffff88806150a540 R09: ffffed1015d06b7d [ 174.187708][ T8713] R10: ffffed1015d06b7c R11: ffff8880ae835be3 R12: 0000000000000001 [ 174.195661][ T8713] R13: ffff888071440000 R14: ffff888061517558 R15: ffff8880615174c8 [ 174.203626][ T8713] FS: 00007f3f9d27d700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 174.212530][ T8713] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 174.219088][ T8713] CR2: 0000001b3162d000 CR3: 00000000a77b0000 CR4: 00000000001406f0 [ 174.227041][ T8713] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 174.234991][ T8713] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 174.242937][ T8713] Call Trace: [ 174.246221][ T8713] ? kmem_cache_free+0xab/0x320 [ 174.251046][ T8713] ? ip_rcv_finish+0x2f0/0x2f0 [ 174.255884][ T8713] ? kfree_skbmem+0xca/0x150 [ 174.260450][ T8713] ? kfree_skb+0x10e/0x3c0 [ 174.264856][ T8713] ? ip_rcv_core.isra.0+0x878/0xc80 [ 174.270028][ T8713] ip_list_rcv+0x370/0x4ac [ 174.274423][ T8713] ? ip_rcv+0x3f0/0x3f0 [ 174.278577][ T8713] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 174.284014][ T8713] ? ip_rcv+0x3f0/0x3f0 [ 174.288150][ T8713] __netif_receive_skb_list_core+0x5fc/0x9d0 [ 174.294197][ T8713] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 174.299642][ T8713] ? process_backlog+0x750/0x750 [ 174.304561][ T8713] ? netif_receive_skb_list_internal+0x4e4/0xe50 [ 174.310865][ T8713] netif_receive_skb_list_internal+0x7eb/0xe50 [ 174.317009][ T8713] ? __this_cpu_preempt_check+0x35/0x190 [ 174.322619][ T8713] ? __netif_receive_skb_list_core+0x9d0/0x9d0 [ 174.328760][ T8713] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 174.335014][ T8713] ? eth_type_trans+0x3a5/0x760 [ 174.339843][ T8713] gro_normal_list.part.0+0x1e/0xb0 [ 174.345017][ T8713] gro_normal_one+0x184/0x1d0 [ 174.349671][ T8713] napi_gro_frags+0x915/0xd00 [ 174.354340][ T8713] tun_get_user+0x2e8e/0x3f80 [ 174.358995][ T8713] ? __kasan_check_read+0x11/0x20 [ 174.364003][ T8713] ? tun_build_skb.isra.0+0x1380/0x1380 [ 174.369547][ T8713] ? rcu_read_lock_held+0x9c/0xb0 [ 174.374558][ T8713] ? __kasan_check_read+0x11/0x20 [ 174.379574][ T8713] tun_chr_write_iter+0xbd/0x156 [ 174.384504][ T8713] do_iter_readv_writev+0x5f8/0x8f0 [ 174.389681][ T8713] ? no_seek_end_llseek_size+0x70/0x70 [ 174.395132][ T8713] ? apparmor_file_permission+0x25/0x30 [ 174.400669][ T8713] ? rw_verify_area+0x126/0x360 [ 174.405496][ T8713] do_iter_write+0x184/0x610 [ 174.410065][ T8713] ? dup_iter+0x260/0x260 [ 174.414376][ T8713] vfs_writev+0x1b3/0x2f0 [ 174.418684][ T8713] ? vfs_iter_write+0xb0/0xb0 [ 174.423339][ T8713] ? __kasan_check_read+0x11/0x20 [ 174.428345][ T8713] ? ksys_dup3+0x3e0/0x3e0 [ 174.432739][ T8713] ? __kasan_check_read+0x11/0x20 [ 174.437746][ T8713] ? __fget_light+0x1a9/0x230 [ 174.442401][ T8713] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.448620][ T8713] do_writev+0x15b/0x330 [ 174.452864][ T8713] ? vfs_writev+0x2f0/0x2f0 [ 174.457346][ T8713] ? do_syscall_64+0x26/0x760 [ 174.462017][ T8713] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.468062][ T8713] ? do_syscall_64+0x26/0x760 [ 174.472716][ T8713] __x64_sys_writev+0x75/0xb0 [ 174.477482][ T8713] do_syscall_64+0xfa/0x760 [ 174.481966][ T8713] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.487834][ T8713] RIP: 0033:0x459df1 [ 174.491835][ T8713] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 174.511418][ T8713] RSP: 002b:00007f3f9d27cba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 174.519813][ T8713] RAX: ffffffffffffffda RBX: 0000000000000072 RCX: 0000000000459df1 [ 174.527767][ T8713] RDX: 0000000000000001 RSI: 00007f3f9d27cc00 RDI: 00000000000000f0 [ 174.535721][ T8713] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 174.543683][ T8713] R10: ffffffffffffffff R11: 0000000000000293 R12: 00007f3f9d27d6d4 [ 174.551636][ T8713] R13: 00000000004c934a R14: 00000000004e0c28 R15: 00000000ffffffff [ 174.559592][ T8713] Modules linked in: [ 174.563571][ T8713] ---[ end trace 8d37754a94ff9025 ]--- [ 174.569086][ T8713] RIP: 0010:ip_sublist_rcv+0x5c0/0x940 [ 174.574598][ T8713] Code: 0f 85 2f 01 00 00 e8 ff f9 59 fb 48 8b 85 00 ff ff ff 48 8d b8 e8 0e 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 64 03 00 00 48 8b 85 00 ff ff ff 4c 8b a0 e8 0e [ 174.594395][ T8713] RSP: 0018:ffff8880615173c8 EFLAGS: 00010206 [ 174.600547][ T8713] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000814e000 [ 174.608587][ T8713] RDX: 00000000000001dd RSI: ffffffff86197031 RDI: 0000000000000ee8 [ 174.616657][ T8713] RBP: ffff8880615174f0 R08: ffff88806150a540 R09: ffffed1015d06b7d [ 174.624728][ T8713] R10: ffffed1015d06b7c R11: ffff8880ae835be3 R12: 0000000000000001 [ 174.632808][ T8713] R13: ffff888071440000 R14: ffff888061517558 R15: ffff8880615174c8 [ 174.640889][ T8713] FS: 00007f3f9d27d700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 174.649916][ T8713] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 174.650448][ T3919] kobject: 'loop0' (000000005d02a1b6): kobject_uevent_env [ 174.656557][ T8713] CR2: 0000001b3162d000 CR3: 00000000a77b0000 CR4: 00000000001406f0 [ 174.656613][ T8713] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 174.656634][ T8713] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 174.656654][ T8713] Kernel panic - not syncing: Fatal exception in interrupt [ 174.657935][ T8713] Kernel Offset: disabled [ 174.700389][ T8713] Rebooting in 86400 seconds..