[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 57.290717][ T26] audit: type=1800 audit(1572032030.420:25): pid=8657 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 57.312343][ T26] audit: type=1800 audit(1572032030.420:26): pid=8657 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 57.365936][ T26] audit: type=1800 audit(1572032030.420:27): pid=8657 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.24' (ECDSA) to the list of known hosts. 2019/10/25 19:34:00 fuzzer started 2019/10/25 19:34:02 dialing manager at 10.128.0.26:45165 2019/10/25 19:34:02 syscalls: 2534 2019/10/25 19:34:02 code coverage: enabled 2019/10/25 19:34:02 comparison tracing: enabled 2019/10/25 19:34:02 extra coverage: extra coverage is not supported by the kernel 2019/10/25 19:34:02 setuid sandbox: enabled 2019/10/25 19:34:02 namespace sandbox: enabled 2019/10/25 19:34:02 Android sandbox: /sys/fs/selinux/policy does not exist 2019/10/25 19:34:02 fault injection: enabled 2019/10/25 19:34:02 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/10/25 19:34:02 net packet injection: enabled 2019/10/25 19:34:02 net device setup: enabled 2019/10/25 19:34:02 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 19:36:10 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) symlink(0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000380)='./file1/file0\x00', 0x0) rmdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) chmod(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@max_read={'max_read', 0x3d, 0x9}}]}}) rt_sigsuspend(&(0x7f0000000340)={0x1}, 0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507008000"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c00010076", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fcntl$dupfd(0xffffffffffffffff, 0xc0a, 0xffffffffffffffff) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000009ff0)=[{&(0x7f0000000140)="230000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000001e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 19:36:10 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000380)='./file1/file0\x00', 0x0) rmdir(&(0x7f0000000140)='./file1\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) chmod(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@max_read={'max_read', 0x3d, 0x9}}]}}) socket(0x0, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507008000"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x4}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syzkaller login: [ 197.520344][ T8823] IPVS: ftp: loaded support on port[0] = 21 [ 197.662535][ T8823] chnl_net:caif_netlink_parms(): no params data found [ 197.710750][ T8823] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.720500][ T8823] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.729178][ T8823] device bridge_slave_0 entered promiscuous mode [ 197.740590][ T8823] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.748208][ T8823] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.757776][ T8823] device bridge_slave_1 entered promiscuous mode [ 197.783098][ T8823] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 197.796643][ T8823] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 197.797996][ T8826] IPVS: ftp: loaded support on port[0] = 21 [ 197.827971][ T8823] team0: Port device team_slave_0 added 19:36:11 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, 0x0) [ 197.836131][ T8823] team0: Port device team_slave_1 added [ 197.898721][ T8823] device hsr_slave_0 entered promiscuous mode 19:36:11 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_open_procfs(0x0, 0x0) [ 198.005029][ T8823] device hsr_slave_1 entered promiscuous mode [ 198.133996][ T8828] IPVS: ftp: loaded support on port[0] = 21 [ 198.247584][ T8830] IPVS: ftp: loaded support on port[0] = 21 [ 198.320997][ T8826] chnl_net:caif_netlink_parms(): no params data found [ 198.344501][ T8823] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.351794][ T8823] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.359754][ T8823] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.366923][ T8823] bridge0: port 1(bridge_slave_0) entered forwarding state 19:36:11 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffdea) r7 = socket(0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x0, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'bridge_slave_1\x00', @ifru_hwaddr=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xc}}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) socketpair$unix(0x1, 0x80001, 0x0, 0x0) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, r8) splice(r0, 0x0, r3, 0x0, 0x800000000000001, 0x0) [ 198.444271][ T8826] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.465623][ T8826] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.474315][ T8826] device bridge_slave_0 entered promiscuous mode [ 198.502871][ T8826] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.524741][ T8826] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.533204][ T8826] device bridge_slave_1 entered promiscuous mode [ 198.641678][ T8834] IPVS: ftp: loaded support on port[0] = 21 [ 198.673842][ T8826] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 198.709946][ T8826] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 198.735631][ T8828] chnl_net:caif_netlink_parms(): no params data found 19:36:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f00000012c0)={@void, @val, @mpls={[], @ipv6={0x0, 0x6, "314092", 0x30, 0x0, 0x0, @dev, @ipv4={[], [], @local}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "fbcd9a", 0x0, 0x0, 0x0, @mcast1, @ipv4={[], [], @empty}}}}}}}, 0x62) [ 198.768498][ T3023] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.777180][ T3023] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.841605][ T8823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.853903][ T8830] chnl_net:caif_netlink_parms(): no params data found [ 198.868221][ T8826] team0: Port device team_slave_0 added [ 198.877524][ T8826] team0: Port device team_slave_1 added [ 198.940139][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.950167][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.962206][ T8823] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.036695][ T8826] device hsr_slave_0 entered promiscuous mode [ 199.074955][ T8826] device hsr_slave_1 entered promiscuous mode [ 199.114756][ T8826] debugfs: Directory 'hsr0' with parent '/' already present! [ 199.122852][ T8828] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.130632][ T8828] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.138767][ T8828] device bridge_slave_0 entered promiscuous mode [ 199.148693][ T8828] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.155894][ T8828] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.163638][ T8828] device bridge_slave_1 entered promiscuous mode [ 199.191059][ T8839] IPVS: ftp: loaded support on port[0] = 21 [ 199.210654][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.219858][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.231182][ T3023] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.238296][ T3023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.277548][ T8830] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.285381][ T8830] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.293141][ T8830] device bridge_slave_0 entered promiscuous mode [ 199.303727][ T8830] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.311077][ T8830] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.319269][ T8830] device bridge_slave_1 entered promiscuous mode [ 199.330126][ T8828] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.343124][ T8828] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.372210][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.381292][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.389923][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.397002][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.418073][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.426764][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.435517][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.444130][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.462408][ T8830] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 199.478594][ T8838] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.536530][ T8830] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 199.549709][ T8828] team0: Port device team_slave_0 added [ 199.558978][ T8828] team0: Port device team_slave_1 added [ 199.627792][ T8828] device hsr_slave_0 entered promiscuous mode [ 199.675226][ T8828] device hsr_slave_1 entered promiscuous mode [ 199.714806][ T8828] debugfs: Directory 'hsr0' with parent '/' already present! [ 199.739273][ T8838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.748195][ T8838] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.768269][ T8838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.777068][ T8838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.788205][ T8834] chnl_net:caif_netlink_parms(): no params data found [ 199.809389][ T8830] team0: Port device team_slave_0 added [ 199.818253][ T8830] team0: Port device team_slave_1 added [ 199.831751][ T8823] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 199.844029][ T8823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.868853][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.878295][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.948374][ T8834] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.955979][ T8834] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.963719][ T8834] device bridge_slave_0 entered promiscuous mode [ 199.972898][ T8834] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.980162][ T8834] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.988391][ T8834] device bridge_slave_1 entered promiscuous mode [ 200.087978][ T8830] device hsr_slave_0 entered promiscuous mode [ 200.134973][ T8830] device hsr_slave_1 entered promiscuous mode [ 200.204785][ T8830] debugfs: Directory 'hsr0' with parent '/' already present! [ 200.218253][ T8839] chnl_net:caif_netlink_parms(): no params data found [ 200.246742][ T8834] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.258549][ T8834] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.278402][ T8823] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.328177][ T8828] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.344383][ T8834] team0: Port device team_slave_0 added [ 200.361176][ T8834] team0: Port device team_slave_1 added [ 200.389594][ T8839] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.398039][ T8839] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.406914][ T8839] device bridge_slave_0 entered promiscuous mode [ 200.414742][ T8839] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.421823][ T8839] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.430174][ T8839] device bridge_slave_1 entered promiscuous mode [ 200.440084][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.448140][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 200.463256][ T8828] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.502590][ T8839] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.530290][ T8839] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.545689][ T8826] 8021q: adding VLAN 0 to HW filter on device bond0 [ 200.587787][ T8834] device hsr_slave_0 entered promiscuous mode [ 200.635078][ T8834] device hsr_slave_1 entered promiscuous mode [ 200.694837][ T8834] debugfs: Directory 'hsr0' with parent '/' already present! [ 200.719866][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 200.728507][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 200.737414][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.744656][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 200.752636][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 200.837727][ T8839] team0: Port device team_slave_0 added [ 200.851818][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 200.861125][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 200.870906][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.878032][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 200.891652][ C0] hrtimer: interrupt took 47668 ns [ 200.897476][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.919425][ T8826] 8021q: adding VLAN 0 to HW filter on device team0 [ 200.940155][ T8839] team0: Port device team_slave_1 added [ 200.990491][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 200.999919][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.010350][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.096601][ T8839] device hsr_slave_0 entered promiscuous mode [ 201.145182][ T8839] device hsr_slave_1 entered promiscuous mode [ 201.194703][ T8839] debugfs: Directory 'hsr0' with parent '/' already present! [ 201.221961][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.231402][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.240464][ T8832] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.247592][ T8832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.258067][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.268605][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.277108][ T8832] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.284182][ T8832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.291913][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.301024][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.309807][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.318567][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.327629][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.336301][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.345224][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.353558][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.362117][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 201.371107][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.380503][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.388649][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.421054][ T8830] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.430441][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.439984][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.449246][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.458170][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.466822][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 201.492192][ T8828] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.510033][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.522039][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.545615][ T8826] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 201.557369][ T8826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 201.589352][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 201.598842][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 201.607989][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 201.619412][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 201.636522][ T8828] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.646372][ T8830] 8021q: adding VLAN 0 to HW filter on device team0 [ 201.680028][ T8826] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.700302][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 201.712759][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 201.722076][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.729271][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 201.767549][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 201.801966][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 201.812265][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 201.822897][ T3023] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.830111][ T3023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 201.839571][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 19:36:14 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) symlink(0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000380)='./file1/file0\x00', 0x0) rmdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) chmod(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@max_read={'max_read', 0x3d, 0x9}}]}}) rt_sigsuspend(&(0x7f0000000340)={0x1}, 0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507008000"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c00010076", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fcntl$dupfd(0xffffffffffffffff, 0xc0a, 0xffffffffffffffff) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000009ff0)=[{&(0x7f0000000140)="230000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000001e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 201.849765][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.866653][ T8834] 8021q: adding VLAN 0 to HW filter on device bond0 [ 201.909319][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.920194][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 201.929737][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 201.947419][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 201.961621][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 201.983228][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 201.998611][ T8839] 8021q: adding VLAN 0 to HW filter on device bond0 [ 202.024281][ T8834] 8021q: adding VLAN 0 to HW filter on device team0 [ 202.041888][ T8830] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 202.060554][ T8830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 202.086117][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 202.094130][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.173881][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.208714][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 202.218535][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 19:36:15 executing program 2: syz_emit_ethernet(0x0, 0x0, 0x0) symlink(0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000380)='./file1/file0\x00', 0x0) rmdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) chmod(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@max_read={'max_read', 0x3d, 0x9}}]}}) rt_sigsuspend(&(0x7f0000000340)={0x1}, 0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507008000"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c00010076", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fcntl$dupfd(0xffffffffffffffff, 0xc0a, 0xffffffffffffffff) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000009ff0)=[{&(0x7f0000000140)="230000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000001e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 202.256335][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 202.276588][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 202.299793][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.350340][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.390111][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.397294][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state [ 202.519262][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.554261][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.566215][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.573354][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state [ 202.591970][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 202.621856][ T8839] 8021q: adding VLAN 0 to HW filter on device team0 19:36:15 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) symlink(0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000380)='./file1/file0\x00', 0x0) rmdir(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) chmod(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@max_read={'max_read', 0x3d, 0x9}}]}}) rt_sigsuspend(&(0x7f0000000340)={0x1}, 0x8) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507008000"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012000c00010076", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x5}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) fcntl$dupfd(0xffffffffffffffff, 0xc0a, 0xffffffffffffffff) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000009ff0)=[{&(0x7f0000000140)="230000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) recvmmsg(r1, &(0x7f0000001e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 202.680233][ T8830] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 202.711766][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.767720][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 202.783472][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.794341][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.803258][ T48] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.810428][ T48] bridge0: port 1(bridge_slave_0) entered forwarding state 19:36:15 executing program 0: seccomp(0xc6706d363924cd84, 0x0, 0x0) [ 202.819105][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 202.828674][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.837571][ T48] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.844735][ T48] bridge0: port 2(bridge_slave_1) entered forwarding state 19:36:16 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0900000000003639408fa3a3ba27660199783b0a82f79b32a7c8225086600a38e07d4db88a66596759e95307b680ab73e03c53555c97e8e37d01da4d44a994354a9fa3f355214eeabd24fd620b2022d5ad63b369aaffe9a6b608a5fece0eca95d71f2d3e60613a027fb50cbcbd92d44076d3b97247e066165ccf1032f51d36ab231f6c20d87e9167edf69776dca67d90a17ccd18fb9c7b21d53478e382dcf296a23a060bfe9ac9", 0xa7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 202.899989][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 202.933167][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 202.944029][ T48] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.962244][ T8834] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 202.981328][ T8834] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 19:36:16 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="d3d2b93c38f19c0402cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYRESHEX, @ANYBLOB="ccf54b7ee305f51a839e06d904c8c0b3ccf81e28bdf2632ef1b7b15ace21e8538b2cabbf872680194ea0d120ff0b64ff60d161fca4d1629d49dcfe05b56464a478abce57b153ec3757f196acb5445b53a5f753c4c34b4dd62160550af66fa2429999c84400040000000000005fcc30", @ANYRESHEX], 0x0, 0xab}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000000)="1e27f3") ptrace$cont(0x7, r0, 0x0, 0x0) [ 202.985557][ T8898] ptrace attach of "/root/syz-executor.0"[8897] was attempted by "/root/syz-executor.0"[8898] [ 203.007610][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 19:36:16 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x20, 0x2) write$evdev(r0, &(0x7f0000000140)=[{{}, 0x1, 0x63, 0x400000002}], 0x3f9) [ 203.061473][ T8902] ptrace attach of "/root/syz-executor.0"[8901] was attempted by "/root/syz-executor.0"[8902] [ 203.080566][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.118881][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.155432][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 19:36:16 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x20, 0x2) write$evdev(r0, &(0x7f0000000140)=[{{}, 0x1, 0x63, 0x400000002}], 0x3f9) [ 203.166510][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.175978][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.185331][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.193667][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.202666][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.212069][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 203.256151][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.290908][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.301706][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.311113][ T3023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.317099][ T8834] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 203.323327][ T8839] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 203.351476][ T8839] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 203.375179][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.383537][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 203.400468][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.412935][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 203.421699][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 19:36:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 203.449728][ T8832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 203.479268][ T8839] 8021q: adding VLAN 0 to HW filter on device batadv0 19:36:16 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 203.614838][ T8928] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 203.727152][ T8932] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub [ 203.916631][ T8942] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 203.926360][ T8942] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 203.938369][ T8942] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 204.040222][ T8948] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 204.094907][ T8948] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 19:36:17 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x20, 0x2) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)=@generic={0x11, "5fbc1c6566855bd75fabb26db6b97fb8b64e2d06cc0b3e3ccfd668d3c85144dabccc3e52566364a6a57f56f479cca7c133f751e028f28fc31292a53a68d2a7a0b0ca14907ec056695da477e0b97884afa436e33a74f276deec6e8c885b88745939b628a81ce277b9cbfa5543d7cab5ca2eea6922eefd5a64851175c093c9"}, 0x80) write$evdev(r0, &(0x7f0000000140)=[{}], 0x3f9) 19:36:17 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000009ff0)=[{&(0x7f0000000140)="230000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 19:36:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x5, 0x3, 0xe009}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x3}, 0x48) 19:36:17 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) 19:36:17 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000000)='cgroup\x00', 0x0, 0x0) 19:36:17 executing program 0: mkdir(0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000400)=0x6) [ 204.281062][ T8960] BPF:hdr_len not found [ 204.281589][ T8961] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub 19:36:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x2ee, 0x0, 0xf3a0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 19:36:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000180)=0x1, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000180)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) 19:36:17 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x400) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x0, 0x0, [0x8f67, 0x2, 0x9]}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getegid() 19:36:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x400) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79, 0x0, [0x8f67, 0x2, 0x9]}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000140)) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 204.558776][ T8990] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub 19:36:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000180)={0x79, 0x0, [0x8f67, 0x2, 0x9]}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000140)) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getegid() 19:36:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r3, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x2, 0x5011, r3, 0x0) 19:36:17 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 204.704347][ T9001] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 204.926651][ T9019] vhci_hcd: GetPortErrorCount req not supported for USB 2.0 roothub 19:36:18 executing program 3: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 204.971893][ T9006] bond0: (slave bond_slave_1): Releasing backup interface 19:36:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000380)='threaded\x00', 0x9) 19:36:18 executing program 3: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:18 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, 0x0, 0x0) 19:36:18 executing program 3: ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:18 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f000095dffc)=0x42) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={r3, 0x2, 0x5}, &(0x7f00000003c0)=0x8) 19:36:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x400) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x0, 0x0, [0x8f67, 0x2, 0x9]}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getegid() [ 206.715740][ T9013] bond0: (slave bond_slave_1): Releasing backup interface 19:36:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000180)={0x79, 0x0, [0x8f67, 0x2, 0x9]}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000140)) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getegid() 19:36:20 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:20 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 19:36:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000180)={0x79, 0x0, [0x8f67, 0x2, 0x9]}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000140)) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getegid() [ 206.854879][ T9051] bond0: (slave bond_slave_1): Releasing backup interface 19:36:20 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:20 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:20 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:20 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:20 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:20 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:21 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x400) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x0, 0x0, [0x8f67, 0x2, 0x9]}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getegid() 19:36:22 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590ed76f"], 0x0, 0x4c}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:36:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x400) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79, 0x0, [0x8f67, 0x2, 0x9]}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000140)) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getegid() 19:36:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000000), 0x4) 19:36:22 executing program 3: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:22 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="280000001c0075d99a44cbdf3563d40002000000", @ANYRES32=r4, @ANYBLOB="140000100c0001"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 19:36:22 executing program 3: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:22 executing program 0: futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(&(0x7f000000cffc), 0x3, 0x2, 0x0, &(0x7f0000000100), 0x0) 19:36:22 executing program 3: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000000100)={0xa3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 209.288521][ T9095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 19:36:22 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) 19:36:22 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x32, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 209.364085][ T9105] bond0: (slave bond_slave_1): Releasing backup interface 19:36:22 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) 19:36:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:36:22 executing program 5: syz_emit_ethernet(0x4a, &(0x7f00000002c0)={@local, @empty, [], {@ipv4={0x800, {{0xb, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev, {[@timestamp={0x44, 0xc, 0x5, 0x1, 0x0, [{[@multicast1]}]}, @rr={0x7, 0xb, 0x5, [@multicast1, @multicast1]}]}}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "1b4409", 0x0, "e83ada"}}}}}}, 0x0) [ 210.296711][ T9141] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 19:36:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x400) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79, 0x0, [0x8f67, 0x2, 0x9]}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000140)) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getegid() 19:36:23 executing program 0: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xa10, r0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 19:36:23 executing program 1: 19:36:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) 19:36:23 executing program 5: 19:36:23 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:36:23 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000380)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x400) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79, 0x0, [0x8f67, 0x2, 0x9]}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000140)) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{0x0}], 0x1, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) getegid() 19:36:23 executing program 5: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000000)=""/4096, 0xfffffeeb, 0x0, &(0x7f0000001000)={0x77359400}) r2 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, 0x0) mq_timedreceive(r2, &(0x7f0000000000)=""/4096, 0xfffffeeb, 0x0, &(0x7f0000001000)={0x77359400}) memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r3, 0x0) pwrite64(r3, &(0x7f0000001180)="00c0c587e4ceb195de25f765789e69a2f472a3308d094f7c88fcaa2ffebf772e4ef8a98fb720a3f4289dc068b63c6060bebcc9ed4d9b91eb4ddd944791e002135544873888cafbd3ad48844675d21cd0c14b41209594656b42ce7386004cab15a638b0f40dcfbb4a6c68e99b51cd88", 0x6f, 0x47) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) r4 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 19:36:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01, 0x54}, 0x3f00) close(r1) [ 210.658687][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 210.658701][ T26] audit: type=1804 audit(1572032183.790:31): pid=9164 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir210305395/syzkaller.p8IPZU/12/file0" dev="sda1" ino=16580 res=1 [ 210.676598][ T9167] vhci_hcd: default hub control req: 000d v0000 i0000 l0 [ 210.737179][ T9168] bond0: (slave bond_slave_1): Releasing backup interface 19:36:23 executing program 0: r0 = socket$inet(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 19:36:24 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 210.928762][ T9183] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 211.023090][ T9187] vhci_hcd: default hub control req: 000d v0000 i0000 l0 19:36:24 executing program 2: 19:36:24 executing program 0: 19:36:24 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:24 executing program 0: [ 211.266107][ T9192] vhci_hcd: default hub control req: 000d v0000 i0000 l0 19:36:24 executing program 1: 19:36:24 executing program 5: 19:36:24 executing program 2: 19:36:24 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:24 executing program 0: [ 211.593115][ T9212] vhci_hcd: invalid port number 0 19:36:24 executing program 4: 19:36:24 executing program 1: 19:36:24 executing program 5: 19:36:24 executing program 2: 19:36:24 executing program 0: 19:36:24 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 211.832834][ T9226] vhci_hcd: invalid port number 0 19:36:25 executing program 5: 19:36:25 executing program 2: 19:36:25 executing program 1: 19:36:25 executing program 4: 19:36:25 executing program 0: 19:36:25 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0xa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 19:36:25 executing program 5: 19:36:25 executing program 4: 19:36:25 executing program 0: 19:36:25 executing program 2: [ 212.107832][ T9240] vhci_hcd: invalid port number 0 19:36:25 executing program 1: 19:36:25 executing program 3: 19:36:25 executing program 5: 19:36:25 executing program 0: 19:36:25 executing program 4: 19:36:25 executing program 1: 19:36:25 executing program 2: 19:36:25 executing program 3: 19:36:25 executing program 4: 19:36:25 executing program 5: 19:36:25 executing program 1: 19:36:25 executing program 2: 19:36:25 executing program 0: 19:36:25 executing program 3: 19:36:25 executing program 1: 19:36:25 executing program 4: 19:36:25 executing program 2: 19:36:25 executing program 5: 19:36:25 executing program 0: 19:36:26 executing program 4: 19:36:26 executing program 1: 19:36:26 executing program 3: 19:36:26 executing program 2: 19:36:26 executing program 5: 19:36:26 executing program 0: 19:36:26 executing program 1: 19:36:26 executing program 4: 19:36:26 executing program 3: 19:36:26 executing program 2: 19:36:26 executing program 5: 19:36:26 executing program 1: 19:36:26 executing program 4: 19:36:26 executing program 3: 19:36:26 executing program 2: 19:36:26 executing program 0: 19:36:26 executing program 5: 19:36:26 executing program 3: 19:36:26 executing program 1: 19:36:26 executing program 4: 19:36:26 executing program 2: 19:36:26 executing program 5: 19:36:26 executing program 0: 19:36:26 executing program 4: 19:36:26 executing program 3: 19:36:26 executing program 1: 19:36:26 executing program 2: 19:36:26 executing program 0: 19:36:27 executing program 5: 19:36:27 executing program 3: 19:36:27 executing program 4: 19:36:27 executing program 1: 19:36:27 executing program 2: 19:36:27 executing program 0: 19:36:27 executing program 5: 19:36:27 executing program 3: 19:36:27 executing program 1: 19:36:27 executing program 4: 19:36:27 executing program 2: 19:36:27 executing program 0: 19:36:27 executing program 5: 19:36:27 executing program 4: 19:36:27 executing program 1: 19:36:27 executing program 5: 19:36:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x7) read(r1, 0x0, 0x0) 19:36:27 executing program 2: 19:36:27 executing program 0: 19:36:27 executing program 4: 19:36:27 executing program 2: [ 214.671312][ T9380] sp0: Synchronizing with TNC 19:36:27 executing program 5: 19:36:27 executing program 1: 19:36:27 executing program 0: 19:36:27 executing program 4: 19:36:28 executing program 2: 19:36:28 executing program 1: 19:36:28 executing program 5: [ 214.937884][ T9380] sp0: Synchronizing with TNC 19:36:28 executing program 3: 19:36:28 executing program 0: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) unlink(&(0x7f00000000c0)='./file0\x00') 19:36:28 executing program 4: setxattr$trusted_overlay_opaque(0x0, 0x0, &(0x7f0000000100)='y\x00', 0x2, 0x2) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)=0x4480200) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001080)=ANY=[@ANYBLOB, @ANYPTR], 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) 19:36:28 executing program 2: 19:36:28 executing program 1: 19:36:28 executing program 5: 19:36:28 executing program 2: r0 = gettid() clone(0x20008000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x20) sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYRESHEX, @ANYBLOB="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", @ANYBLOB="8a7cfcb0bd543a07372504167b455ddfd0640764ef04ff46cf47e8137f38ee38898fd565996a1a1f4cd1b86a0e031dff9943eb7285dbf2666b810306f9"], 0x0, 0x16c}, 0x20) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) tkill(r0, 0x21) 19:36:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00\v*\xc0\x00', @ifru_flags}) 19:36:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='R', 0x1}], 0x1) 19:36:28 executing program 1: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) 19:36:28 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x20, 0x2) write$evdev(r0, &(0x7f0000000140)=[{{}, 0x1, 0x63, 0x400000002}], 0x3f9) select(0x40, &(0x7f0000000000), &(0x7f0000000080)={0x8}, 0x0, 0x0) 19:36:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000000000000000000000000006311041f000000009500000000000000"], &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) [ 215.695600][ T9453] ptrace attach of "/root/syz-executor.2"[9445] was attempted by "/root/syz-executor.2"[9453] 19:36:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='R', 0x1}], 0x1) 19:36:28 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="6653a8990785363940aed12f0000db2f00000022f1f169a4000000000000009f1f8175442ce71022fe50377a22cbccb0353cffd7a7c0c92465e5f9cc2d3fbf0322168078aba9d7ae45b0051a1221af2772a9567bb821942ce72590f1bf41d20d4c000000279bd612811df1fcaa94a96d58db92af7f9298918ae95b745777a1968e48d46358c8735e3b009f9d01000000000000005b5895e126de3d6d7c6949", 0x9f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:36:28 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x8182) r1 = memfd_create(&(0x7f00000004c0)='.^\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24000000) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x1261, 0xffffffffffffffff) 19:36:29 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x388) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) pipe2$9p(0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) lseek(r1, 0xfffffffffffffffe, 0x1) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000025c0)) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x101, 0x0) r2 = creat(0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000540)={0x0, 0x0, 0x2080, {0x0, 0x0, 0x3}, [], "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", "23aa14b2ac5f5b0f45ba76b91c6b678b22d35ed0086965720d5984f4a00d43924e35e41e39dd1b1f6bea69a14c7f117a89ae2ee13208318ddc59ffd76ae06fbbdd78c19344094149b64cafd7020b3cc79d5ea798c33c1608691e5df6a3d3dcef30b0a74ea178f0a9e76429dff28ad564f482e538a6f729aff88091333057120b3a1e3e7719c896255060a1c3405c2366f67949b646c5403e64aa745e2e9e94df9e4406760a0388a219d66cdc753754f427adfb2c7c930168886fb7445daf7e60ec7fa84b8866e93a5139b4942f1ee293cccc8b96f96a1d4881253981e99e68a09b86bf236a721a5cc8db4287a99f8bc8b7b765f242895476c54b0f90cebaf2c9586e4d7200a965b7fd7c73538eba2ab71d258fdae8c791975bf8acc7e4ed340a2d44564e47a52439e432b54e6d98c24cf3950844f716b06e42e04b95f98ca40639790e824538b1069a4ac4a62cae43aced11ac05bf9ee104328b5c2a13f0467928602cfe6482945b5388715f344f9e24a2a3269944047f6bb2b17c21742aedb9af739bb76b5acfa817c8dfc9f3277f2d1a00fed0c07f96a784c19c600527ed3fbee22893a33d42923922798d8bb3e98327df2f3d01f21c0dd8a432bcfdeeaebf8d7ecdeb7b88f4b0749ee00012a045abfed844b42b8e65361b7e5c6206d1376a76843bc139536f7725364ad09b9b31a4c50ac6bc73e5f2292c4d8609232faf0cd89a6c100123366c80afb2782c518c8e8a11fbddd4424dbf4aab08880e7114a615db362fa7af04af8bf627485977f1e0ac5b10b936a1961142687c43cf332aece60a841223590d3861aeb9629026605e5cef06b1b16218f0b9b9e949f10ef0675602c358651bad27bea84479957b7c684d87313567c9f5a2b5d77c116d77e1ec5987c15f766023ea551b52c8a185a57767de55cec09ce8ab02179f4aaa62e35da5dc9442d901c94cf333999e6b41ef8a9e667aebcfb946abb097191c6068a21933ce2ed1b6f19c037202832446d352a34273b673e2a437ec3106d2105724ac80c93c505e7cc2b4b596bc429dbf29382de4c03a81867991d3219994786e2f7bd0e8cb81d0c0fb880b009929fc417824d6b9d3c7e8a4038cbedc38f30f27abb2780e325d8344bd7d9ef9fe3f38a6f004e172a0722f9ac4f786d5c47810e6c2188c666b7f7b2c51fe5fed84ef26e25afce1a44cfdc79b77cfd384713e871d82f0b9cdaa62065a1719166c2c0d78031cc50e8de6dcac20f6b209206a702967ca85a9aca3d679da8c03d9d56a26eaa92fc4d48262cbb97627ce65caa1b14c55468cdef076619a0771a383f6c6bdcbf8ee0ed06e51e254e0bb05fbd8505ead8fb2bb17ebca64de6e64159a3321f64e6cfe8c45bc596872d5365c4eb4ef24f74f348d0216de2a21ceb24c4fb410cfc538d752c680c70d10de13693977321c47c5ac68f70f0c53ddbfc90bcbf69a26202b57b3a2af180982c3dc0961af325527eaef38b15487be427098b4015dbc3806af6d56b05152e78812a9f3981d5661450ade5b7b65ae62ac83093c1cbd1f9513ab1866de962c28f2611f7b2bad748d13569266d47b105cfeead2e4508236e96bd9a9117acbc9883749a7d763c175b51be918c2dbeac316845b25a63eff47b2caa158aa3205bd5d0c1a719d454252aef51dd31cabdf0674ef138460301384034173b6a4e9cef72713fd20625d3ce010afd9e95565d332aa47708ee2c3a41cc9f3280b1a099f1d00cba76307ca72af3264c64debe6cd7eb9dfd2f820b26a07b7c57df4abf4e06badeabeb75e4f66545b7a271b34f7a31409e712a7605d6d10d18889b437075d89f823970674bc620fb78788ce70e671dde9c0745fdf7c6333579cfa3d927a240afba1e6a884e5072fcd8f2a5bed20eda2b1634ac65f8a5460f3206f420b3f3b9f30e92515dd5db65298034326e84fa918fde9ede92a7bc4d770ce8b7a6820a842f800017791c088764611178b221fad284cccf4c646d06200ae5c0ceefa357c5cf3b04952ab7c037857998cb9e4109d84388a5e19d18bc9317891501ab4c0f7dcce1066e357e4a1520b20c3646f729331fe822a1736cf8a495814cc9ff8e24bb0decb3e2397022e144630beaeb5c7ac7596da57aa3ddc35989adc948a226e4899383006a15eeb531b540c0b09d39c6a4206b45c613a5415241f546936eca2498569eaa217a238adcbbe603a44cc23d1c1686688aca0a7dd595e238515132d40d94fbef6d1ae946b872ba6d0873fa9584f2cca5333f739f6d7f505667d226ee8fab38f77b400d6bd71a7b9cdd8391b4c8f7defb231e0d3f8dc72c35af6c99868b39ac0c5f74adaad19fe5bbec32bbca767846998b678ef7dc07cf67f6e3c747294b05f75e85e6427c346b83b676a5fe4de0876ba856f699c988c02b2f3977b3dc67799a9d9447eff5744ce23b7ef30d153dbb8e34a33da1b8bbee5cad5de3a3b1c684729027bf8444065422c8f7ae2a6623439f0e4619749e0dfe78868e0bb840a82b14cf5f07f2fe38eb8b0b0350274bd884bb467d1726f575cc7c3b0f2a193925504d5bebf763425d4f93dbe9bbfd4f4ccd97885db465576bee66c554d6b40d28c0fca8f77125710bd247171fce0acf9b922b71783189b224da89b7c7c2015063aea81b1825e8d51521c219a75c582f2e1c536d7126de78ef9316d04df96a544b215f626ed43e3b063fb92cbdc3a7651730f20a473ae0e04b6f998503e4fc7a2096b121d9b7f1f4b50a7526c8f291623f8fb26d473b3c41ae4b5fa47a7a5ff14c72e8b97e325bb349bcf299b4341933aaf6483d45408557026d0488bd79773c954dd2f740bbb50629dd571edf48c6288e85c0d70d2ddf9f39c723027c5f63e99127d8c9c61640fa07a6ca16d797e3fbd94e0ca1d80bab1a774ded265712cde43ceef2e0b4c73c57b78202b322386d392147f1b0b8d49c08c3aa09836a1e76fb2c00afc1087095b9ca77d94211cfae1d7ace4ba086cacaaf1ec52ae93df457ae52ac0c31602d733ef2f59b26e19e7621cba964cbb069882ada5bb530d3dbe4aecdc84ddd810bf38a5ee34753928b0570dab3ac297cecb9c41d3e911a5f91c14c6106ae0ce39de3639ab8681d8f9979ff36c5c9f095691571450b62474da7724cab270b026ab30256cd4b18d3462f3357d0479606b6bdb022ef8f6c5f233abf52efb755cceaf022254cce49473477efef833ec93a864897ccc581c43ad61662113e75e456cd5faa13fabd8d99a87a9d5470fcd02fb05fdfc9ba32c5f39e9b644b6573eba0f9c8011f5759796c1954280bafbb13962e668fe836142f50a6d5ea23bd93e829604d28926ce672f13184749a3ecb0ef5da7d1ea3a8330e575dca0056388f9d9aa879b9039a99c03e39554020230de279589722e90b7f209a510ad79b8208f540b323abe56a6e37aeecd11b317c5550ab81f6536f78c5a89c3a56882e41d76ca39a925db5a65455b0d86a516cde8c88164e6d40083e14603fdf90e9dd9deed0e2268e4e3a9317251993a5d69068fe847c29393bf1e9d41b56dca0838e792faa04eae4e8b66298ac1a22da9fd693e1b1acf7cbd06d84d6434d2c30e21076345092f2883d4cc73ab88d2d7788a1a0f0d33b820991585f5a61f814087bd9d759a65e520c132986bcdc7a37b7df1f41bda120e18f1f038c5bd236e58080cd4972b26451d36ca9c59d230ea97cfe78b98e7ae5574fdc52698ff8ef50a57e15c21794d50c1b77265a6259d5ef31c5d994453175a65384205187b0274107497d0f15fea73084eeea7b1e3252c2ce33f8d383c9be255f3c7f8f63e191cd63dc47322c16591c27a01de74217ca5be86402fc8d87e36e65416c7ac14d93b52008a408dacde843c1ac430dc94b51ce45c2a586f2aa914baea918864847f8f588549468b6dc15782cb38ad53137bdd1d2116e42255916e194b8f5f4f3a30bbbf42700dd31ee953adb2f6b25fce3d2e6963028d64034f60c17f9725829820634afb433c8abf33dee84506e93683da81757504c117d506d0c122ef2a8e30c0fb4e70abec6977a8c1113b45bc1c59316aec57003fc02bd48ace990323b89d809251b8e3cee9dd53844f163d71fe729a159edf9ff02a2374534ebe531691065f861538d3b4d7fe63b3da762eb89cae3d97b7902f93822bc1d0db07d14fe9a7ee928bcf1f18ccbad39fb4df19965f265132641fe1b124121f0d63acb5850e59965946c3eac929a18306d2768dc064aff86f8f5503bb1fb54267f66aaa7c22e639c6c95e144be7c436db4f7840376cdf734da00b9d0e9c9525e0bdb9c2c408dcd72046a006335bed8f3b93f4a6f5a4ab48b661d51058d55483cf27ae36d8f963cb363d073ce07b7325b744a429c997d4315ac0b402d325d182c671a863a32aecf0a48aad5d97bcb723b51e4d8919b550d2eda54cdae9078347257e17149221512cf5790e5f6484ca5afc0da36576ce416f570adbd2f2dc1c95731e649c33171df3db9c5b7c148b8f0995148056bee359a9da03062cef8fea0d7ba4cbaef476bf1c96a0c464c7bfa971df07a6a42a211a918562725ab7007b0f479d7a05b295ed1b5b8a457c022a7162e1c4d5115cababb88976a45d2e1d40fce83f157ba63c662408e32726f41b09284bb5e5115c5f471265aa08ec4c8783a68ccf1671377585fb498a657ebfd00226e75bbe9736e5858295a687d0ce0bd9237590aabc52097de69ab7eb169d05b4d9bfe9ecde126cae7fb092685fab0a2488dfa1d52c8e4d16638ae00afb8d40e6290592aa56b7b7a5ca0ec6a09280ed4e263d01aeacd954e50b91301559ad08f0d7f4d775ca73615f7f96587b9bc467d42a1b7ca5c8e80fefa4ba534d175cb20ffb7eb8244dd3b6f29f6951a11d93ea925fcab804abe5efa355f84baff3966738ab1eb6ea88cb4ea72a09eda10425f293333f790ac95cc7a1ace23e4541449553ff5e5edaeb04253003b93a2936a6269fc5b19f18eca3620a32cec14a59352c80f4d65f6ecd185479fedc9913baa820ddda04528734fb034dda9e34c921b8065a235b6be8acd05dc7b85f696b17a3d1ef0f8a941044a5907cdfc8589050fa708fe0f6ec1e6b210202ed76efbaa73652471bcf2a946801f9a575490fa6b347704100d758e10c986dc06404957d18972266c6e6be546e5e938ec611afccd3ed6d7c89b931a7a351849c9c6c67406e2f028bbfffa30d4dc3d62d95bc9d955c16378c8b6ec0a56f5fbd4049656e55213d2e35d66c271cc878bfa7962917af39da4b0e487d17411d6135c191fb442599fa1aae5d2a36ca7daa1c7a9da4174d0589ef4d8f41e3df80989e37f9b7be11381d612bc71dc3fa0d0321180b9f15b73ec2352f35da31f6d6cffd0ce536d4ee39e81f39fb99a10d6243d871109ea1feda7a5191bce1aaf6b2561694d33c108e81223316a2c0d5709b42be792242a4e56e421434d0d460a66cef514805556cb5bf6d3b6c771f0b68c4a888270bd09d15afc2407b92d1b43cf0c8490c0b1f52fbf33aca17cdcfeec918821e680aef6a143de999494d22a5558a54e416236c98809bdfc791f11964eefaadcf6b3753587ede73e3db4ba9eb8220ba7256dd2825fd40673bc06c2c44ed34bd7620cb2a6f69e26123573a68177dd47f1e8ab65dc9a92f2628714b492cc41a71474153c1109ed2a2eaf1a3349f003ede099b11f620b3116d5d19690ce7abc7908742f24d05d66deb2d5caa804210cdc4f5c1825d41334b285494faeddedddbc572530530e6c885a020ca58b1832ad9b0eb037afd3fa5"}) clock_gettime(0x0, &(0x7f0000000180)) mq_timedsend(r2, 0x0, 0x0, 0x1650529b, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="243d5b7edfdddd416a1fc022edbde8af9fa994239469ef6863fca790562b6e74bbd9a6e901475494d96087e1cc0000000000000000656766e143a66fad63679c38abb5"]) pipe(&(0x7f0000000280)) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000003c0)=""/87, &(0x7f00000001c0)=0x57) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:36:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='R', 0x1}], 0x1) 19:36:29 executing program 5: io_setup(0x0, &(0x7f0000000200)) r0 = socket(0x11, 0x20100080003, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000000100)="010000000000000000810df76a52387d", 0x10) [ 216.018471][ T9472] ptrace attach of "/root/syz-executor.2"[9471] was attempted by "/root/syz-executor.2"[9472] 19:36:29 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300090069000000a2e407edab008058280000007d028107a277001419000a000d000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x27d) [ 216.268869][ T9482] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 216.358483][ T9482] bridge0: port 3(hsr_slave_1) entered blocking state 19:36:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='R', 0x1}], 0x1) [ 216.404927][ T9482] bridge0: port 3(hsr_slave_1) entered disabled state 19:36:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:30 executing program 1: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000000)=""/4096, 0x1000, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) 19:36:30 executing program 5: 19:36:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x40c, 0x0, 0x0) writev(r0, &(0x7f0000000080)=[{0x0}], 0x1) 19:36:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="0900000000003639408fa3a3ba2766", 0xf}], 0x4, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x17, 0x0, @thr={&(0x7f0000000500)="b1b523979966805239267b49052771c68ad89e6524c7c7f6fce397bd4b3560b376f0d95b42dca192a6bab1e313ab505dfde0bbb9c68140b5e16d7a4e68417250c84be8b047a8d729e3d132c2f6ac676bdc9e65a1123f131171810311549223531e54365ac04ff1", &(0x7f0000000480)}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:36:30 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)='R', 0x1}], 0x1) 19:36:30 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='projid_map\x00') clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x10, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:36:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:30 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)='R', 0x1}], 0x1) 19:36:30 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ea0000008000000000cbc624877c8252c28f5e87a64820546a1ebe1f6adb3b91e7f1ffd7e4ab569f8eb9808e0b61a0bf7a301ffe8dac0773d9e5411f2b25f3fbc7cf9482c1f0d81a590e", @ANYRESDEC], 0x0, 0x5e}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:36:30 executing program 1: 19:36:30 executing program 5: 19:36:30 executing program 0: [ 217.293212][ T9539] ptrace attach of "/root/syz-executor.0"[9538] was attempted by "/root/syz-executor.0"[9539] 19:36:30 executing program 3: writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)='R', 0x1}], 0x1) 19:36:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:30 executing program 1: 19:36:33 executing program 2: 19:36:33 executing program 5: 19:36:33 executing program 0: 19:36:33 executing program 3: r0 = syz_open_procfs(0x0, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='R', 0x1}], 0x1) 19:36:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:33 executing program 1: 19:36:33 executing program 5: 19:36:33 executing program 1: 19:36:33 executing program 0: 19:36:33 executing program 3: r0 = syz_open_procfs(0x0, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='R', 0x1}], 0x1) 19:36:33 executing program 2: 19:36:33 executing program 5: 19:36:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:33 executing program 1: 19:36:33 executing program 3: r0 = syz_open_procfs(0x0, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='R', 0x1}], 0x1) 19:36:33 executing program 0: 19:36:33 executing program 5: 19:36:33 executing program 2: 19:36:33 executing program 1: 19:36:33 executing program 3: syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)='R', 0x1}], 0x1) 19:36:33 executing program 2: 19:36:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:33 executing program 0: 19:36:33 executing program 5: 19:36:33 executing program 1: 19:36:33 executing program 2: 19:36:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) read(0xffffffffffffffff, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:33 executing program 0: 19:36:34 executing program 3: syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)='R', 0x1}], 0x1) 19:36:34 executing program 5: 19:36:34 executing program 1: 19:36:34 executing program 2: 19:36:34 executing program 0: 19:36:34 executing program 3: syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)='R', 0x1}], 0x1) 19:36:34 executing program 5: 19:36:34 executing program 1: 19:36:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:34 executing program 2: 19:36:34 executing program 0: 19:36:34 executing program 5: 19:36:34 executing program 1: 19:36:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, 0x0, 0x0) 19:36:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:34 executing program 2: 19:36:34 executing program 0: 19:36:34 executing program 5: 19:36:34 executing program 1: 19:36:34 executing program 2: 19:36:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:34 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, 0x0, 0x0) 19:36:34 executing program 0: 19:36:34 executing program 5: 19:36:34 executing program 1: 19:36:34 executing program 2: 19:36:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, 0x0, 0x0) 19:36:35 executing program 0: 19:36:35 executing program 5: 19:36:35 executing program 1: 19:36:35 executing program 2: 19:36:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, &(0x7f0000000100), 0x0) 19:36:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:35 executing program 5: 19:36:35 executing program 1: 19:36:35 executing program 0: 19:36:35 executing program 2: 19:36:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:35 executing program 0: 19:36:35 executing program 5: 19:36:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, &(0x7f0000000100), 0x0) 19:36:35 executing program 1: 19:36:35 executing program 2: 19:36:35 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:35 executing program 5: 19:36:35 executing program 0: 19:36:35 executing program 2: 19:36:35 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, &(0x7f0000000100), 0x0) 19:36:35 executing program 1: 19:36:35 executing program 2: 19:36:35 executing program 2: 19:36:35 executing program 5: 19:36:35 executing program 1: 19:36:35 executing program 0: 19:36:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, &(0x7f0000000100)=[{0x0}], 0x1) 19:36:36 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:36 executing program 2: 19:36:36 executing program 5: 19:36:36 executing program 1: 19:36:36 executing program 0: 19:36:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, &(0x7f0000000100)=[{0x0}], 0x1) 19:36:36 executing program 5: 19:36:36 executing program 2: 19:36:36 executing program 1: 19:36:36 executing program 0: 19:36:36 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:36 executing program 0: 19:36:36 executing program 5: 19:36:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, &(0x7f0000000100)=[{0x0}], 0x1) 19:36:36 executing program 1: 19:36:36 executing program 2: 19:36:36 executing program 5: 19:36:36 executing program 0: 19:36:36 executing program 1: 19:36:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, &(0x7f0000000100)=[{}], 0x1) 19:36:36 executing program 5: 19:36:36 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:36 executing program 0: 19:36:36 executing program 2: 19:36:36 executing program 1: 19:36:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, &(0x7f0000000100)=[{}], 0x1) 19:36:37 executing program 5: 19:36:37 executing program 0: 19:36:37 executing program 2: 19:36:37 executing program 1: 19:36:37 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:37 executing program 0: 19:36:37 executing program 5: 19:36:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') writev(r0, &(0x7f0000000100)=[{}], 0x1) 19:36:37 executing program 2: 19:36:37 executing program 1: 19:36:37 executing program 5: 19:36:37 executing program 2: 19:36:37 executing program 0: 19:36:37 executing program 3: 19:36:37 executing program 1: 19:36:37 executing program 5: 19:36:37 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:37 executing program 2: 19:36:37 executing program 0: 19:36:37 executing program 3: 19:36:37 executing program 5: 19:36:37 executing program 1: 19:36:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000000000000000000063110400000000009500000000000000"], &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 19:36:38 executing program 0: syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x1, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0}) 19:36:38 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8990, &(0x7f0000000300)={'ip6tnl0\x00'}) 19:36:38 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:38 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="d3ccb93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYBLOB="e6c55c5d9eb82ee4510100010029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887050000000000000087e940b30eecd4f9ad0300", @ANYRESDEC], 0x0, 0x77}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:36:38 executing program 1: 19:36:38 executing program 2: [ 225.019703][ T9860] debugfs: File '9853' in directory 'proc' already present! 19:36:38 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000003c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x14, r1, 0xb21}, 0x14}}, 0x0) 19:36:38 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="6653a8990785363940aed12f0000db2f00000022f1f169a4000000000000009f1f8175442ce71022fe50377a22cbccb0353cffd7a7c0c92465e5f9cc2d3fbf0322168078aba9d7ae45b0051a1221af2772a9567bb821942ce72590f1bf41d20d4c000000279bd612811df1fcaa94a96d58db92af7f9298918ae95b745777a1968e48d46358c8735e3b009f9d01000000000000005b5895e126de3d6d7c6949", 0x9f}], 0x4, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 225.102913][ T9870] ptrace attach of "/root/syz-executor.5"[9869] was attempted by "/root/syz-executor.5"[9870] [ 225.122855][ T9860] debugfs: File '9853' in directory 'proc' already present! 19:36:38 executing program 5: r0 = gettid() clone(0x3fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) wait4(0x0, 0x0, 0x0, 0x0) 19:36:38 executing program 0: setxattr$trusted_overlay_opaque(0x0, 0x0, &(0x7f0000000100)='y\x00', 0x2, 0x2) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b80)=ANY=[@ANYBLOB], 0x1) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f0000000000)=0x4480200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0x175d900f) 19:36:38 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:38 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000140)='./file0\x00', 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000200)={'bridge_slave_0\x00'}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000040)='./file0\x00', r5, r7) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30005, 0x0) [ 225.316872][ T9878] ptrace attach of "/root/syz-executor.1"[9877] was attempted by "/root/syz-executor.1"[9878] 19:36:38 executing program 1: r0 = gettid() clone(0x3fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) wait4(0x0, 0x0, 0x0, 0x0) 19:36:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) 19:36:38 executing program 1: r0 = gettid() mremap(&(0x7f0000182000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f00000be000/0x2000)=nil) process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x35c}], 0x329, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x299, 0x0) 19:36:38 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x2ee, 0x0, 0xf3a0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) preadv(r0, &(0x7f00000017c0), 0x33d, 0x0) 19:36:38 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) read(r1, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:38 executing program 5: clone(0x41f3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000200)) ptrace(0x10, r0) ptrace$setsig(0x4203, r0, 0x0, &(0x7f0000000000)) 19:36:38 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0x1, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) dup2(r2, r0) r3 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x4c, 0x0, &(0x7f0000000700)=[@acquire, @transaction={0x40406300, {0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 19:36:38 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0xb0ff20, 0x1, 0x11, r0, 0x0) 19:36:38 executing program 3: 19:36:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:39 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x41c0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01, 0x54}, 0x3f00) close(r1) [ 225.891523][ T9927] binder_alloc: binder_alloc_mmap_handler: 9922 20ffb000-21b0b000 already mapped failed -16 [ 225.921232][ T9931] debugfs: File '9926' in directory 'proc' already present! [ 225.932394][ T9931] binder_alloc: 9926: binder_alloc_buf, no vma [ 225.966794][ T9934] binder_alloc: binder_alloc_mmap_handler: 9922 20ffb000-21b0b000 already mapped failed -16 19:36:39 executing program 2: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') creat(&(0x7f00000002c0)='./file0\x00', 0x0) unlink(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') socketpair(0x0, 0x0, 0x0, 0x0) 19:36:39 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0x1, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) dup2(r2, r0) r3 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x4c, 0x0, &(0x7f0000000700)=[@acquire, @transaction={0x40406300, {0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 19:36:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @remote}}}, 0x84) socket$unix(0x1, 0x2, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) dup3(r2, r3, 0x0) dup2(r3, r4) [ 226.313526][ T9949] debugfs: File '9946' in directory 'proc' already present! [ 226.347226][ T9949] binder_alloc: 9946: binder_alloc_buf, no vma 19:36:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:39 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0x1, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) dup2(r2, r0) r3 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x4c, 0x0, &(0x7f0000000700)=[@acquire, @transaction={0x40406300, {0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 226.548438][ T9956] debugfs: File '9955' in directory 'proc' already present! 19:36:39 executing program 5: write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000080)={0xffffffffffffffff, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1b5f071ae22a383e, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000003000/0x2000)=nil, &(0x7f0000007000/0x3000)=nil, &(0x7f0000008000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000009000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0}, 0x68) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f00000000c0)=0x1, 0x4) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f0000000340)=""/61, 0x3d}], 0x1, &(0x7f0000002540)=[{&(0x7f00000003c0)=""/63, 0x7ffff002}], 0x2, 0x0) 19:36:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000004a00)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000400)="bdd2d070540b5a55ec997994918ebb20f2a21d462d46ff038a0fda54541150ee", 0x20}], 0x1, &(0x7f0000000280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) 19:36:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r3, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r3, 0x0) 19:36:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:39 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000200)={0x1, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="05630440"], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) dup2(r2, r0) r3 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x4c, 0x0, &(0x7f0000000700)=[@acquire, @transaction={0x40406300, {0x1, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 226.858010][ T9981] debugfs: File '9978' in directory 'proc' already present! [ 226.900867][ T9979] ptrace attach of "/root/syz-executor.5"[8839] was attempted by " 0 p     @ ="[99 19:36:40 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x41c0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01, 0x54}, 0x3f00) close(r1) 19:36:40 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x4) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x2, 0x74}, &(0x7f0000000800)='])+\xe4\x00\x19I0z\xf9\xdc~\xb0\xba\r\x9f\xf1q\xe5\x19\xa3\xf4R\xf6yae+\xa1\xbc\x1dqP\xcd|\xbf(\xe0L\x87\xbf\xc26\xaa\xf2Hb\xa7\xae\xd7\xb9\xfb\xf1+\xea\xd6\xfa\xf9\xc4}\xb6\x14{\x91\x86B\xbc\x91\x9d:\xedx\x1fIK B\xd8@\xe7\xa9\xc8\xdd)\x91.\x83\xbfo\xa0\a\xb5&\xfd\xb5W\x8f\xfeN\xeaH\xf8\xc3%<\x7f\xdc\xa9\xa6Uua\xaf\xc6L\xbd\xbfz@z\x84`\x8e\xa4\x1b\x82\xb0\x99Oe\xde\v\xd3\xadg\x96\xf0g\v\x8f_\x94\xda\xbd\xf9\x80\xb4\xd0C\xdd<\x96\xea\x98\x7f\xb3', 0x0) 19:36:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r3, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r3, 0x0) 19:36:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:40 executing program 5: getpid() sched_setscheduler(0x0, 0x5, &(0x7f00000001c0)) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl(0xffffffffffffffff, 0x1000001000008912, &(0x7f0000000080)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r4 = open(&(0x7f0000000600)='./bus\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000640), 0x10000011b) close(r3) [ 226.902061][ T9977] ptrace attach of "/root/syz-executor.5"[8839] was attempted by " 0 p     @ ="[99 [ 226.926125][ T9981] binder_alloc: 9978: binder_alloc_buf, no vma 19:36:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="25bca274769e7c0aa734fa0095e0612687463915e38802a9d8aea872943afd874e2f98b479a7316270146d0e0af8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@inode_readahead_blks={'inode_readahead_blks'}}]}) 19:36:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000140)={{0x77359400}, {0x0, 0x989680}}, 0x0) read(r0, &(0x7f0000000000)=""/143, 0x8f) 19:36:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r3, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r3, 0x0) 19:36:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) [ 227.348168][T10007] EXT4-fs (loop0): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:36:40 executing program 5: r0 = socket$isdn_base(0x22, 0x3, 0x0) r1 = socket$isdn_base(0x22, 0x3, 0x0) dup3(r0, r1, 0x0) 19:36:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000140)={{0x77359400}, {0x0, 0x989680}}, 0x0) read(r0, &(0x7f0000000000)=""/143, 0x8f) [ 227.467435][T10015] EXT4-fs (loop0): Unsupported filesystem blocksize 0 (1923657432 log_block_size) 19:36:40 executing program 0: write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="580000007d0000000051000000000000000000000000000000000000000000006049c7d4be380000000000390000000000000a002f6465762f70746d780003007b59260a002f64214fa1ab743118"], 0x4e) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0) r0 = getpgrp(0xffffffffffffffff) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x1, 0x0, 0x0, 0x5}, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000100), 0x0) 19:36:41 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(r1) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x41c0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xfffffc61) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x2000012e}], 0x1, 0x0, 0xd01, 0x54}, 0x3f00) close(r1) 19:36:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r3, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r3, 0x0) 19:36:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:41 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 19:36:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b0071") r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$rose(r1, 0x104, 0x6, &(0x7f0000000200), &(0x7f0000000140)=0x4) 19:36:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r3, 0x0) 19:36:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x10000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x7e00000000000000) 19:36:41 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/63, 0x3f}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$packet(0x11, 0x0, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) read(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f00000005c0)={&(0x7f0000000340)=@hci, 0x80, &(0x7f0000000240)=[{&(0x7f0000000480)=""/169, 0xa9}, {0x0}], 0x2, &(0x7f0000001640)=""/196, 0xc4}, 0x0) 19:36:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r3, 0x0) 19:36:41 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/63, 0x3f}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$packet(0x11, 0x0, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) read(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f00000005c0)={&(0x7f0000000340)=@hci, 0x80, &(0x7f0000000240)=[{&(0x7f0000000480)=""/169, 0xa9}, {0x0}], 0x2, &(0x7f0000001640)=""/196, 0xc4}, 0x0) [ 228.544724][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 228.551034][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:36:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 228.784641][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 228.790849][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 228.954666][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 228.960544][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 229.025856][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 229.032723][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:36:42 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) syz_genetlink_get_family_id$tipc(0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f00000001c0)) setuid(0x0) wait4(0x0, &(0x7f00000000c0), 0x6000000a, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0xfd, 0x0, 0xe8}]}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x2a) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, &(0x7f0000000080), 0x9001) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="d80000001900310e0000000000000000ac1e0001000000000000000000000000000100000000000000000a00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/72], 0x4}, 0x8}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x8000001b, &(0x7f0000002400)={@local}, &(0x7f0000002440)=0xf) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002980)={'ip6gretap0\x00'}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000002a80)={'rose0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002b40)={@loopback}, &(0x7f0000002b80)=0x14) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendmsg$nl_netfilter(r5, 0x0, 0x0) accept4$packet(r2, 0x0, &(0x7f0000002e00), 0x800) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, 0x0, &(0x7f0000002f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000003000)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000003100)=0xe8) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0xa4bcd6ca7f9c8017) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000cc0)={{{@in=@multicast1, @in=@remote}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xfd8d) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getpeername$packet(r2, &(0x7f0000003840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003880)=0x14) open(&(0x7f00000007c0)='./file0\x00', 0x0, 0x0) accept4$packet(r2, 0x0, &(0x7f00000045c0), 0x800) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) sendto$inet(r3, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x3cb) setsockopt$sock_int(r3, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r3, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 19:36:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r3, 0x0) 19:36:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:42 executing program 1: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0xa10, r0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x60e, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x10, r1, 0x0) 19:36:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000100)='./control\x00', 0x0, 0x0) faccessat(r1, &(0x7f000003fff6)='./control\x00', 0x7, 0x0) 19:36:42 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x13012, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000180)=""/63, 0x3f}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$packet(0x11, 0x0, 0x300) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) read(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) recvmsg(r1, &(0x7f00000005c0)={&(0x7f0000000340)=@hci, 0x80, &(0x7f0000000240)=[{&(0x7f0000000480)=""/169, 0xa9}, {0x0}], 0x2, &(0x7f0000001640)=""/196, 0xc4}, 0x0) 19:36:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, 0xffffffffffffffff, 0x0) 19:36:42 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 19:36:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffff") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:42 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000002800)={@random="7525820aedb8", @empty=[0x0, 0x0, 0x14], [{}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0xfffffffffffffee3}}}}}, 0x0) [ 229.345880][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 229.352807][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:36:42 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000002800)={@random="7525820aedb8", @empty=[0x0, 0x0, 0x14], [{}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0xfffffffffffffee3}}}}}, 0x0) 19:36:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, 0xffffffffffffffff, 0x0) [ 229.637306][ T2510] blk_update_request: I/O error, dev loop10, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 229.669680][T10098] F2FS-fs (loop10): Unable to read 1th superblock [ 229.686660][ T2509] blk_update_request: I/O error, dev loop10, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 229.699581][T10098] F2FS-fs (loop10): Unable to read 2th superblock 19:36:43 executing program 3: 19:36:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, 0xffffffffffffffff, 0x0) 19:36:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="600000002400070500"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) 19:36:43 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000002800)={@random="7525820aedb8", @empty=[0x0, 0x0, 0x14], [{}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0xfffffffffffffee3}}}}}, 0x0) 19:36:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffff") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:43 executing program 5: 19:36:43 executing program 5: 19:36:43 executing program 3: 19:36:43 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000002800)={@random="7525820aedb8", @empty=[0x0, 0x0, 0x14], [{}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0xfffffffffffffee3}}}}}, 0x0) 19:36:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r2, 0x0) 19:36:43 executing program 0: 19:36:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffff") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:43 executing program 5: 19:36:43 executing program 3: 19:36:43 executing program 0: 19:36:43 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 19:36:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r2, 0x0) 19:36:43 executing program 5: 19:36:44 executing program 3: 19:36:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:44 executing program 0: 19:36:44 executing program 5: 19:36:44 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 19:36:44 executing program 3: 19:36:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) r2 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r2, 0x0) 19:36:44 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 19:36:44 executing program 0: 19:36:44 executing program 3: 19:36:44 executing program 5: 19:36:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r0, 0x0) 19:36:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:44 executing program 3: 19:36:44 executing program 0: 19:36:44 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000002800)={@random="7525820aedb8", @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 19:36:44 executing program 5: 19:36:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r0, 0x0) 19:36:44 executing program 3: 19:36:44 executing program 0: 19:36:44 executing program 5: 19:36:44 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000002800)={@random="7525820aedb8", @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 19:36:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r0, 0x0) 19:36:44 executing program 3: 19:36:44 executing program 0: 19:36:45 executing program 5: 19:36:45 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000002800)={@random="7525820aedb8", @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 19:36:45 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r1, 0x0) 19:36:45 executing program 0: [ 232.018736][T10248] ================================================================== [ 232.027242][T10248] BUG: KASAN: use-after-free in nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 232.035577][T10248] Read of size 1 at addr ffff88809780ea04 by task syz-executor.1/10248 [ 232.043812][T10248] [ 232.046163][T10248] CPU: 0 PID: 10248 Comm: syz-executor.1 Not tainted 5.4.0-rc4-next-20191025 #0 [ 232.055175][T10248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.055183][T10248] Call Trace: [ 232.055205][T10248] dump_stack+0x172/0x1f0 [ 232.055222][T10248] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 232.055242][T10248] print_address_description.constprop.0.cold+0xd4/0x30b [ 232.055260][T10248] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 232.091963][T10248] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 232.097964][T10248] __kasan_report.cold+0x1b/0x41 [ 232.102916][T10248] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 232.108915][T10248] kasan_report+0x12/0x20 [ 232.113241][T10248] __asan_report_load1_noabort+0x14/0x20 [ 232.118960][T10248] nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 232.124781][T10248] ? nf_ct_expect_unregister_notifier+0x140/0x140 [ 232.124796][T10248] ? nf_nat_inet_fn+0x211/0x8b0 [ 232.124814][T10248] nf_confirm+0x3d8/0x4d0 [ 232.124835][T10248] ipv4_confirm+0x14c/0x240 [ 232.144911][T10248] nf_hook_slow+0xbc/0x1e0 [ 232.149340][T10248] ip_local_deliver+0x352/0x520 [ 232.154197][T10248] ? ip_local_deliver_finish+0x380/0x380 [ 232.159845][T10248] ? ip_protocol_deliver_rcu+0x880/0x880 19:36:45 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r1, 0x0) 19:36:45 executing program 0: [ 232.165657][T10248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.171916][T10248] ? __this_cpu_preempt_check+0x35/0x190 [ 232.177585][T10248] ip_sublist_rcv_finish+0x9b/0x2d0 [ 232.182805][T10248] ip_sublist_rcv+0x27d/0x940 [ 232.187508][T10248] ? ip_rcv_finish+0x2f0/0x2f0 [ 232.192303][T10248] ? ip_rcv_finish_core.isra.0+0x1b70/0x1b70 [ 232.198332][T10248] ? ip_rcv_core.isra.0+0x878/0xc80 [ 232.203791][T10248] ip_list_rcv+0x370/0x4ac [ 232.208223][T10248] ? ip_rcv+0x3f0/0x3f0 [ 232.212402][T10248] ? ip_rcv+0x3f0/0x3f0 [ 232.216580][T10248] __netif_receive_skb_list_core+0x5fc/0x9d0 [ 232.222581][T10248] ? ktime_get_with_offset+0x135/0x360 [ 232.228153][T10248] ? ktime_get_with_offset+0x135/0x360 [ 232.233634][T10248] ? process_backlog+0x750/0x750 [ 232.238592][T10248] ? lock_acquire+0x190/0x410 [ 232.243287][T10248] ? __kasan_check_read+0x11/0x20 [ 232.248330][T10248] netif_receive_skb_list_internal+0x7eb/0xe50 [ 232.254508][T10248] ? __netif_receive_skb_list_core+0x9d0/0x9d0 [ 232.260690][T10248] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 19:36:45 executing program 0: 19:36:45 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r1, 0x0) [ 232.266977][T10248] ? eth_type_trans+0x3a5/0x760 [ 232.271845][T10248] gro_normal_list.part.0+0x1e/0xb0 [ 232.277051][T10248] gro_normal_one+0x184/0x1d0 [ 232.281738][T10248] napi_gro_frags+0x915/0xd00 [ 232.286428][T10248] tun_get_user+0x2e8e/0x3f80 [ 232.291113][T10248] ? __kasan_check_read+0x11/0x20 [ 232.296163][T10248] ? tun_build_skb.isra.0+0x1380/0x1380 [ 232.301723][T10248] ? rcu_read_lock_held+0x9c/0xb0 [ 232.306767][T10248] ? __kasan_check_read+0x11/0x20 [ 232.311805][T10248] tun_chr_write_iter+0xbd/0x156 [ 232.316753][T10248] do_iter_readv_writev+0x5f8/0x8f0 [ 232.321973][T10248] ? no_seek_end_llseek_size+0x70/0x70 [ 232.327533][T10248] ? apparmor_file_permission+0x25/0x30 [ 232.333101][T10248] ? rw_verify_area+0x126/0x360 [ 232.337968][T10248] do_iter_write+0x184/0x610 [ 232.342553][T10248] ? dup_iter+0x260/0x260 [ 232.346898][T10248] vfs_writev+0x1b3/0x2f0 [ 232.351232][T10248] ? vfs_iter_write+0xb0/0xb0 [ 232.355903][T10248] ? __kasan_check_read+0x11/0x20 [ 232.355928][T10248] ? ksys_dup3+0x3e0/0x3e0 [ 232.355947][T10248] ? __kasan_check_read+0x11/0x20 [ 232.355963][T10248] ? __fget_light+0x1a9/0x230 [ 232.375252][T10248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.381518][T10248] do_writev+0x15b/0x330 [ 232.385785][T10248] ? vfs_writev+0x2f0/0x2f0 [ 232.390309][T10248] ? do_syscall_64+0x26/0x760 [ 232.394998][T10248] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.401085][T10248] ? do_syscall_64+0x26/0x760 [ 232.405810][T10248] __x64_sys_writev+0x75/0xb0 [ 232.411377][T10248] do_syscall_64+0xfa/0x760 [ 232.415900][T10248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.421808][T10248] RIP: 0033:0x459df1 [ 232.425747][T10248] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 232.445362][T10248] RSP: 002b:00007f00025eeba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 232.453780][T10248] RAX: ffffffffffffffda RBX: 000000000000002a RCX: 0000000000459df1 [ 232.453799][T10248] RDX: 0000000000000001 RSI: 00007f00025eec00 RDI: 00000000000000f0 [ 232.470279][T10248] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 232.478255][T10248] R10: 00007f00025ef9d0 R11: 0000000000000293 R12: 00007f00025ef6d4 [ 232.478270][T10248] R13: 00000000004c9352 R14: 00000000004e0a60 R15: 00000000ffffffff [ 232.494223][T10248] [ 232.496562][T10248] Allocated by task 10248: [ 232.500981][T10248] save_stack+0x23/0x90 [ 232.505161][T10248] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 232.510808][T10248] kasan_krealloc+0x84/0xc0 [ 232.515324][T10248] krealloc+0xa6/0xd0 19:36:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b505ffffcfe87b00") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000380)=""/225, 0x7fffa405) 19:36:45 executing program 0: 19:36:45 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000100)='/dev/nbd#\x00', 0x5) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r3, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3002, 0x0, 0x5011, r3, 0x0) [ 232.519319][T10248] nf_ct_ext_add+0x2c7/0x630 [ 232.523920][T10248] init_conntrack.isra.0+0x5ed/0x11a0 [ 232.529308][T10248] nf_conntrack_in+0xd94/0x1460 [ 232.534168][T10248] ipv4_conntrack_in+0x1e/0x30 [ 232.538950][T10248] nf_hook_slow+0xbc/0x1e0 [ 232.543380][T10248] nf_hook_slow_list+0x1d9/0x480 [ 232.548328][T10248] ip_sublist_rcv+0x66e/0x940 [ 232.553016][T10248] ip_list_rcv+0x370/0x4ac [ 232.557444][T10248] __netif_receive_skb_list_core+0x5fc/0x9d0 [ 232.563430][T10248] netif_receive_skb_list_internal+0x7eb/0xe50 [ 232.563447][T10248] gro_normal_list.part.0+0x1e/0xb0 [ 232.575055][T10248] gro_normal_one+0x184/0x1d0 [ 232.579745][T10248] napi_gro_frags+0x915/0xd00 [ 232.584455][T10248] tun_get_user+0x2e8e/0x3f80 [ 232.589135][T10248] tun_chr_write_iter+0xbd/0x156 [ 232.594079][T10248] do_iter_readv_writev+0x5f8/0x8f0 [ 232.599277][T10248] do_iter_write+0x184/0x610 [ 232.599287][T10248] vfs_writev+0x1b3/0x2f0 [ 232.599297][T10248] do_writev+0x15b/0x330 [ 232.599307][T10248] __x64_sys_writev+0x75/0xb0 [ 232.599325][T10248] do_syscall_64+0xfa/0x760 [ 232.621603][T10248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.627493][T10248] [ 232.629849][T10248] Freed by task 10248: [ 232.633927][T10248] save_stack+0x23/0x90 [ 232.638085][T10248] __kasan_slab_free+0x102/0x150 [ 232.643029][T10248] kasan_slab_free+0xe/0x10 [ 232.647536][T10248] kfree+0x10a/0x2c0 [ 232.651437][T10248] nf_ct_ext_destroy+0x2ab/0x2e0 [ 232.651453][T10248] nf_conntrack_free+0x8f/0xe0 [ 232.661483][T10248] destroy_conntrack+0x1a2/0x270 [ 232.666430][T10248] nf_conntrack_destroy+0xed/0x230 [ 232.671545][T10248] __nf_conntrack_confirm+0x21ca/0x2830 [ 232.677084][T10248] nf_confirm+0x3e7/0x4d0 [ 232.681422][T10248] ipv4_confirm+0x14c/0x240 [ 232.685935][T10248] nf_hook_slow+0xbc/0x1e0 [ 232.690355][T10248] ip_local_deliver+0x352/0x520 [ 232.695231][T10248] ip_sublist_rcv_finish+0x9b/0x2d0 [ 232.695241][T10248] ip_sublist_rcv+0x27d/0x940 [ 232.695251][T10248] ip_list_rcv+0x370/0x4ac [ 232.695262][T10248] __netif_receive_skb_list_core+0x5fc/0x9d0 [ 232.695277][T10248] netif_receive_skb_list_internal+0x7eb/0xe50 [ 232.721659][T10248] gro_normal_list.part.0+0x1e/0xb0 [ 232.726871][T10248] gro_normal_one+0x184/0x1d0 [ 232.731560][T10248] napi_gro_frags+0x915/0xd00 [ 232.736265][T10248] tun_get_user+0x2e8e/0x3f80 [ 232.736277][T10248] tun_chr_write_iter+0xbd/0x156 [ 232.736289][T10248] do_iter_readv_writev+0x5f8/0x8f0 [ 232.736299][T10248] do_iter_write+0x184/0x610 [ 232.736313][T10248] vfs_writev+0x1b3/0x2f0 [ 232.760155][T10248] do_writev+0x15b/0x330 [ 232.760168][T10248] __x64_sys_writev+0x75/0xb0 [ 232.760182][T10248] do_syscall_64+0xfa/0x760 [ 232.760201][T10248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.779458][T10248] [ 232.781795][T10248] The buggy address belongs to the object at ffff88809780ea00 [ 232.781795][T10248] which belongs to the cache kmalloc-128 of size 128 [ 232.795853][T10248] The buggy address is located 4 bytes inside of [ 232.795853][T10248] 128-byte region [ffff88809780ea00, ffff88809780ea80) [ 232.795859][T10248] The buggy address belongs to the page: [ 232.795871][T10248] page:ffffea00025e0380 refcount:1 mapcount:0 mapping:ffff8880aa400700 index:0x0 [ 232.795888][T10248] flags: 0x1fffc0000000200(slab) [ 232.795910][T10248] raw: 01fffc0000000200 ffffea000267eb48 ffffea00025dc308 ffff8880aa400700 [ 232.837347][T10248] raw: 0000000000000000 ffff88809780e000 0000000100000010 0000000000000000 [ 232.837354][T10248] page dumped because: kasan: bad access detected [ 232.837359][T10248] [ 232.837362][T10248] Memory state around the buggy address: [ 232.837372][T10248] ffff88809780e900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 19:36:46 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000004a00)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000400)="bdd2d070540b5a55ec997994918ebb20f2a21d462d46ff038a0fda54541150ee8c806a284615000003dfac9a1ffd7ddb", 0x30}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) [ 232.837382][T10248] ffff88809780e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 232.837399][T10248] >ffff88809780ea00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 232.885253][T10248] ^ [ 232.889332][T10248] ffff88809780ea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 232.897521][T10248] ffff88809780eb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 232.905595][T10248] ================================================================== [ 232.905601][T10248] Disabling lock debugging due to kernel taint [ 232.905696][T10248] Kernel panic - not syncing: panic_on_warn set ... [ 232.926412][T10248] CPU: 0 PID: 10248 Comm: syz-executor.1 Tainted: G B 5.4.0-rc4-next-20191025 #0 [ 232.930972][ T3920] kobject: 'loop3' (000000007fda1115): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 232.936833][T10248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.936839][T10248] Call Trace: [ 232.936858][T10248] dump_stack+0x172/0x1f0 [ 232.936876][T10248] panic+0x2e3/0x75c [ 232.936892][T10248] ? add_taint.cold+0x16/0x16 [ 232.973225][T10248] ? retint_kernel+0x2b/0x2b [ 232.977832][T10248] ? trace_hardirqs_on+0x5e/0x240 [ 232.982879][T10248] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 232.988875][T10248] end_report+0x47/0x4f [ 232.993049][T10248] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 232.998670][ T3920] kobject: 'loop3' (000000007fda1115): kobject_uevent_env [ 232.999051][T10248] __kasan_report.cold+0xe/0x41 [ 233.007842][ T3920] kobject: 'loop3' (000000007fda1115): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:36:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a9119aad5265df5cf1cdd8b43", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000004a00)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000400)="bdd2d070540b5a55ec997994918ebb20f2a21d462d46ff038a0fda54541150ee8c806a284615000003dfac9a1ffd7ddb", 0x30}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000180)=""/176, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) [ 233.011085][T10248] ? nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 233.011106][T10248] kasan_report+0x12/0x20 [ 233.031972][T10248] __asan_report_load1_noabort+0x14/0x20 [ 233.037618][T10248] nf_ct_deliver_cached_events+0x5c3/0x6d0 [ 233.043431][T10248] ? nf_ct_expect_unregister_notifier+0x140/0x140 [ 233.049851][T10248] ? nf_nat_inet_fn+0x211/0x8b0 [ 233.054719][T10248] nf_confirm+0x3d8/0x4d0 [ 233.057577][ T3920] kobject: 'loop5' (00000000eb131c04): kobject_uevent_env [ 233.059103][T10248] ipv4_confirm+0x14c/0x240 [ 233.070700][T10248] nf_hook_slow+0xbc/0x1e0 [ 233.070709][ T3920] kobject: 'loop5' (00000000eb131c04): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 233.085281][T10248] ip_local_deliver+0x352/0x520 [ 233.090145][T10248] ? ip_local_deliver_finish+0x380/0x380 [ 233.095972][T10248] ? ip_protocol_deliver_rcu+0x880/0x880 [ 233.101615][T10248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.107899][T10248] ? __this_cpu_preempt_check+0x35/0x190 [ 233.113551][T10248] ip_sublist_rcv_finish+0x9b/0x2d0 [ 233.116326][ T3920] kobject: 'loop5' (00000000eb131c04): kobject_uevent_env [ 233.118773][T10248] ip_sublist_rcv+0x27d/0x940 [ 233.127317][ T3920] kobject: 'loop5' (00000000eb131c04): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 233.130537][T10248] ? ip_rcv_finish+0x2f0/0x2f0 [ 233.130557][T10248] ? ip_rcv_finish_core.isra.0+0x1b70/0x1b70 [ 233.151562][T10248] ? ip_rcv_core.isra.0+0x878/0xc80 [ 233.156791][T10248] ip_list_rcv+0x370/0x4ac [ 233.161223][T10248] ? ip_rcv+0x3f0/0x3f0 [ 233.165390][T10248] ? ip_rcv+0x3f0/0x3f0 [ 233.169548][T10248] __netif_receive_skb_list_core+0x5fc/0x9d0 [ 233.175519][T10248] ? ktime_get_with_offset+0x135/0x360 [ 233.181016][T10248] ? ktime_get_with_offset+0x135/0x360 [ 233.186475][T10248] ? process_backlog+0x750/0x750 [ 233.191410][T10248] ? lock_acquire+0x190/0x410 [ 233.196079][T10248] ? __kasan_check_read+0x11/0x20 [ 233.201233][T10248] netif_receive_skb_list_internal+0x7eb/0xe50 [ 233.207395][T10248] ? __netif_receive_skb_list_core+0x9d0/0x9d0 [ 233.213723][T10248] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 233.220419][T10248] ? eth_type_trans+0x3a5/0x760 [ 233.225286][T10248] gro_normal_list.part.0+0x1e/0xb0 [ 233.230521][T10248] gro_normal_one+0x184/0x1d0 [ 233.235184][T10248] napi_gro_frags+0x915/0xd00 [ 233.239855][T10248] tun_get_user+0x2e8e/0x3f80 [ 233.244556][T10248] ? __kasan_check_read+0x11/0x20 [ 233.249594][T10248] ? tun_build_skb.isra.0+0x1380/0x1380 [ 233.256003][T10248] ? rcu_read_lock_held+0x9c/0xb0 [ 233.261012][T10248] ? __kasan_check_read+0x11/0x20 [ 233.266043][T10248] tun_chr_write_iter+0xbd/0x156 [ 233.270981][T10248] do_iter_readv_writev+0x5f8/0x8f0 [ 233.276175][T10248] ? no_seek_end_llseek_size+0x70/0x70 [ 233.281624][T10248] ? apparmor_file_permission+0x25/0x30 [ 233.287174][T10248] ? rw_verify_area+0x126/0x360 [ 233.292009][T10248] do_iter_write+0x184/0x610 [ 233.296584][T10248] ? dup_iter+0x260/0x260 [ 233.300901][T10248] vfs_writev+0x1b3/0x2f0 [ 233.305217][T10248] ? vfs_iter_write+0xb0/0xb0 [ 233.309876][T10248] ? __kasan_check_read+0x11/0x20 [ 233.314889][T10248] ? ksys_dup3+0x3e0/0x3e0 [ 233.319291][T10248] ? __kasan_check_read+0x11/0x20 [ 233.324300][T10248] ? __fget_light+0x1a9/0x230 [ 233.328959][T10248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 233.335196][T10248] do_writev+0x15b/0x330 [ 233.339422][T10248] ? vfs_writev+0x2f0/0x2f0 [ 233.343931][T10248] ? do_syscall_64+0x26/0x760 [ 233.348592][T10248] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.354644][T10248] ? do_syscall_64+0x26/0x760 [ 233.359309][T10248] __x64_sys_writev+0x75/0xb0 [ 233.363988][T10248] do_syscall_64+0xfa/0x760 [ 233.368490][T10248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.374373][T10248] RIP: 0033:0x459df1 [ 233.378256][T10248] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 e4 b7 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 233.397941][T10248] RSP: 002b:00007f00025eeba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 233.406339][T10248] RAX: ffffffffffffffda RBX: 000000000000002a RCX: 0000000000459df1 [ 233.414312][T10248] RDX: 0000000000000001 RSI: 00007f00025eec00 RDI: 00000000000000f0 [ 233.422265][T10248] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 233.430228][T10248] R10: 00007f00025ef9d0 R11: 0000000000000293 R12: 00007f00025ef6d4 [ 233.438189][T10248] R13: 00000000004c9352 R14: 00000000004e0a60 R15: 00000000ffffffff [ 233.447610][T10248] Kernel Offset: disabled [ 233.451997][T10248] Rebooting in 86400 seconds..