[ 83.140276][ T28] audit: type=1800 audit(1580638141.841:26): pid=9513 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 84.020361][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 84.020373][ T28] audit: type=1800 audit(1580638142.741:29): pid=9513 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 84.047307][ T28] audit: type=1800 audit(1580638142.741:30): pid=9513 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.39' (ECDSA) to the list of known hosts. 2020/02/02 10:09:13 fuzzer started 2020/02/02 10:09:15 dialing manager at 10.128.0.26:36447 2020/02/02 10:09:16 syscalls: 2939 2020/02/02 10:09:16 code coverage: enabled 2020/02/02 10:09:16 comparison tracing: enabled 2020/02/02 10:09:16 extra coverage: enabled 2020/02/02 10:09:16 setuid sandbox: enabled 2020/02/02 10:09:16 namespace sandbox: enabled 2020/02/02 10:09:16 Android sandbox: /sys/fs/selinux/policy does not exist 2020/02/02 10:09:16 fault injection: enabled 2020/02/02 10:09:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/02/02 10:09:16 net packet injection: enabled 2020/02/02 10:09:16 net device setup: enabled 2020/02/02 10:09:16 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/02/02 10:09:16 devlink PCI setup: PCI device 0000:00:10.0 is not available 10:11:57 executing program 0: r0 = add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="d77c56f2a27fd754cd7808a49bbe14219b01e738267577663ccdffca6add51fe3c1ab4bd7e1cb32f2d6ec4701b2baab3477fe8e0aef432a8efd7e2d1", 0x3c, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000000c0)={r0, 0x2a, 0x77}, &(0x7f0000000100)={'enc=', 'oaep', ' hash=', {'streebog256-generic\x00'}}, &(0x7f0000000180)="d1d754c3e49747cda7e0e09469635cbf9c97edd68d293cb32edab08bf85585e01e1d8a8edaa305164eb7", &(0x7f00000001c0)=""/119) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000240), &(0x7f0000000280)=0x4) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000340)={0x2, 'veth1\x00', {0xef7}, 0x8}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x70, r2, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}]}, 0x70}}, 0x1) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ashmem\x00', 0x200000, 0x0) r3 = socket$inet6(0xa, 0x80007, 0x2) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000540)) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$KDGKBTYPE(r4, 0x4b33, &(0x7f00000005c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r3, 0x29, 0xd3, &(0x7f0000000600)={{0xa, 0x4e21, 0x8001, @local, 0xfa}, {0xa, 0x4e21, 0x2, @loopback, 0x1}, 0x1000, [0x1, 0xffff37c8, 0xffffff00, 0x80000, 0x1, 0xf0b, 0x3ff, 0x40]}, 0x5c) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000680)) r5 = getegid() syz_mount_image$ntfs(&(0x7f00000006c0)='ntfs\x00', &(0x7f0000000700)='./file0\x00', 0x401, 0x1, &(0x7f0000000800)=[{&(0x7f0000000740)="f3a7970a91fdaed917228df4c40687fcf02c6f7fd057cc18c61e91766be57985834242f715dea9e07870a25a85fa2a3564b27ff9f5fdf3414411529002d105dd0f96c5dfbfa72c036852ff80a43d855e7d7bbf1ab032209d522d90e25bb1c8d107a6a438858e6306a60418d9cdfdc0c9b04b3425c1147bbc95adcf2ea553c7f7e2e54bf53d7598", 0x87, 0x8230}], 0x18000, &(0x7f0000000840)={[{@gid={'gid', 0x3d, r5}}]}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000880)={@any, 0x7fffffff, 0x1000, 0x1, 0x8, 0x7, "6ee51bbbc10e74acaf46924ebe30886655091fa89547af63dd346884b4d12f6439f95bfac1d2f84b2a588fbc44e31ae41509c1e468f809242dec15aa4d8869fd0eaa62c8c4aa30d792e72827cfb4f75d5a5f951d4a5bbd69401e28089c9fd8fe7e6c9c0cb01148dd125c0a019905330afc27e97a796d2e61c808fa835ae22db2"}) ioctl$EVIOCSKEYCODE_V2(r4, 0x40284504, &(0x7f0000000940)={0x4, 0x1f, 0x79bf, 0x7fff, "c9cf3ed4548e9790b1ed0919702798ca05f115b62e7871478169e0d4ab94d3ce"}) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000980)=0x0) setpriority(0x1, r6, 0x200) ioctl$VIDIOC_S_FBUF(r4, 0x4030560b, &(0x7f0000000a00)={0xa9, 0xe, &(0x7f00000009c0)="5edd677a5dcaf7ff796bd5081b9f6b8130df4ba4ef98997586a0", {0x5, 0x7b7, 0x2d5ce68bcc008489, 0x5, 0x1000, 0x6, 0x7, 0x1}}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000ec0)='/proc/asound/seq/clients\x00', 0x0, 0x0) getsockopt$rose(r7, 0x104, 0x1, &(0x7f0000000f00), &(0x7f0000000f40)=0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000f80)={0x0, 0x401}, &(0x7f0000000fc0)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000001000)={r8, 0x2}, &(0x7f0000001040)=0x8) time(&(0x7f0000001080)) fsetxattr$trusted_overlay_nlink(r1, &(0x7f00000010c0)='trusted.overlay.nlink\x00', &(0x7f0000001100)={'U-'}, 0x16, 0x2) arch_prctl$ARCH_GET_CPUID(0x1011) lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r9, 0x3) syzkaller login: [ 259.379287][ T9683] IPVS: ftp: loaded support on port[0] = 21 10:11:58 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4200, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000040)={0x9, 0x0, [], {0x0, @reserved}}) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000100)=""/61, &(0x7f0000000140)=0x3d) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x20000, 0x84) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000200)=@usbdevfs_driver={0x6, 0xffffff88, &(0x7f00000001c0)="3618d8a537314613"}) r2 = add_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="520dd28d7708f2630848f9ca14d3e9b06b5be8e71ea1150b24035e650e5b0361f001526133065c92b1c588f769e0203e69a65f5aba86fb72c99bdac481149f0836e1fe7f84ef79a9e009954438b40db4fd367289d4a424495991005b46b34e4298ee099d42d55b01ed408e5cbdc6fe7a2a47ad712dce66da5cd430b04196514179dd72612a9a710f6598889d5a7705230fd1c887bef94acda15716fda82977231a1f8ee42be59127457556e104ec8239e3afb5c58e6be964d0bd9506448bbe2c6e6c038b31cba678a39acccdab314ceba9b71974e48a56f9a168558e94dacc93c752edac", 0xe4, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, r2, &(0x7f0000000580)=[{&(0x7f00000003c0)="184fb199bfe2bca64ba3fb51163ccdad08489fd542cd35e624a9fd28e6654fc3abb21e1203351fb1fec850b7ac24780cff09a9f729cdab622a5d5d51eb5ca4b6093055ff54278aebc0e4097e9f965dd8016e5e864ef8d7e07898914f32a8253b777e19d774446ac69a74a08bb08be56b23b552924b9034982dce98be808abf06a7983bf4f37ede8b8d02cd9a5589ef6045494d", 0x93}, {&(0x7f0000000480)="390159b7be30353012707d300229d579313bd45ccab6e8ce0c4178844e27c29fcca2116c4f6865fdb9b97ccf17e6b108f4943334764d553d22fe829c467166d12d61a769adcd16839eb9bbb1c81f48a750f857db53557529fd13a42c5b14869c1ff80682e65bbb1eb158befa013d4bc448b0f97ba3eaf0d3a9722d9c212c1c25d06abd787c8ea9627f1f77e31aee186ab0b951e2e3f9c7b0a3296e4e3b200ff09247e950d83d71e950837baefd9632fa917bafc2e9c3ffdea6d768447fd0e6f5c26114c91b215745ce8e1f15f670df77e02e9cab1864a7ef57098d8550a74f7c37", 0xe1}], 0x2, r3) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000640)) ioctl$USBDEVFS_CLAIMINTERFACE(r1, 0x8004550f, &(0x7f0000000680)=0x7) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000007c0)={0xffffffffffffffff}, 0x2, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r4, &(0x7f0000000840)={0xb, 0x10, 0xfa00, {&(0x7f0000000700), r5, 0x4}}, 0x18) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000880)=0x0) sched_getaffinity(r6, 0x8, &(0x7f00000008c0)) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000940)={0x6, 0xc, 0x4, 0x1000000, 0x8, {0x0, 0x2710}, {0x1, 0x8, 0x5, 0x7, 0x4, 0xc1, "e596d472"}, 0x632, 0x2, @planes=&(0x7f0000000900)={0x173f6dd2, 0x21b9, @fd=0xffffffffffffffff, 0xe4}, 0x8, 0x0, 0xffffffffffffffff}) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f00000009c0)=0x0, &(0x7f0000000a00)=0x4) setsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000a40)={r9, @dev={0xac, 0x14, 0x14, 0x2c}, @multicast1}, 0xc) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000a80)={0xfffffffb, 0x2, 0x4, 0x17f100, 0x7fffffff, {}, {0x2, 0xc, 0x3, 0x71, 0x1, 0x3, '*]UD'}, 0x1f, 0x4, @fd=r7, 0x1, 0x0, 0xffffffffffffffff}) r12 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000b40)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LISTALL(r11, &(0x7f0000000c00)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x3c, r12, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40004}, 0x40010) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000c40), &(0x7f0000000c80)=0x4) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(r11, 0xc0884123, &(0x7f0000000cc0)={0x6, "74de4b0be66ece23b24e6f328cb7ba31a05b4747fa64830d5986819ec494dd4469baf2ad04a3eeceafe7bb939aaf6e202251f7cba7446fb617866f5c0b04df9b", {0x2, 0x3}}) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ttynull\x00', 0x2000, 0x0) socket$rxrpc(0x21, 0x2, 0x2) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000e00)={0xb72, 0x2, 0x4, 0x4000000, 0x2, {0x77359400}, {0x1, 0x0, 0x5, 0x5, 0x0, 0x7, "87c50e79"}, 0x3ff, 0x1, @planes=&(0x7f0000000dc0)={0xffffff81, 0x9, @fd=r8, 0x1c}, 0x6, 0x0, r10}) ioctl$FS_IOC_GETFSLABEL(r13, 0x81009431, &(0x7f0000000e80)) ioctl$IMADDTIMER(r13, 0x80044940, &(0x7f0000000f80)=0x14) r14 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001000)='nl80211\x00') sendmsg$NL80211_CMD_GET_INTERFACE(r1, &(0x7f0000001100)={&(0x7f0000000fc0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001040)={0x48, r14, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3f, 0x2}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x3006}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8001, 0x1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0xc004) [ 259.514658][ T9683] chnl_net:caif_netlink_parms(): no params data found [ 259.660028][ T9683] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.675571][ T9683] bridge0: port 1(bridge_slave_0) entered disabled state [ 259.683387][ T9683] device bridge_slave_0 entered promiscuous mode 10:11:58 executing program 2: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@local, @local, @loopback}, &(0x7f00000000c0)=0xc) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000140)={0x0, 0xe9}, 0x2) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0xc40, 0x0) write$P9_RMKNOD(r2, &(0x7f00000001c0)={0x14, 0x13, 0x2, {0x1, 0x1, 0x6}}, 0x14) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000200)={@loopback, @dev}, &(0x7f0000000240)=0x8) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x305240, 0x0) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvme-fabrics\x00', 0x420a03, 0x0) fanotify_mark(r3, 0x0, 0x2, r4, &(0x7f0000000300)='./file0\x00') r5 = creat(&(0x7f0000000340)='./file0\x00', 0x110) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x14, "9624edf637a705d0e17ead31aadee3e439bf8acb"}, &(0x7f00000003c0)=0x1c) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000400)={0x5000, 0x4, 0x200, 0x2, 0x9, 0x800, 0xafd, 0xfffffffc, r6}, &(0x7f0000000440)=0x20) io_getevents(0x0, 0x800, 0x2, &(0x7f0000000480)=[{}, {}], &(0x7f00000004c0)={0x77359400}) r7 = accept(r4, &(0x7f0000000500)=@generic, &(0x7f0000000580)=0x80) setsockopt$inet_opts(r7, 0x0, 0x5aca669d79caf880, &(0x7f00000005c0)="9d34f72501c3e08625d693ac85e261234c56cfe8e54b8525829b7aa730d305477c3fa93230a786a4ebdfbe165670a209ce5ac0574b962563d64ffb42b6868a547f6a5410c892334886092df69576b50ba7f8ddb9dd7a9f8312c9de591d2503af2b94ba415691859761b52b1edf0517fc28007a62e56697b80ecb6511100b31dc01ebe8e3fe433ce4499f", 0x8a) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x12002, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r8, 0x6, 0x3, &(0x7f00000006c0)=0x38, 0x4) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000700)=""/60) r9 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ubi_ctrl\x00', 0x800, 0x0) ioctl$SIOCX25GFACILITIES(r9, 0x89e2, &(0x7f0000000780)) mmap$snddsp_control(&(0x7f0000fed000/0x12000)=nil, 0x1000, 0x5, 0x11, r1, 0x83000000) r10 = openat$null(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/null\x00', 0x40000, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r10, 0x660c) r11 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000800)='/proc/capi/capi20\x00', 0x89041, 0x0) ioctl$RTC_PLL_SET(r11, 0x40207012, &(0x7f0000000840)={0x40, 0xfffffab0, 0x1, 0x0, 0x6, 0x400, 0xff}) ioctl$int_out(r5, 0x0, &(0x7f0000000880)) r12 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_DEL(r12, 0x0, 0x484, &(0x7f00000008c0)={0x1, @rand_addr=0x8, 0x4e23, 0x1, 'rr\x00', 0x1, 0x80000000, 0x21}, 0x2c) [ 259.708924][ T9683] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.717636][ T9683] bridge0: port 2(bridge_slave_1) entered disabled state [ 259.726278][ T9683] device bridge_slave_1 entered promiscuous mode [ 259.742500][ T9687] IPVS: ftp: loaded support on port[0] = 21 [ 259.778398][ T9683] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 259.804635][ T9683] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 259.899410][ T9683] team0: Port device team_slave_0 added [ 259.927187][ T9683] team0: Port device team_slave_1 added [ 260.014310][ T9683] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 260.021702][ T9683] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 10:11:58 executing program 3: ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000040)={0x8, 0xa, 0x4, 0x400, 0x3, {}, {0x3, 0x0, 0x80, 0x9, 0x3, 0x0, "a3bb6786"}, 0x4, 0x2, @planes=&(0x7f0000000000)={0x5, 0x80000000, @userptr=0x9, 0x2}, 0x51, 0x0, 0xffffffffffffffff}) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f00000000c0)={0x2, 0x7}) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000100)) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsu\x00', 0x2080, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0xffffffff) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000180), &(0x7f00000001c0)=0x30) r2 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0xfff, 0x181000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000001f40)={@remote, @broadcast, 0x0}, &(0x7f0000001f80)=0xc) sendmsg$can_j1939(r2, &(0x7f0000002080)={&(0x7f0000001fc0)={0x1d, r3, 0x3, {0x2, 0xf0, 0x2}, 0xff}, 0x18, &(0x7f0000002040)={&(0x7f0000002000)="2936e52c18f401818656f8ca62b3e5c92bcdac735d3fb1a8ddf245e3d6de374cc0cce03fee6f48c8ad13d30eebb918af", 0x30}, 0x1, 0x0, 0x0, 0x4800}, 0x8000) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f00000020c0)=0x8, 0x4) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000002100)='/dev/null\x00', 0x2440, 0x0) ioctl$VIDIOC_S_AUDIO(r4, 0x40345622, &(0x7f0000002140)={0x5, "2d5cc109ef3e03d108eeed79c94555a303b1de4497d9cee366c26e21aa880332", 0x2, 0x1}) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000002180)={0x1, @vbi={0x0, 0x8000, 0x1, 0x34325258, [0x80000000, 0x983d], [0x9, 0x4], 0x1}}) fsopen(&(0x7f0000002280)='ubifs\x00', 0x1) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f00000022c0)=0x7) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000002300)='/dev/btrfs-control\x00', 0x240, 0x0) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000025c0)={0x0, 0x0}, &(0x7f0000002600)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) statx(r1, &(0x7f00000026c0)='./file0\x00', 0x100, 0x7ff, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000002800)='./file0\x00', &(0x7f0000002840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r5, &(0x7f00000028c0)={0x348, 0xfffffffffffffff5, 0x6, [{{0x3, 0x3, 0x7, 0x1, 0xffffffff, 0x1, {0x6, 0x3, 0x1, 0x8000, 0x4, 0x4, 0x7, 0x1, 0xfff, 0x2, 0x87, r6, r7, 0x100, 0x6}}, {0x5, 0x9, 0x6, 0x4, 'ubifs\x00'}}, {{0x5, 0x0, 0x20400, 0x5, 0x401, 0x200, {0x2, 0xfffffffffffffffc, 0x6, 0x6, 0x2, 0x7ff, 0x5e1b, 0x3, 0x400, 0x6, 0x2da1, r8, r9, 0x1, 0x4}}, {0x6, 0x3, 0xa, 0x0, '/dev/null\x00'}}, {{0x2, 0x1, 0x8, 0x3, 0x82a6, 0x2, {0x0, 0x0, 0x3f, 0x4, 0xfff, 0x2, 0x4, 0x7, 0x1, 0xfffff869, 0x7, 0xee01, r10, 0xfffffff9, 0x95f}}, {0x2, 0xffff, 0xc, 0x2, '/dev/audio#\x00'}}, {{0x4, 0x0, 0x5, 0x100, 0x2, 0x9, {0x0, 0x7f, 0x2, 0x3, 0x0, 0x3, 0x7f, 0x1, 0x1, 0x4, 0x81, r11, r12, 0x3b0251ae}}, {0x0, 0x80000000, 0x6, 0x1, 'cpuset'}}, {{0x4, 0x3, 0x8001, 0xb7, 0x4, 0x401, {0x4, 0x4, 0x0, 0xe6a, 0x90000000, 0x148cb619, 0x7ff8, 0x1, 0x0, 0x1665, 0x0, r13, r14, 0x4, 0x1}}, {0x4, 0x800, 0xa, 0xffffffff, '/dev/null\x00'}}]}, 0x348) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000002c80)={0x9d0000, 0x80000001, 0x916c, 0xffffffffffffffff, 0x0, &(0x7f0000002c40)={0x98090a, 0x10000, [], @ptr=0x5}}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000002cc0)={0x0, @in6={{0xa, 0x4e20, 0xef4e, @rand_addr="88d3798679aa95d1942c9172123fc7b8", 0x9}}, 0xffff, 0x7, 0x8, 0x8, 0x8}, &(0x7f0000002d80)=0x98) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r15, 0x84, 0x73, &(0x7f0000002dc0)={r16, 0x6, 0x20, 0x1f, 0x2}, &(0x7f0000002e00)=0x18) getsockname(0xffffffffffffffff, &(0x7f0000002e40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000002ec0)=0x80) setsockopt$IPT_SO_SET_REPLACE(r17, 0x0, 0x40, &(0x7f0000002f40)=@security={'security\x00', 0xe, 0x4, 0x368, 0xc0, 0xc0, 0xc0, 0xc0, 0x0, 0x2d0, 0x2d0, 0x2d0, 0x2d0, 0x2d0, 0x4, &(0x7f0000002f00), {[{{@ip={@broadcast, @multicast1, 0xff, 0xff, 'macvtap0\x00', 'ip6tnl0\x00', {}, {0xff}, 0x6c, 0x1, 0x22}, 0x0, 0x90, 0xc0, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x1, 0x2, 0x5}, {0x0, 0x2, 0x1}, 0x2, 0x1}}}, {{@uncond, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0xb41, 0x99, 0x0, 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x3, [0x6, 0x4, 0x4, 0x1, 0x1, 0x2], 0x6, 0x2}, {0x1, [0x3, 0x4, 0x6, 0x3, 0x6, 0x1], 0x3, 0x6}}}}, {{@ip={@local, @dev={0xac, 0x14, 0x14, 0x42}, 0xffffffff, 0xffffffff, 'ip6gre0\x00', 'veth0_to_team\x00', {}, {}, 0x5c, 0x0, 0x43}, 0x0, 0xb0, 0x110, 0x0, {}, [@common=@set={{0x40, 'set\x00'}, {{0x3, [0x2, 0xa, 0x6, 0x5, 0x1, 0x5], 0x2, 0x6}}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast, 0x200, 0x9, [0x27, 0x11, 0x40, 0x0, 0x17, 0x27, 0x1a, 0x6, 0x1a, 0x24, 0x29, 0xd, 0x21, 0x1f, 0xb, 0xd], 0x0, 0x5, 0xffff}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) [ 260.074806][ T9683] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 260.104596][ T9691] IPVS: ftp: loaded support on port[0] = 21 [ 260.117799][ T9687] chnl_net:caif_netlink_parms(): no params data found [ 260.150385][ T9683] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 260.158184][ T9683] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 260.215484][ T9683] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 10:11:59 executing program 4: ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000040)={0xa20000, 0x100, 0x3, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x9c0001, 0x1, [], @value=0x7fff}}) mmap$usbfs(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000002, 0x4010, r0, 0xffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) recvmsg$can_j1939(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/76, 0x4c}, {&(0x7f0000000280)=""/94, 0x5e}, {&(0x7f0000000300)=""/105, 0x69}, {&(0x7f0000000380)=""/75, 0x4b}, {&(0x7f0000000400)=""/6, 0x6}, {&(0x7f0000000440)=""/72, 0x48}, {&(0x7f00000004c0)=""/238, 0xee}], 0x7, &(0x7f0000000640)}, 0x2001) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vxcan1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000980)=0xe8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000b40)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a00)={0xd8, r2, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKSTATE_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_LINKSTATE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x40000}, 0x20008850) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/hwrng\x00', 0x181080, 0x0) getsockopt$llc_int(r9, 0x10c, 0x8, &(0x7f0000000bc0), &(0x7f0000000c00)=0x4) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000c80)='nl80211\x00') sendmsg$NL80211_CMD_SET_KEY(r9, &(0x7f0000000d80)={&(0x7f0000000c40)={0x10, 0x0, 0x0, 0xe8304}, 0xc, &(0x7f0000000d40)={&(0x7f0000000cc0)={0x44, r10, 0x2, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @local}, @NL80211_ATTR_KEY={0x18, 0x50, 0x0, 0x1, [@NL80211_KEY_DATA_WEP104={0x11, 0x1, "e22a6cc0f20c85b7e11c50f63d"}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x5) r11 = add_key$keyring(&(0x7f0000000dc0)='keyring\x00', &(0x7f0000000e00)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$clear(0x7, r11) r12 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/vga_arbiter\x00', 0x343180, 0x0) setsockopt$SO_BINDTODEVICE(r12, 0x1, 0x19, &(0x7f0000000e80)='xfrm0\x00', 0x10) r13 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000f00)='nl80211\x00') sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000f40)={0x54, r13, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x69}, @NL80211_ATTR_STA_TX_POWER_SETTING={0x5}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x6}, @NL80211_ATTR_STA_FLAGS={0x20, 0x11, 0x0, 0x1, [@NL80211_STA_FLAG_SHORT_PREAMBLE={0x4}, @NL80211_STA_FLAG_AUTHENTICATED={0x4}, @NL80211_STA_FLAG_MFP={0x4}, @NL80211_STA_FLAG_TDLS_PEER={0x4}, @NL80211_STA_FLAG_AUTHENTICATED={0x4}, @NL80211_STA_FLAG_ASSOCIATED={0x4}, @NL80211_STA_FLAG_AUTHORIZED={0x4}]}, @NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x738}]}, 0x54}}, 0x40) open_tree(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x800) r14 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001140)='/dev/dlm-monitor\x00', 0x401001, 0x0) sendmsg$IPSET_CMD_SAVE(r14, &(0x7f0000001240)={&(0x7f0000001180), 0xc, &(0x7f0000001200)={&(0x7f00000011c0)={0x2c, 0x8, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc0}, 0x4000) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000001300)={0x990004, 0x81, 0x50, 0xffffffffffffffff, 0x0, &(0x7f00000012c0)={0xa30903, 0x9, [], @p_u8=&(0x7f0000001280)=0x1f}}) getsockopt$IPT_SO_GET_INFO(r15, 0x0, 0x40, &(0x7f0000001340)={'mangle\x00'}, &(0x7f00000013c0)=0x54) prctl$PR_SET_THP_DISABLE(0x29, 0x1) openat$fuse(0xffffffffffffff9c, &(0x7f0000001400)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INIT(r15, &(0x7f0000001440)={0x50, 0x0, 0x4, {0x7, 0x1f, 0xc, 0x100000, 0x6, 0xc4, 0x80000000, 0x4}}, 0x50) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000001540)={0x9f0000, 0x3b9, 0x81, 0xffffffffffffffff, 0x0, &(0x7f0000001500)={0x9a0001, 0x10000, [], @string=&(0x7f00000014c0)=0xc1}}) connect$l2tp(r16, &(0x7f0000001580)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1c}, 0x1}, 0x10) [ 260.340193][ T9683] device hsr_slave_0 entered promiscuous mode [ 260.397107][ T9683] device hsr_slave_1 entered promiscuous mode [ 260.496642][ T9693] IPVS: ftp: loaded support on port[0] = 21 [ 260.637371][ T9687] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.644464][ T9687] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.652838][ T9687] device bridge_slave_0 entered promiscuous mode [ 260.681530][ T9697] IPVS: ftp: loaded support on port[0] = 21 [ 260.710550][ T9687] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.719761][ T9687] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.728036][ T9687] device bridge_slave_1 entered promiscuous mode 10:11:59 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2, &(0x7f00000001c0)=[{&(0x7f00000000c0)="89e8c5192eab21925d35f869212ed1d2b0765620d6", 0x15, 0x1e89}, {&(0x7f0000000100)="6d7c5bcc73aa6ec27552d8adc58ef63118143e47cd0a32f8ca92c7c608bfd4ba4bacc51fe3264b58c328d5dfd154e95171ca3779fc08ea14b0117f4af1bafbe210c529a173f4cb6d4802e741381ebf8cb1af7981f1bb0c8b2ec37be1369671a00b6244efc83dc3ae43297ec6d6e9d0457cb24b7e410a121e116abc739a081e9140ae4c54ce545dc010d9728950f83024ec301acf5dfb39182a", 0x99, 0x80000001}], 0x8d04016169692905, &(0x7f00000002c0)={[{@gid={'gid', 0x3d, r1}}], [{@fsname={'fsname'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@smackfsroot={'smackfsroot', 0x3d, 'em1'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@obj_type={'obj_type', 0x3d, '/dev/dlm_plock\x00'}}]}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f0000000380)={0x8, 0x0, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000440)=0x50) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000480)=0x3) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x80800, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000500)={0x19, 0x7, 0x2, {{0xc, 'uservboxnet0'}, 0x1}}, 0x19) r3 = accept(0xffffffffffffffff, &(0x7f0000000540)=@generic, &(0x7f00000005c0)=0x80) sendto$isdn(r3, &(0x7f0000000600)={0x6, 0x5, "347619bd5ec1b788ffd311cf714700ecc98854362dfa63d86e7c03106f43bd8f486961437cd50fa96117baa7bb3008c130aae8164b7407d45c47cd73b61bf18026dd56ad900315abf075d6b09b4ad9697da59bd0df0b7d918cff0aa62fd69e7ae710fe178abfe28cd454273054523c6325b6f127f820680b76fd8d190bf6dbe542"}, 0x89, 0x0, &(0x7f00000006c0)={0x22, 0x8, 0x1, 0x0, 0x3}, 0x6) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000700)={0xf, 0x7, 0x3ff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000740)={0x0, 0x5f, 0x8b1}, &(0x7f0000000780)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000007c0)={r4, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x28}}}, 0x1f, 0x4, 0x8, 0x5, 0x9, 0x1}, &(0x7f0000000880)=0x9c) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/key-users\x00', 0x0, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x1, &(0x7f0000001200)={@loopback, 0x0}, &(0x7f0000001240)=0x14) sendmsg$inet6(r5, &(0x7f00000012c0)={&(0x7f0000000900)={0xa, 0x4e22, 0x231, @dev={0xfe, 0x80, [], 0x27}, 0x4}, 0x1c, &(0x7f0000001140)=[{&(0x7f0000000940)="e356a6009eee0e937b76f0acccd3a27690b74f6d6f194bb582f0342bdb47dc14cce8f592429d7e5497e9d2818bad399f", 0x30}, {&(0x7f0000000980)="50d4d63c68687311c915d5307218b42cf33939796e50a1677cf1a50bdc8df40202d38abd20dc7db899792c1aad141b3be5ffa0c1e2ef1f6fb211828356535a6fde75641d111e53663d505fb0a750e2ee320420da8ff1cd8993ec89e9880f9570d9887ed26216dc74b55dcfe83a8631cc238243ea5d02d37639e77c6e328c1a6aa9f7d712b2a3e04c819b", 0x8a}, {&(0x7f0000000a40)="6db2b38d6a188d11716553a783d8e153fda2150d105810ffa59000c9fe4580f7ae7e1ea50860246a7f01201084abbf9acc9d4b3130815bf8bc85c4624dbabf7beb16a4d83f27a5bcacb6a8e28fa2895bea302a7a833cd1772314f72423e590003848404e4180e9bcfd82dcfdb42f7e090f30c0640f45aeee9854781aeaecf0b6759b29ec678f7ef89971344274feeb7be61f88893a07ac308a41228d5947529ce0a29ff378aa3a586ab6e6363e14fcfab992acc8e40946f0b98e9a57c3109a0d1536e644339c9472645ab68b", 0xcc}, {&(0x7f0000000b40)="a9c8b9ed652f913ae586cdb2cc59d94ea0c86325d018e283664b6ad9ee848ba3f8634d1e0228f29801ae23a44b70e9017444aa7ff5547fa56ce8bc447b17722af181878db963f4ee42fbd0f07e81716827077ce18c03035251b93b867c2403e04fa312bef19fd516217970ab637356bb542ef908cc33e54f05191a4d1ee5840ed7ee34067e51", 0x86}, {&(0x7f0000000c00)="c3824d0a42879a0f0d651f42ba6305b455f7c102425e197c0a1a9126830dfbda5c1655783d93a48b666ae9a96668e3d14c81ab75deb01aa7ddba6d48a058f7eb42c0ac0e875d2eced18d1f2777499b28a67aedee60fcbee3542f100e0cc360bd499ee2c17d1b29c9e2ae24ee65625ddeda8b0f2504fdaf268da086bb1b6f05fde57524cb6124b49e5df5ad279ea9008a87ed49a37165b5db94cb66f95bd50360e30403521a9e39b7139f321da3e9d588201ed6b6cef33f55cfb489f55a7291c3bf4ef995dbc8", 0xc6}, {&(0x7f0000000d00)="70b991da3d84e0108563dc076afa78bd78566a0ad666682d2df0e34c0d3d6780703641348a3218f4f0a993dfe188476f99a3ffa44597f2e6659ce854f0507c89a1c27097dfd8c82c162ad1e324da98b123732f9acb62ab4456c0c048c356c7fa29c09a87a7777adb7d27d924fd2d7028b29b1a2bc2609f5610e3f9309e2b06be8293ad704514a3a1eaa23bb110b818fefc07a36349c0be3c9e9f10d4f1fdf62c947e528ff57f5d3f259c96f1fb2538f9a31333341450f53252a5fa12f5b325c1b68cee4a99689f6f1ab898c94c9f9bbee67ee82e", 0xd4}, {&(0x7f0000000e00)="cca97ba3ebc401957e34bedea3952e6d17ca3a42671798f24ac0671726eada8f16ba759ac66901558bb6f8bc91efe4f51e76daedd76172e235c2d5e92314220aadc252bdb5560bc2dbe3496e4d8e3cb2d3071b756fef05a0b59f725e33cc8be13c993c197ce056cdf2ef8ef87f49b27faf2be0b35b7ee2d204175b25648522d4981c94ab424c4ce21493af", 0x8b}, {&(0x7f0000000ec0)="1d1ce6cbd3e5c32812f9d9b91a5f6f9dc9f1eb86e09a30df515c6a307eceff7bc779baa42ec87d3e751a3bc401e473c60cd726eef5e5c34b20c67e1e3ec20768fd16b6fea1e26fed6d0811bdba015f8acfdc74949eda2995868ba2e34d799b18e59d77dec884aa2d9d91e02fff2d464284aa5f1c283ff5f81b7128dd0df632ca747f06b997db9fa9a856c48f43caa10452770cf98cb75d90e17ba16eafcd7984c8b41a26e07a97768f8ef51171132c97edc96b42423b118c00cfd7e2e97492239fa9f8f766c3226b31a08d41dca44450ee20b6d7593613a9a7193fe8bc16480954acff134f0a0dbc3525827b", 0xec}, {&(0x7f0000000fc0)="100d72cea8c1bb7c75fab643bea83562e8653259fcf99c163cc4095a6afdb94d99554b49d7af20f2018f926910fa4feaa2b6bde1951abf7cb827c1f60d302214976eaedf568c83b9cdbbffbcfd3498c44c8f38ee50bfd8099ee4d1e9f24dd88e6914426c76bfe9a5c5b4", 0x6a}, {&(0x7f0000001040)="5841a9d705ab599c6ec2d75705ae3d3efd783bfcb83cad5ad7f823d6335b1373dc6f735ae525950258d94fae101a6d3081703ff388b11da5ca6bcd9c9fd4ea43e1d2c02161929da88f7db382c9db1eb4a1e3e1ca7afb07c020f2704b9b514482ffbcad94365ce423da0c88b127beb555cb18bf6caf6b53739b52882400b0d44b20803973be06eaf019c04eac9bf2daa7ffe30022986a6775ad15730e12c0dc7b3876d84e052be8a895991dee582f7918a7cb4a85f313f5abb9aff221fe9feca4d94b478a4b2852654c1f0ff8a24532dc6e", 0xd1}], 0xa, &(0x7f0000001280)=[@hopopts={{0x18, 0x29, 0x36, {0x2c}}}, @pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, [], 0x2d}, r6}}}], 0x40}, 0x20000010) prctl$PR_GET_NO_NEW_PRIVS(0x27) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001300)={r4, 0xfffffff8}, 0x8) r7 = syz_open_dev$audion(&(0x7f0000001340)='/dev/audio#\x00', 0x3, 0x12200) sendmsg$TIPC_CMD_GET_MAX_PORTS(r7, &(0x7f0000001440)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)={0x1c, 0x0, 0x200, 0x70bd25, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x4) r8 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001480)='/proc/capi/capi20ncci\x00', 0x240000, 0x0) setsockopt$inet6_IPV6_PKTINFO(r8, 0x29, 0x32, &(0x7f00000014c0)={@dev={0xfe, 0x80, [], 0xd}}, 0x14) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, r5) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r9, 0x84, 0xf, &(0x7f0000001500)={r4, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}}, 0x5, 0x7, 0x6, 0x292d32fb, 0xe8}, &(0x7f00000015c0)=0x98) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000001600)=0xffff8d36) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x400) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000001640), &(0x7f0000001680)=0x4) r10 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$TIOCGPKT(r10, 0x80045438, &(0x7f00000016c0)) [ 260.798890][ T9691] chnl_net:caif_netlink_parms(): no params data found [ 260.825569][ T9687] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 260.871198][ T9687] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 260.983205][ T9687] team0: Port device team_slave_0 added [ 261.021995][ T9683] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 261.070954][ T9687] team0: Port device team_slave_1 added [ 261.112772][ T9683] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 261.167244][ T9691] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.174332][ T9691] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.182362][ T9691] device bridge_slave_0 entered promiscuous mode [ 261.190145][ T9687] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 261.197373][ T9687] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 261.223656][ T9687] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 261.237587][ T9687] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 261.244556][ T9687] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 261.270779][ T9687] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 261.289987][ T9693] chnl_net:caif_netlink_parms(): no params data found [ 261.292368][ T9702] IPVS: ftp: loaded support on port[0] = 21 [ 261.307609][ T9683] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 261.347069][ T9691] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.354174][ T9691] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.364457][ T9691] device bridge_slave_1 entered promiscuous mode [ 261.399205][ T9683] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 261.538715][ T9687] device hsr_slave_0 entered promiscuous mode [ 261.575909][ T9687] device hsr_slave_1 entered promiscuous mode [ 261.645610][ T9687] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 261.653479][ T9687] Cannot create hsr debugfs directory [ 261.669794][ T9691] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 261.737383][ T9691] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 261.813749][ T9691] team0: Port device team_slave_0 added [ 261.829838][ T9693] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.837115][ T9693] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.845031][ T9693] device bridge_slave_0 entered promiscuous mode [ 261.855771][ T9697] chnl_net:caif_netlink_parms(): no params data found [ 261.878800][ T9691] team0: Port device team_slave_1 added [ 261.892302][ T9693] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.899829][ T9693] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.908081][ T9693] device bridge_slave_1 entered promiscuous mode [ 261.946894][ T9691] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 261.953874][ T9691] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 261.980257][ T9691] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 262.004506][ T9693] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 262.029214][ T9691] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 262.036721][ T9691] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 262.063258][ T9691] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 262.075955][ T9693] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 262.125233][ T9697] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.132586][ T9697] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.140878][ T9697] device bridge_slave_0 entered promiscuous mode [ 262.228790][ T9691] device hsr_slave_0 entered promiscuous mode [ 262.279008][ T9691] device hsr_slave_1 entered promiscuous mode [ 262.335609][ T9691] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 262.343215][ T9691] Cannot create hsr debugfs directory [ 262.349433][ T9697] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.357631][ T9697] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.366041][ T9697] device bridge_slave_1 entered promiscuous mode [ 262.409179][ T9693] team0: Port device team_slave_0 added [ 262.431343][ T9697] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 262.443331][ T9697] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 262.467581][ T9693] team0: Port device team_slave_1 added [ 262.516941][ T9702] chnl_net:caif_netlink_parms(): no params data found [ 262.532567][ T9683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.579092][ T9697] team0: Port device team_slave_0 added [ 262.596093][ T9693] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 262.604412][ T9693] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 262.632053][ T9693] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 262.648293][ T9693] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 262.655271][ T9693] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 262.681494][ T9693] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 262.699932][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.708903][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.722059][ T9697] team0: Port device team_slave_1 added [ 262.738767][ T9683] 8021q: adding VLAN 0 to HW filter on device team0 [ 262.752698][ T9687] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 262.827963][ T9687] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 262.868552][ T9687] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 262.942342][ T9697] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 262.949886][ T9697] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 262.976659][ T9697] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 262.999939][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 263.009479][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.019279][ T3104] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.026627][ T3104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.035097][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.044102][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.053007][ T3104] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.060101][ T3104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.075588][ T9687] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 263.130974][ T9697] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 263.138830][ T9697] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 263.166241][ T9697] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 263.196118][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 263.204114][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 263.236699][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 263.297572][ T9693] device hsr_slave_0 entered promiscuous mode [ 263.346018][ T9693] device hsr_slave_1 entered promiscuous mode [ 263.385640][ T9693] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 263.395060][ T9693] Cannot create hsr debugfs directory [ 263.448801][ T9697] device hsr_slave_0 entered promiscuous mode [ 263.485906][ T9697] device hsr_slave_1 entered promiscuous mode [ 263.526011][ T9697] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 263.533941][ T9697] Cannot create hsr debugfs directory [ 263.570095][ T9702] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.578285][ T9702] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.586323][ T9702] device bridge_slave_0 entered promiscuous mode [ 263.601219][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 263.610742][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 263.651119][ T9702] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.659088][ T9702] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.669099][ T9702] device bridge_slave_1 entered promiscuous mode [ 263.697821][ T9702] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 263.715691][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 263.724456][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 263.734179][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 263.743264][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 263.753929][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 263.762852][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 263.771904][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 263.809975][ T9702] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 263.821550][ T9683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 263.876427][ T9691] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 263.930177][ T9691] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 264.027593][ T9702] team0: Port device team_slave_0 added [ 264.040626][ T9691] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 264.102490][ T9691] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 264.168103][ T9702] team0: Port device team_slave_1 added [ 264.245361][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 264.252975][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 264.277594][ T9702] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 264.284573][ T9702] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 264.312061][ T9702] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 264.341273][ T9693] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 264.400996][ T9693] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 264.469927][ T9683] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 264.486601][ T9702] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 264.493587][ T9702] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 264.520343][ T9702] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 264.547600][ T9693] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 264.589423][ T9693] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 264.748636][ T9702] device hsr_slave_0 entered promiscuous mode [ 264.806077][ T9702] device hsr_slave_1 entered promiscuous mode [ 264.865599][ T9702] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 264.873201][ T9702] Cannot create hsr debugfs directory [ 264.908745][ T9683] device veth0_vlan entered promiscuous mode [ 264.916082][ T9697] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 264.980626][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 264.989921][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 264.999298][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 265.007946][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 265.017918][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 265.026424][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 265.053867][ T9687] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.074911][ T9683] device veth1_vlan entered promiscuous mode [ 265.083247][ T9697] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 265.181249][ T9687] 8021q: adding VLAN 0 to HW filter on device team0 [ 265.193404][ T9697] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 265.232041][ T9697] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 265.298112][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.310085][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.322683][ T9691] 8021q: adding VLAN 0 to HW filter on device bond0 [ 265.368127][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.377242][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.386222][ T2845] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.393287][ T2845] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.445213][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 265.453894][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 265.463200][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 265.471794][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.481578][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.490228][ T3087] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.497652][ T3087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.520329][ T9691] 8021q: adding VLAN 0 to HW filter on device team0 [ 265.531891][ T9683] device veth0_macvtap entered promiscuous mode [ 265.558678][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 265.567153][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 265.575523][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 265.583515][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 265.607337][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.616684][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.629830][ T2888] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.637046][ T2888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.674982][ T9702] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 265.717191][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 265.725133][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 265.735384][ T9683] device veth1_macvtap entered promiscuous mode [ 265.755557][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 265.763865][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 265.772745][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.781577][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 265.790829][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 265.820739][ T9702] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 265.887690][ T9702] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 265.939836][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 265.948621][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.957348][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.965925][ T3104] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.972972][ T3104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.981117][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 265.990232][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 265.998988][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 266.033603][ T9683] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 266.046233][ T9702] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 266.098728][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.108121][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.117067][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 266.126888][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 266.135372][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 266.144396][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 266.153139][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 266.162542][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 266.186330][ T9683] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 266.196825][ T9687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 266.221420][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 266.230136][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 266.238924][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 266.247349][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 266.255708][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 266.264235][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 266.282177][ T9691] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 266.294346][ T9691] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 266.307285][ T9693] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.329869][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 266.340303][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 266.375578][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 266.383079][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.411832][ T9687] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 266.422755][ T9697] 8021q: adding VLAN 0 to HW filter on device bond0 [ 266.514569][ T9691] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 266.526610][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 266.534284][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 266.542912][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 266.551134][ T2888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.569112][ T9693] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.673259][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 266.683957][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 266.695372][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.704177][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 266.713096][ T2836] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.720198][ T2836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.730249][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.739444][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.749241][ T2836] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.756370][ T2836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.763946][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 266.773325][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 266.782508][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 266.791905][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 266.804307][ T9697] 8021q: adding VLAN 0 to HW filter on device team0 [ 266.853628][ T9687] device veth0_vlan entered promiscuous mode [ 266.862122][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 266.884992][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.909953][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 266.922322][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 266.931830][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 266.941736][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 266.951727][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 266.969055][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 266.977838][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.987301][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 267.003336][ T9714] ntfs: (device loop0): parse_options(): Unrecognized mount option . [ 267.051735][ T9687] device veth1_vlan entered promiscuous mode [ 267.061201][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 267.070867][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 267.080141][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.090174][ T9720] ntfs: (device loop0): parse_options(): Unrecognized mount option . [ 267.097464][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.123534][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.133453][ T3087] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.141823][ T3087] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.150304][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.159925][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 10:12:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) getsockname$packet(r3, 0x0, 0x0) [ 267.169041][ T3087] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.176269][ T3087] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.203646][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 267.216174][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.224636][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 267.244522][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.263107][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.282946][ T9702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.299116][ T9693] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 267.323263][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 267.333264][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 267.342922][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 267.352600][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.360952][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 267.394488][ T9691] device veth0_vlan entered promiscuous mode [ 267.404900][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 267.414297][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 10:12:06 executing program 0: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0x400000000000010, 0x0, 0x0) write(r0, &(0x7f00000000c0), 0x0) sendmmsg$alg(r0, &(0x7f0000001100)=[{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000800)}, {0x0}, {0x0}], 0x3, &(0x7f0000000b40)=[@assoc={0x18, 0x117, 0x4, 0x1ff}, @assoc={0x18}], 0x30}, {0x0, 0x0, 0x0}], 0x2, 0x30042801) perf_event_open(&(0x7f000001d000)={0x1, 0x1f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) fstat(r1, &(0x7f0000000280)) syz_open_dev$media(0x0, 0x0, 0x0) socket(0x400000000000010, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x5, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = syz_open_procfs(0x0, &(0x7f0000000740)='net/icmp\x00') r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) r5 = syz_open_pts(r4, 0x4000000000000002) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0x0, 0x3}) sendfile(r5, r3, 0x0, 0x0) [ 267.453725][ T9702] 8021q: adding VLAN 0 to HW filter on device team0 [ 267.498937][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 267.512765][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 267.524436][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 267.534241][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 267.543125][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 267.554778][ T9687] device veth0_macvtap entered promiscuous mode [ 267.577201][ T9691] device veth1_vlan entered promiscuous mode [ 267.601504][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 267.614464][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 267.623450][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 267.633558][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 267.644593][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 267.654599][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 267.667548][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 267.676469][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 267.686865][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 267.688311][ C0] hrtimer: interrupt took 42372 ns [ 267.696468][ T3104] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.707608][ T3104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.727803][ T9693] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 267.756597][ T9687] device veth1_macvtap entered promiscuous mode [ 267.778886][ T9697] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 267.789571][ T9697] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 10:12:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x28, 0x0) [ 267.817106][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 267.825320][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 267.834940][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.847475][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 267.867299][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 267.889888][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 267.911861][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 267.921438][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 267.931431][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 267.946365][ T9737] EXT4-fs (sda1): re-mounted. Opts: [ 267.953407][ T2845] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.961089][ T2845] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.013542][ T9691] device veth0_macvtap entered promiscuous mode [ 268.022216][ T9740] EXT4-fs (sda1): re-mounted. Opts: [ 268.051118][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 268.060033][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 268.070390][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 268.097688][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 10:12:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x28, 0x0) [ 268.110599][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 268.128134][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 268.159397][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 268.184021][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 268.204350][ T9691] device veth1_macvtap entered promiscuous mode [ 268.244470][ T9746] EXT4-fs (sda1): re-mounted. Opts: [ 268.250910][ T9687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 268.275937][ T9687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.297534][ T9687] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 268.324369][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 10:12:07 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000080), 0x8) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000080), 0x8) [ 268.366582][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 268.387088][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 268.394629][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 268.411209][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 268.421468][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 268.431258][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 268.441815][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 268.451018][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 268.462340][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.471350][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 268.481459][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.498408][ T9697] 8021q: adding VLAN 0 to HW filter on device batadv0 10:12:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 268.522286][ T9687] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 268.559351][ T9687] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.573808][ T9687] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 268.610058][ T9702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 268.644593][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 268.654113][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 268.673037][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 268.734415][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 268.753480][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.774500][ T9691] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 268.803123][ T9691] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.823182][ T9691] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 268.834310][ T9691] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.846719][ T9691] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 268.864057][ T9691] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 268.874981][ T9691] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.884956][ T9691] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 268.896498][ T9691] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 268.909431][ T9691] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 268.920438][ T9693] device veth0_vlan entered promiscuous mode [ 268.931072][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 268.939378][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 268.948859][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 268.957861][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 268.967668][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 268.977445][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:12:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) [ 269.033699][ T9693] device veth1_vlan entered promiscuous mode [ 269.061410][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 269.080094][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 269.106716][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 269.134081][ T9702] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 269.208319][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 269.372980][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 269.384504][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 269.496531][ T9697] device veth0_vlan entered promiscuous mode [ 269.543236][ T9693] device veth0_macvtap entered promiscuous mode [ 269.577531][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 269.595191][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 269.616565][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 269.624987][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 10:12:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x1c74}, 0x1c) getsockname$packet(r3, 0x0, 0x0) [ 269.665135][ T9782] IPVS: set_ctl: invalid protocol: 1 0.0.0.8:20003 [ 269.692709][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 269.709191][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 269.726464][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 269.730153][ T9787] IPVS: set_ctl: invalid protocol: 1 0.0.0.8:20003 10:12:08 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x110, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x6c000000) [ 269.770414][ T9693] device veth1_macvtap entered promiscuous mode [ 269.782297][ T9697] device veth1_vlan entered promiscuous mode [ 269.795266][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 269.806779][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 269.815793][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 269.826034][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 269.835345][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 269.890301][ T9702] device veth0_vlan entered promiscuous mode [ 269.919479][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 269.929048][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 269.940142][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 269.952323][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 269.963219][ T9693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 269.976495][ T9693] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 269.986652][ T9693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.012512][ T9693] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.042272][ T9693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.052946][ T9693] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.065143][ T9693] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 270.079672][ T9702] device veth1_vlan entered promiscuous mode [ 270.093961][ T9697] device veth0_macvtap entered promiscuous mode [ 270.102459][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 270.111003][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 270.119428][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 270.127911][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 270.136393][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.145327][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.157510][ T9693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 270.173274][ T9693] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.183819][ T9693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 270.197046][ T9693] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.207962][ T9693] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 270.218502][ T9693] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.230503][ T9693] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 270.251289][ T9697] device veth1_macvtap entered promiscuous mode [ 270.259192][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 270.267506][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 270.278199][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.286998][ T2845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 270.317760][ T9702] device veth0_macvtap entered promiscuous mode [ 270.333481][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 270.342213][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 270.351877][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 270.378462][ T9702] device veth1_macvtap entered promiscuous mode [ 270.440918][ T9697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.452525][ T9697] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.462578][ T9697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.473108][ T9697] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.483006][ T9697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.494118][ T9697] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.504323][ T9697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.515797][ T9697] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.528347][ T9697] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 270.601454][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 270.609909][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.619141][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.630838][ T9697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 270.641756][ T9697] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.652573][ T9697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 270.663285][ T9697] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.673892][ T9697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 270.684489][ T9697] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.694356][ T9697] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 270.705829][ T9697] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.717521][ T9697] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 270.748633][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 270.773922][ T2645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 270.803526][ T9702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.823857][ T9702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 10:12:09 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000080), 0x8) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000080), 0x8) [ 270.843722][ T9702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.864040][ T9702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.887577][ T9702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.901921][ T9702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.914970][ T9702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.926665][ T9702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.937901][ T9702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 270.949243][ T9702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 270.961029][ T9702] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 270.976055][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 270.984582][ T3087] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 271.008766][ T9702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.021365][ T9702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.044798][ T9702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.055841][ T9702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.066220][ T9702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.077102][ T9702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.087092][ T9702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.097878][ T9702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.107784][ T9702] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 271.118291][ T9702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 271.129797][ T9702] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 271.247234][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 271.261279][ T2836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:12:10 executing program 4: syz_open_procfs(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) socket(0x400000000000010, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x45) socket$kcm(0x10, 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) syz_open_dev$media(0x0, 0x0, 0x0) socket(0x400000000000010, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x10000) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$packet(0x11, 0x0, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000740)='net/icmp\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x4000000000000002) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000080)={0x0, 0x3}) sendfile(r3, r1, 0x0, 0x6f0a77bd) 10:12:10 executing program 5: 10:12:10 executing program 0: getpid() sched_setscheduler(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5433, 0x0) 10:12:10 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0x13, 0x3, 'hash:net,iface\x00'}]}, 0x4c}}, 0x0) 10:12:10 executing program 2: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0xffa, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) 10:12:10 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x103040, 0x0) sendmsg$tipc(r1, 0x0, 0x851) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000280)=[{&(0x7f0000000040)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f8900000020ffffff1f01ff0000000309ff5bffff00c7e5", 0x3f}], 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)={0x14, r4, 0x301}, 0x14}}, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r5, r6, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000780)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'vcan0\x00'}) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001480)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {}, {0xe}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x20, 0x2, [@TCA_BASIC_ACT={0x1c, 0x3, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x50}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x200008c4) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000340)=""/173, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0xd}, 0x14) socket$inet(0x2, 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, 0x0, 0x0) ioctl$SIOCGETLINKNAME(0xffffffffffffffff, 0x89e0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 10:12:10 executing program 2: 10:12:10 executing program 1: 10:12:10 executing program 0: 10:12:10 executing program 5: 10:12:10 executing program 2: mknod$loop(&(0x7f00000001c0)='./file1\x00', 0x0, 0x1) 10:12:10 executing program 1: 10:12:11 executing program 5: 10:12:11 executing program 0: 10:12:11 executing program 3: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x103040, 0x0) sendmsg$tipc(r1, 0x0, 0x851) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f0000000280)=[{&(0x7f0000000040)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f8900000020ffffff1f01ff0000000309ff5bffff00c7e5", 0x3f}], 0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000440)={0x14, r4, 0x301}, 0x14}}, 0x0) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x1, 0x84) dup3(r5, r6, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000780)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'vcan0\x00'}) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000001480)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {}, {}, {0xe}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x20, 0x2, [@TCA_BASIC_ACT={0x1c, 0x3, [@m_pedit={0x18, 0x1, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x50}}, 0x0) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x200008c4) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f0000000340)=""/173, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) bind$packet(r0, &(0x7f0000000300)={0x11, 0xd}, 0x14) socket$inet(0x2, 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, 0x0, 0x0) ioctl$SIOCGETLINKNAME(0xffffffffffffffff, 0x89e0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x0) 10:12:11 executing program 2: 10:12:11 executing program 4: syz_open_procfs(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) socket(0x400000000000010, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x45) socket$kcm(0x10, 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) syz_open_dev$media(0x0, 0x0, 0x0) socket(0x400000000000010, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x10000) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$packet(0x11, 0x0, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000740)='net/icmp\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x4000000000000002) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000080)={0x0, 0x3}) sendfile(r3, r1, 0x0, 0x6f0a77bd) 10:12:11 executing program 1: 10:12:11 executing program 0: syz_open_procfs(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x200a01, 0x0) socket(0x400000000000010, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x45) socket$kcm(0x10, 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) syz_open_dev$media(0x0, 0x0, 0x0) socket(0x400000000000010, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x10000) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) socket$packet(0x11, 0x0, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000740)='net/icmp\x00') r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x4000000000000002) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000080)={0x0, 0x3}) sendfile(r3, r1, 0x0, 0x6f0a77bd) 10:12:11 executing program 2: 10:12:11 executing program 1: socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x80642, 0x0) 10:12:11 executing program 5: 10:12:11 executing program 2: 10:12:11 executing program 5: 10:12:11 executing program 2: 10:12:11 executing program 1: 10:12:11 executing program 3: 10:12:11 executing program 0: 10:12:11 executing program 4: 10:12:11 executing program 5: 10:12:11 executing program 2: 10:12:12 executing program 1: 10:12:12 executing program 0: 10:12:12 executing program 5: 10:12:12 executing program 3: 10:12:12 executing program 2: 10:12:12 executing program 4: 10:12:12 executing program 1: 10:12:12 executing program 5: prlimit64(0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 10:12:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x356343e7, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r0, &(0x7f0000000080)={0x18}, 0xfffffe3f) statfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000f00)=""/4096) 10:12:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x9c, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f00000008c0)=""/173) pipe(&(0x7f0000000000)) r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') socket$packet(0x11, 0x0, 0x300) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0xffffffffffffff20, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0xc804}, 0x4008040) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FLAGS={0x8}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="8398dac6610816b6afb7359d34c822dd22bb11514891cf095e201db8b5904dc663", @ANYBLOB="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"], 0x2}, 0x1, 0x0, 0x0, 0x40000}, 0x0) getpeername$packet(r3, &(0x7f0000000500), &(0x7f0000000540)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r2, 0x0, 0x4) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0xc000, 0x0) 10:12:12 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:12 executing program 4: 10:12:12 executing program 1: 10:12:12 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x110, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x32a) 10:12:12 executing program 4: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x3, 0x2}, 0x3c) [ 273.778352][ T9949] mmap: syz-executor.3 (9949) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 10:12:12 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x110, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x3da, 0x4c00) 10:12:12 executing program 5: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) mlockall(0x5) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) 10:12:12 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:12 executing program 4: openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) mlockall(0x1) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlockall() openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4000, 0x0) 10:12:12 executing program 1: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x3c) 10:12:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x356343e7, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r0, &(0x7f0000000080)={0x18}, 0xfffffe3f) statfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000f00)=""/4096) 10:12:13 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:13 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() write$FUSE_LSEEK(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x401004000000016) 10:12:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x100901, 0x0) writev(r3, &(0x7f0000000340)=[{&(0x7f0000001680)="cd", 0xfffffcf0}], 0x1) 10:12:13 executing program 5: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)) 10:12:13 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x356343e7, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r0, &(0x7f0000000080)={0x18}, 0xfffffe3f) statfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000f00)=""/4096) 10:12:13 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r3) shutdown(r0, 0x0) 10:12:14 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r3) shutdown(r0, 0x0) 10:12:14 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r2, r3) shutdown(r0, 0x0) 10:12:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x356343e7, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r0, &(0x7f0000000080)={0x18}, 0xfffffe3f) fdatasync(r0) setuid(0x0) socket$inet_udplite(0x2, 0x2, 0x88) 10:12:14 executing program 3: fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 10:12:14 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:14 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) [ 277.553744][T10066] FAT-fs (loop4): error, fat_free_clusters: deleting FAT entry beyond EOF [ 277.565147][T10066] FAT-fs (loop4): Filesystem has been set read-only 10:12:17 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() write$FUSE_LSEEK(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x401004000000016) 10:12:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x356343e7, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r0, &(0x7f0000000080)={0x18}, 0xfffffe3f) statfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000f00)=""/4096) 10:12:17 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:17 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:17 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) vmsplice(r1, &(0x7f00000004c0)=[{&(0x7f0000000440)='#', 0x1}, {&(0x7f0000000480)="fc", 0x1}], 0x2, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 10:12:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x356343e7, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r0, &(0x7f0000000080)={0x18}, 0xfffffe3f) fdatasync(r0) setuid(0x0) socket$inet_udplite(0x2, 0x2, 0x88) 10:12:17 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x110, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x4c00) 10:12:17 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="0000000019a100f15700", 0x0, 0x0, 0x2, 0x1}, 0x20) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 10:12:17 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:17 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:17 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 10:12:19 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() write$FUSE_LSEEK(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x401004000000016) 10:12:19 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:19 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:19 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000180)='0', 0x1}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) poll(0x0, 0x0, 0x5213) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 10:12:19 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000a00)=[{{&(0x7f00000000c0)=@ipx, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/206, 0xce}, {&(0x7f0000000600)=""/77, 0x4d}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f0000000680)=""/143, 0x8f}], 0x4, &(0x7f00000002c0)=""/19, 0x13}, 0x101}, {{&(0x7f0000000900)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000b80)=""/4096, 0x1000}, {&(0x7f0000001b80)=""/4096, 0x1000}, {&(0x7f0000000980)=""/81, 0x51}], 0x3}, 0x2}], 0x2, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x803, 0xa0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @remote}, 0x10) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) eventfd2(0x0, 0x0) stat(0x0, 0x0) setresgid(0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) r2 = socket$inet(0x2, 0x3, 0x8) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x23, &(0x7f0000000740)=0x7fffffff, 0x4) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @empty}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000003c80), 0x38e, 0x62, 0x0) fallocate(r2, 0x20, 0xfb7d, 0x1) socket$inet6(0xa, 0x2, 0x0) 10:12:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/212, 0xd4}], 0x2, 0x327) 10:12:19 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:19 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) 10:12:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/212, 0xd4}], 0x2, 0x327) 10:12:20 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:20 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) 10:12:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/212, 0xd4}], 0x2, 0x327) 10:12:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() write$FUSE_LSEEK(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x401004000000016) 10:12:22 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:22 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x3c) 10:12:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/212, 0xd4}], 0x2, 0x327) 10:12:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'\x00', 0xd102}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="030000000000000008001b000000000099d638867326"], 0x28}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x10, 0x80002, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x2000000, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="300000001000010800000000004e6f20a95d070d", @ANYRES32=0x0, @ANYBLOB="f70200000010000008000d00", @ANYRES32=r7, @ANYBLOB="08001b0000000000359bfd69fbea16969ff7de50e440e52df0b5de39307d427f859696b3f0cd22c97765b85a5e72796d022713bb1974ec0bf70e053760116694b335c093f581f03cdcb2f300172bad1d686bf370fae5729b1eace63067b9b98bcef6a2318bcac01a58cde76083aedf6b9f79330d36fd41a83ed79bc66e4253e6c1cbd619085dbb703a056a975a4b2739f33b59718fa9286c9d32a56ced57de417566830e93dd9b62049844"], 0x30}}, 0x0) 10:12:22 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@loopback, 0x134}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x238}, {&(0x7f0000000000)=""/62, 0xfffffffffffffcc3}], 0x2, 0x0, 0xfffffffffffffcd5, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0}}], 0x1, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 10:12:22 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(0xffffffffffffffff, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:22 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r1, 0x0, 0x2}, 0x3c) [ 283.459753][T10179] ptrace attach of "/root/syz-executor.0"[10178] was attempted by "/root/syz-executor.0"[10179] 10:12:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x2c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r1}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 10:12:22 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/212, 0xd4}], 0x2, 0x327) [ 283.589148][T10184] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:12:22 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:22 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r1, 0x0, 0x2}, 0x3c) [ 283.693809][T10184] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 283.816338][T10184] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 283.943467][T10191] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 283.991149][T10191] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 284.021936][T10191] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 284.148885][T10207] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 284.163036][T10207] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 284.182181][T10207] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 284.282425][T10203] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 284.298058][T10203] A link change request failed with some changes committed already. Interface bond0 may have been left with an inconsistent configuration, please check. [ 284.498555][T10184] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 284.565619][T10184] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 284.600585][T10219] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 284.622456][T10219] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 284.635969][T10219] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 10:12:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) gettid() write$FUSE_LSEEK(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) 10:12:24 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/212, 0xd4}], 0x2, 0x327) 10:12:24 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r1, 0x0, 0x2}, 0x3c) 10:12:24 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:24 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000280)='./file0\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) 10:12:24 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x110, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/nf_conntrack\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) 10:12:24 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x2}, 0x3c) 10:12:24 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:24 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/212, 0xd4}], 0x2, 0x327) 10:12:24 executing program 0: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x5452, &(0x7f00000006c0)={'ip6gretap0\x00'}) 10:12:24 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:24 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x2}, 0x3c) 10:12:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) gettid() write$FUSE_LSEEK(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) 10:12:27 executing program 4: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/212, 0xd4}], 0x2, 0x327) 10:12:27 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:27 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x1) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x7fffdffff000, 0x0, 0x4002011, r0, 0x0) 10:12:27 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r0, 0x0, 0x2}, 0x3c) 10:12:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x110, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/nf_conntrack\x00') preadv(r0, &(0x7f00000017c0), 0x3da, 0x32a) 10:12:27 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r1, 0x0, 0x2}, 0x3c) 10:12:27 executing program 4: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/212, 0xd4}], 0x2, 0x327) 10:12:27 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000002d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pause() 10:12:27 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:27 executing program 3: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0xb00000000000000) 10:12:27 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r1, 0x0, 0x2}, 0x3c) 10:12:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) gettid() write$FUSE_LSEEK(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) 10:12:29 executing program 4: r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/212, 0xd4}], 0x2, 0x327) 10:12:29 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r1, 0x0, 0x2}, 0x3c) 10:12:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000a00)=[{{&(0x7f00000000c0)=@ipx, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/206, 0xce}, {0x0}, {&(0x7f0000000140)=""/42, 0x2a}, {&(0x7f0000000680)=""/143, 0x8f}], 0x4, &(0x7f00000002c0)=""/19, 0x13}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x803, 0xa0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) eventfd2(0x0, 0x0) stat(0x0, 0x0) stat(0x0, 0x0) stat(0x0, &(0x7f0000000580)) creat(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r4 = socket$inet(0x2, 0x3, 0x8) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x23, &(0x7f0000000740)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x0, @empty}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) fallocate(r4, 0x0, 0xfb7d, 0x0) creat(&(0x7f0000000240)='./bus\x00', 0x0) socket$inet6(0xa, 0x2, 0x0) 10:12:29 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:29 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000002d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pause() 10:12:29 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(0xffffffffffffffff, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/212, 0xd4}], 0x2, 0x327) 10:12:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:30 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3c4, 0x0, 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000000)) 10:12:30 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(0xffffffffffffffff, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/212, 0xd4}], 0x2, 0x327) 10:12:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) [ 291.473366][T10348] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 292.668213][ T0] NOHZ: local_softirq_pending 08 10:12:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() write$FUSE_LSEEK(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) tkill(r1, 0x401004000000016) 10:12:32 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:32 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(0xffffffffffffffff, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f00000002c0)=""/212, 0xd4}], 0x2, 0x327) 10:12:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3c4, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f00000000c0)="f20f38f0aa710066b9800000c00f326635000400000f300fc79d02860f79aaf02f0fc72f36f30fc7b66675f00fab3266b9800000c00f326635004000000f30660fdcc96766c7442400000000006766c7442402000000006766c744240600000000670f011c24", 0x66}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:12:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='cdg\x00', 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 10:12:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, 0x0, 0x0, 0x327) 10:12:32 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:32 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:32 executing program 0: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x2, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x3c) 10:12:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, 0x0, 0x0, 0x327) 10:12:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x1f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000009c0)={0x14, r1, 0x701, 0x0, 0x0, {0xd, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) 10:12:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, 0x0, 0x0, 0x327) 10:12:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() write$FUSE_LSEEK(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) tkill(r1, 0x401004000000016) 10:12:35 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3c4, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x40, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4980, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:12:35 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:35 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="580000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffffffff0000000008000100736662002c00020028000100000000000000000000000000000000000000000000000000000800"/64], 0x58}}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x69036, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 10:12:35 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}], 0x1, 0x327) 10:12:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f00000000c0)) ptrace(0x10, r2) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000000)) ptrace$setregs(0xf, r2, 0x0, &(0x7f00000002c0)="6fd30f39ce") ptrace$getregset(0x4204, r2, 0x2, &(0x7f0000000280)={0x0}) 10:12:35 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:35 executing program 2: r0 = socket(0x2, 0x80802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:35 executing program 2: r0 = socket(0x2, 0x80802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f0000001580), 0x0, 0x327) 10:12:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() write$FUSE_LSEEK(r0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x8000000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) tkill(r1, 0x401004000000016) 10:12:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 10:12:38 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f0000001580), 0x0, 0x327) 10:12:38 executing program 2: r0 = socket(0x2, 0x80802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:38 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1f3, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_getscheduler(0x0) sched_setscheduler(r0, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYPTR64], 0x8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000009c0)={0x14, r2, 0x701, 0x0, 0x0, {0xd, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_BEARER={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{}], 0x20000000000000c3, 0x0, 0x0, 0xffffffffffffff34) 10:12:38 executing program 2: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shutdown(0xffffffffffffffff, 0x0) 10:12:38 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f0000001580), 0x0, 0x327) 10:12:38 executing program 2: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shutdown(0xffffffffffffffff, 0x0) 10:12:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f0000001580)=[{0x0}], 0x1, 0x327) 10:12:38 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1f3, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_getscheduler(0x0) sched_setscheduler(r0, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYPTR64], 0x8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000009c0)={0x14, r2, 0x701, 0x0, 0x0, {0xd, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_BEARER={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{}], 0x20000000000000c3, 0x0, 0x0, 0xffffffffffffff34) 10:12:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() write$FUSE_LSEEK(r0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x401004000000016) 10:12:41 executing program 0: sched_setscheduler(0x0, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mice(0x0, 0x0, 0x111e00) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000240)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, 0x0) ioctl$VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, 0x0) 10:12:41 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:41 executing program 2: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shutdown(0xffffffffffffffff, 0x0) 10:12:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f0000001580)=[{0x0}], 0x1, 0x327) 10:12:41 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x1f3, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_getscheduler(0x0) sched_setscheduler(r0, 0x5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYPTR64], 0x8) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000009c0)={0x14, r2, 0x701, 0x0, 0x0, {0xd, 0x0, 0x1a0ffffffff}}, 0x14}}, 0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x1c, 0x0, 0x20, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_BEARER={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ppoll(&(0x7f00000000c0)=[{}], 0x20000000000000c3, 0x0, 0x0, 0xffffffffffffff34) 10:12:41 executing program 2: r0 = socket(0x0, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:41 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f0000001580)=[{0x0}], 0x1, 0x327) 10:12:42 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:42 executing program 2: r0 = socket(0x0, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, 0x0) 10:12:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() write$FUSE_LSEEK(r0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x401004000000016) 10:12:44 executing program 0: add_key$user(&(0x7f00000003c0)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x0, 0x0) fsopen(&(0x7f0000000100)='ecryptfs\x00', 0x1) ioctl$EVIOCGBITSW(r0, 0x80404525, 0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000000)={0x4, 0x8}, 0x10) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x280001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000080)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r4, 0x810c5701, &(0x7f0000000400)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r6, 0x8004510a, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, @val, {@ipv6}}, 0x0) 10:12:44 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}], 0x1, 0x0) 10:12:44 executing program 3: socket$alg(0x26, 0x5, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) r0 = syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0x6, 0x4001) fsetxattr$system_posix_acl(r0, 0x0, 0x0, 0x0, 0x0) fsopen(&(0x7f0000000040)='gfs2\x00', 0x0) syz_genetlink_get_family_id$tipc2(0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1081082) r2 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x1081806) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0xff0e) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) sendfile(r1, r1, 0x0, 0x2000005) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, "3431b6d4ebd9bc5b066a598cde04f8b1e907978bca1791ce5968d3b808ca5a9155449afffc970f33225eab59e77a9704a28df3f9350010700fbe1ed4da7db4b6", "2cfc9bb499003bd59175414ae825b9c1fca58f25b9ee26ca667d352769e74a162aec16fd5de2d46bc628d7ffce790d8fd9f58c1d91ade68f9c819fdaf77e2e9b", "5000a9e3224f461bb4d8d8c5844bf6983eaea59f03be2402a206c2b95e5b3bc7"}) 10:12:44 executing program 2: r0 = socket(0x0, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:45 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r1, 0x0, 0x2}, 0x3c) 10:12:45 executing program 2: r0 = socket(0x2, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}], 0x1, 0x0) 10:12:45 executing program 3: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) connect(r0, &(0x7f0000000180)=@in={0x2, 0x0, @remote}, 0x80) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 10:12:45 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r1, 0x0, 0x2}, 0x3c) 10:12:45 executing program 2: r0 = socket(0x2, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) [ 307.155928][T10594] [ 307.158300][T10594] ================================================ [ 307.164795][T10594] WARNING: lock held when returning to user space! [ 307.171285][T10594] 5.5.0-rc6-next-20200116-syzkaller #0 Not tainted [ 307.177775][T10594] ------------------------------------------------ [ 307.184271][T10594] syz-executor.0/10594 is leaving the kernel with locks still held! [ 307.192241][T10594] 1 lock held by syz-executor.0/10594: [ 307.197690][T10594] #0: ffff888098c1e748 (&tfile->napi_mutex){+.+.}, at: tun_get_user+0x1604/0x3fc0 [ 307.207870][T10594] syz-executor.0 (10594) used greatest stack depth: 22392 bytes left 10:12:48 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() write$FUSE_LSEEK(r0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x401004000000016) 10:12:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r0, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/249, 0xf9}], 0x1, 0x0) 10:12:48 executing program 2: r0 = socket(0x2, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x0, 0x0) r2 = socket(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x4, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0xffffffffffffff68, 0x0) 10:12:48 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r1, 0x0, 0x2}, 0x3c) 10:12:48 executing program 0: add_key$user(&(0x7f00000003c0)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x0, 0x0) fsopen(&(0x7f0000000100)='ecryptfs\x00', 0x1) ioctl$EVIOCGBITSW(r0, 0x80404525, 0xffffffffffffffff) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000000)={0x4, 0x8}, 0x10) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x280001, 0x0) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000080)) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r4, 0x810c5701, &(0x7f0000000400)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r6, 0x8004510a, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, @val, {@ipv6}}, 0x0) 10:12:48 executing program 2: r0 = socket(0x2, 0x80802, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000001c0)) clone(0x20000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x80000000, 0x0, 0x0) shutdown(r0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) shutdown(r0, 0x0) 10:12:48 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) 10:12:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000001540)=ANY=[@ANYBLOB="4800000010000507000000000000c40000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b200000000007ad3e781c80d7da71d730ca6a79c0221e95e39fb5ffec584194ef8b28973544d14143324ec992c7c613ec7976e48f65e5eceaf7427134e95f29461840202232cd210c5a7"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@newtfilter={0x50, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x4}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x20, 0x2, [@TCA_CGROUP_ACT={0x1c, 0x1, [@m_pedit={0x3, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}}}]}]}}]}, 0x50}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@newtfilter={0x44, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x4}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x14, 0x2, [@TCA_CGROUP_POLICE={0x10, 0x2, [@TCA_POLICE_RATE64={0xc}]}]}}]}, 0x44}}, 0x0) 10:12:48 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = dup(r0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="0f0004f26ba1df1eb15667d21db20edbe3253d"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 10:12:48 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e007b80e663ac24f6e8d1bab77b9c5791513a49a976883313c786e60364c3a831df11acf18f6ddfc3c32729c6c1f824e1a4470b12985e7a5ca37d233899adf14747070b3d644ee92c0c95656bd0abeb76c8f02fdeb45dc6fff2e73326c3a729c2bbe004338cde5b21d2a63eb61512ccf29999f934ecef2b9703ea6803df0b7704fe6e581c1bebdd0197ea4eb7e9ca118d8bfc23c1f81141722d568a6acbea0d029e8a0dba63bde9d79c0bb9636580fcb9f42da2a14cc21743b9a6b9a6de5b"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x8, 0x800000000000004, 0x4, 0x1ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, r2, 0x0, 0x2}, 0x3c) [ 309.616608][T10658] ================================================================== [ 309.624845][T10658] BUG: KASAN: use-after-free in __mutex_lock+0x1325/0x13c0 [ 309.632059][T10658] Read of size 4 at addr ffff8880523c45b8 by task syz-executor.0/10658 [ 309.640287][T10658] [ 309.642887][T10658] CPU: 1 PID: 10658 Comm: syz-executor.0 Not tainted 5.5.0-rc6-next-20200116-syzkaller #0 [ 309.652771][T10658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.662828][T10658] Call Trace: [ 309.666341][T10658] dump_stack+0x197/0x210 [ 309.670814][T10658] ? __mutex_lock+0x1325/0x13c0 [ 309.675723][T10658] print_address_description.constprop.0.cold+0xd4/0x30b [ 309.682760][T10658] ? __mutex_lock+0x1325/0x13c0 [ 309.687719][T10658] ? __mutex_lock+0x1325/0x13c0 [ 309.692581][T10658] __kasan_report.cold+0x1b/0x32 [ 309.697521][T10658] ? __mutex_lock+0x1325/0x13c0 [ 309.702377][T10658] kasan_report+0x12/0x20 [ 309.706777][T10658] __asan_report_load4_noabort+0x14/0x20 [ 309.712512][T10658] __mutex_lock+0x1325/0x13c0 [ 309.717263][T10658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.723630][T10658] ? __perf_event_task_sched_in+0x1cb/0x810 [ 309.729552][T10658] ? tun_get_user+0x1604/0x3fc0 [ 309.734419][T10658] ? mutex_trylock+0x2d0/0x2d0 [ 309.739230][T10658] ? lock_acquire+0x190/0x410 [ 309.744050][T10658] ? trace_hardirqs_on+0x67/0x240 [ 309.749184][T10658] ? aa_file_perm+0x601/0x1600 [ 309.753973][T10658] ? __kasan_check_read+0x11/0x20 [ 309.759003][T10658] ? _raw_spin_unlock_irq+0x59/0x80 [ 309.764210][T10658] ? lock_downgrade+0x920/0x920 [ 309.769189][T10658] mutex_lock_nested+0x16/0x20 [ 309.773963][T10658] ? mutex_lock_nested+0x16/0x20 [ 309.778923][T10658] tun_get_user+0x1604/0x3fc0 [ 309.783619][T10658] ? aa_file_perm+0x62b/0x1600 [ 309.788400][T10658] ? tun_build_skb.isra.0+0x1480/0x1480 [ 309.794044][T10658] ? __this_cpu_preempt_check+0x35/0x190 [ 309.799698][T10658] ? lock_downgrade+0x920/0x920 [ 309.804555][T10658] ? tun_chr_close+0x180/0x180 [ 309.809681][T10658] tun_chr_write_iter+0xbd/0x156 10:12:48 executing program 4: [ 309.814718][T10658] do_iter_readv_writev+0x5f8/0x8f0 [ 309.820070][T10658] ? no_seek_end_llseek_size+0x70/0x70 [ 309.825535][T10658] ? apparmor_file_permission+0x27/0x30 [ 309.831090][T10658] ? rw_verify_area+0x126/0x360 [ 309.835953][T10658] do_iter_write+0x184/0x610 [ 309.840612][T10658] ? dup_iter+0x260/0x260 [ 309.844955][T10658] ? __kasan_check_read+0x11/0x20 [ 309.849990][T10658] ? __this_cpu_preempt_check+0x35/0x190 [ 309.855631][T10658] vfs_writev+0x1b3/0x2f0 [ 309.859967][T10658] ? vfs_iter_write+0xb0/0xb0 [ 309.864680][T10658] ? __fget_files+0x216/0x520 [ 309.869416][T10658] ? do_dup2+0x4f0/0x4f0 [ 309.873725][T10658] ? __kasan_check_read+0x11/0x20 [ 309.878756][T10658] ? __fget_light+0x1ad/0x270 [ 309.883441][T10658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.889697][T10658] do_writev+0x15b/0x330 [ 309.893954][T10658] ? vfs_writev+0x2f0/0x2f0 [ 309.898468][T10658] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 309.904572][T10658] __x64_sys_writev+0x75/0xb0 [ 309.909410][T10658] do_syscall_64+0xfa/0x790 [ 309.913934][T10658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.919924][T10658] RIP: 0033:0x45b251 [ 309.923830][T10658] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 309.943440][T10658] RSP: 002b:00007f265300dba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 309.951859][T10658] RAX: ffffffffffffffda RBX: 0000000000300cce RCX: 000000000045b251 [ 309.959950][T10658] RDX: 0000000000000001 RSI: 00007f265300dc00 RDI: 00000000000000f0 [ 309.967922][T10658] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 309.975896][T10658] R10: 0000000000000000 R11: 0000000000000293 R12: 00000000ffffffff [ 309.984100][T10658] R13: 0000000000000b7a R14: 00000000004cc5a6 R15: 000000000075bfd4 [ 309.992078][T10658] [ 309.994440][T10658] Allocated by task 10572: [ 309.998865][T10658] save_stack+0x23/0x90 [ 310.003035][T10658] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 310.008684][T10658] kasan_slab_alloc+0xf/0x20 [ 310.013287][T10658] kmem_cache_alloc_node+0x138/0x740 [ 310.018637][T10658] copy_process+0x5e7/0x7290 [ 310.023244][T10658] _do_fork+0x146/0x1090 [ 310.027628][T10658] __x64_sys_clone+0x19a/0x260 [ 310.032401][T10658] do_syscall_64+0xfa/0x790 [ 310.036911][T10658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.042800][T10658] [ 310.045125][T10658] Freed by task 0: [ 310.048855][T10658] save_stack+0x23/0x90 [ 310.053018][T10658] __kasan_slab_free+0x102/0x150 [ 310.057957][T10658] kasan_slab_free+0xe/0x10 [ 310.062464][T10658] kmem_cache_free+0x86/0x320 [ 310.067147][T10658] free_task+0xdd/0x120 [ 310.071648][T10658] __put_task_struct+0x240/0x530 [ 310.076592][T10658] delayed_put_task_struct+0x253/0x3c0 [ 310.082236][T10658] rcu_core+0x5e3/0x1440 [ 310.086489][T10658] rcu_core_si+0x9/0x10 [ 310.090687][T10658] __do_softirq+0x262/0x98c [ 310.095176][T10658] [ 310.097546][T10658] The buggy address belongs to the object at ffff8880523c4580 [ 310.097546][T10658] which belongs to the cache task_struct(17:syz0) of size 6272 [ 310.112475][T10658] The buggy address is located 56 bytes inside of [ 310.112475][T10658] 6272-byte region [ffff8880523c4580, ffff8880523c5e00) [ 310.125853][T10658] The buggy address belongs to the page: [ 310.131498][T10658] page:ffffea000148f100 refcount:1 mapcount:0 mapping:ffff888097bf7000 index:0x0 compound_mapcount: 0 [ 310.142537][T10658] flags: 0xfffe0000010200(slab|head) [ 310.147836][T10658] raw: 00fffe0000010200 ffffea0002334d88 ffffea0001568e08 ffff888097bf7000 [ 310.156442][T10658] raw: 0000000000000000 ffff8880523c4580 0000000100000001 0000000000000000 [ 310.165026][T10658] page dumped because: kasan: bad access detected [ 310.171552][T10658] [ 310.173876][T10658] Memory state around the buggy address: [ 310.179509][T10658] ffff8880523c4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 310.187567][T10658] ffff8880523c4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 310.195753][T10658] >ffff8880523c4580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 310.203896][T10658] ^ [ 310.209796][T10658] ffff8880523c4600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 310.217855][T10658] ffff8880523c4680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 310.225911][T10658] ================================================================== [ 310.235138][T10658] Kernel panic - not syncing: panic_on_warn set ... [ 310.241979][T10658] CPU: 1 PID: 10658 Comm: syz-executor.0 Tainted: G B 5.5.0-rc6-next-20200116-syzkaller #0 [ 310.253251][T10658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.263428][T10658] Call Trace: [ 310.266730][T10658] dump_stack+0x197/0x210 [ 310.271072][T10658] panic+0x2e3/0x75c [ 310.274988][T10658] ? add_taint.cold+0x16/0x16 [ 310.275011][T10658] ? trace_hardirqs_on+0x5e/0x240 [ 310.275025][T10658] ? trace_hardirqs_on+0x5e/0x240 [ 310.275043][T10658] ? __mutex_lock+0x1325/0x13c0 [ 310.275058][T10658] end_report+0x47/0x4f [ 310.275071][T10658] ? __mutex_lock+0x1325/0x13c0 [ 310.275085][T10658] __kasan_report.cold+0xe/0x32 [ 310.275099][T10658] ? __mutex_lock+0x1325/0x13c0 [ 310.275115][T10658] kasan_report+0x12/0x20 [ 310.275132][T10658] __asan_report_load4_noabort+0x14/0x20 [ 310.275144][T10658] __mutex_lock+0x1325/0x13c0 [ 310.275161][T10658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.275184][T10658] ? __perf_event_task_sched_in+0x1cb/0x810 [ 310.275197][T10658] ? tun_get_user+0x1604/0x3fc0 [ 310.275213][T10658] ? mutex_trylock+0x2d0/0x2d0 [ 310.275226][T10658] ? lock_acquire+0x190/0x410 [ 310.275243][T10658] ? trace_hardirqs_on+0x67/0x240 [ 310.275258][T10658] ? aa_file_perm+0x601/0x1600 [ 310.275273][T10658] ? __kasan_check_read+0x11/0x20 [ 310.275288][T10658] ? _raw_spin_unlock_irq+0x59/0x80 [ 310.275303][T10658] ? lock_downgrade+0x920/0x920 [ 310.275319][T10658] mutex_lock_nested+0x16/0x20 [ 310.275331][T10658] ? mutex_lock_nested+0x16/0x20 [ 310.275342][T10658] tun_get_user+0x1604/0x3fc0 [ 310.275357][T10658] ? aa_file_perm+0x62b/0x1600 [ 310.275375][T10658] ? tun_build_skb.isra.0+0x1480/0x1480 [ 310.275391][T10658] ? __this_cpu_preempt_check+0x35/0x190 [ 310.275403][T10658] ? lock_downgrade+0x920/0x920 [ 310.275416][T10658] ? tun_chr_close+0x180/0x180 [ 310.275433][T10658] tun_chr_write_iter+0xbd/0x156 [ 310.275450][T10658] do_iter_readv_writev+0x5f8/0x8f0 [ 310.275467][T10658] ? no_seek_end_llseek_size+0x70/0x70 [ 310.275481][T10658] ? apparmor_file_permission+0x27/0x30 [ 310.275498][T10658] ? rw_verify_area+0x126/0x360 [ 310.275515][T10658] do_iter_write+0x184/0x610 [ 310.275529][T10658] ? dup_iter+0x260/0x260 [ 310.275542][T10658] ? __kasan_check_read+0x11/0x20 [ 310.275556][T10658] ? __this_cpu_preempt_check+0x35/0x190 [ 310.275572][T10658] vfs_writev+0x1b3/0x2f0 [ 310.275587][T10658] ? vfs_iter_write+0xb0/0xb0 [ 310.275601][T10658] ? __fget_files+0x216/0x520 [ 310.275621][T10658] ? do_dup2+0x4f0/0x4f0 [ 310.275637][T10658] ? __kasan_check_read+0x11/0x20 [ 310.275655][T10658] ? __fget_light+0x1ad/0x270 [ 310.275671][T10658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 310.275687][T10658] do_writev+0x15b/0x330 [ 310.275703][T10658] ? vfs_writev+0x2f0/0x2f0 [ 310.275721][T10658] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 310.275736][T10658] __x64_sys_writev+0x75/0xb0 [ 310.275753][T10658] do_syscall_64+0xfa/0x790 [ 310.275783][T10658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.275799][T10658] RIP: 0033:0x45b251 [ 310.275814][T10658] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 310.275822][T10658] RSP: 002b:00007f265300dba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 310.275836][T10658] RAX: ffffffffffffffda RBX: 0000000000300cce RCX: 000000000045b251 [ 310.275843][T10658] RDX: 0000000000000001 RSI: 00007f265300dc00 RDI: 00000000000000f0 [ 310.275850][T10658] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 310.275859][T10658] R10: 0000000000000000 R11: 0000000000000293 R12: 00000000ffffffff [ 310.275867][T10658] R13: 0000000000000b7a R14: 00000000004cc5a6 R15: 000000000075bfd4 [ 310.277442][T10658] Kernel Offset: disabled [ 310.607344][T10658] Rebooting in 86400 seconds..