Warning: Permanently added '10.128.10.2' (ECDSA) to the list of known hosts. 2019/07/23 10:53:42 fuzzer started 2019/07/23 10:53:45 dialing manager at 10.128.0.26:46267 2019/07/23 10:53:45 syscalls: 2467 2019/07/23 10:53:45 code coverage: enabled 2019/07/23 10:53:45 comparison tracing: enabled 2019/07/23 10:53:45 extra coverage: extra coverage is not supported by the kernel 2019/07/23 10:53:45 setuid sandbox: enabled 2019/07/23 10:53:45 namespace sandbox: enabled 2019/07/23 10:53:45 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/23 10:53:45 fault injection: enabled 2019/07/23 10:53:45 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/23 10:53:45 net packet injection: enabled 2019/07/23 10:53:45 net device setup: enabled 10:56:05 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2d, &(0x7f00000000c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) syzkaller login: [ 218.464183][ T8860] IPVS: ftp: loaded support on port[0] = 21 10:56:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000000)={0x0, 0x1624, &(0x7f0000000040)=[{&(0x7f0000000600)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 218.578724][ T8860] chnl_net:caif_netlink_parms(): no params data found [ 218.640971][ T8860] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.648185][ T8860] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.656511][ T8860] device bridge_slave_0 entered promiscuous mode [ 218.704698][ T8860] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.711806][ T8860] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.734193][ T8860] device bridge_slave_1 entered promiscuous mode [ 218.762394][ T8863] IPVS: ftp: loaded support on port[0] = 21 [ 218.774966][ T8860] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 218.785907][ T8860] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 10:56:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000000)={0x0, 0x3000000, &(0x7f0000000040)=[{&(0x7f0000000600)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 218.815666][ T8860] team0: Port device team_slave_0 added [ 218.824380][ T8860] team0: Port device team_slave_1 added [ 218.976630][ T8860] device hsr_slave_0 entered promiscuous mode 10:56:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000500)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_int(r0, 0x29, 0x6, &(0x7f00000000c0), 0xfdcc) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000), 0x4) [ 219.064282][ T8860] device hsr_slave_1 entered promiscuous mode [ 219.165237][ T8865] IPVS: ftp: loaded support on port[0] = 21 [ 219.179444][ T8867] IPVS: ftp: loaded support on port[0] = 21 [ 219.192768][ T8860] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.200033][ T8860] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.207859][ T8860] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.214973][ T8860] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.374779][ T8863] chnl_net:caif_netlink_parms(): no params data found 10:56:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x11c, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x40505330, &(0x7f0000000280)={0x31b}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)}}, 0x20) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) socket$inet(0x10, 0x3, 0x0) [ 219.475217][ T8867] chnl_net:caif_netlink_parms(): no params data found [ 219.503097][ T8860] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.541705][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.578951][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.610911][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.627261][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 219.658835][ T8860] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.666280][ T8863] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.673550][ T8863] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.681594][ T8863] device bridge_slave_0 entered promiscuous mode [ 219.738636][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.747494][ T3008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.755997][ T3008] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.763056][ T3008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.770916][ T8863] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.778084][ T8863] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.786188][ T8863] device bridge_slave_1 entered promiscuous mode [ 219.800130][ T8875] IPVS: ftp: loaded support on port[0] = 21 [ 219.815143][ T8865] chnl_net:caif_netlink_parms(): no params data found [ 219.858032][ T8867] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.865228][ T8867] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.875910][ T8867] device bridge_slave_0 entered promiscuous mode [ 219.897609][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.906524][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.915036][ T2623] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.922099][ T2623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.929811][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.939587][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.948457][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 10:56:06 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_smack_entry(r0, &(0x7f0000000000)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) [ 219.960019][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.968736][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.977536][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.990656][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.006432][ T8867] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.013576][ T8867] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.021550][ T8867] device bridge_slave_1 entered promiscuous mode [ 220.041597][ T8860] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 220.052123][ T8860] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 220.081780][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.090566][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.099307][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.107949][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.119889][ T8863] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 220.164725][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.188616][ T8863] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 220.200170][ T8860] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.226053][ T8865] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.233152][ T8865] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.241921][ T8865] device bridge_slave_0 entered promiscuous mode [ 220.252004][ T8867] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 220.261481][ T8865] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.268654][ T8865] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.277423][ T8865] device bridge_slave_1 entered promiscuous mode [ 220.338520][ T8867] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 220.351173][ T8875] chnl_net:caif_netlink_parms(): no params data found [ 220.362265][ T8865] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 220.377440][ T8863] team0: Port device team_slave_0 added [ 220.393955][ T8880] IPVS: ftp: loaded support on port[0] = 21 [ 220.434839][ T8863] team0: Port device team_slave_1 added [ 220.450684][ T8867] team0: Port device team_slave_0 added [ 220.465342][ T8867] team0: Port device team_slave_1 added [ 220.473162][ T8865] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 220.526396][ T8863] device hsr_slave_0 entered promiscuous mode [ 220.563681][ T8863] device hsr_slave_1 entered promiscuous mode [ 220.603685][ T8863] debugfs: Directory 'hsr0' with parent '/' already present! [ 220.614443][ T8875] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.621498][ T8875] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.629376][ T8875] device bridge_slave_0 entered promiscuous mode [ 220.643091][ T8875] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.650228][ T8875] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.658276][ T8875] device bridge_slave_1 entered promiscuous mode [ 220.674849][ T8865] team0: Port device team_slave_0 added [ 220.708872][ T8865] team0: Port device team_slave_1 added [ 220.806562][ T8867] device hsr_slave_0 entered promiscuous mode [ 220.843552][ T8867] device hsr_slave_1 entered promiscuous mode [ 220.903457][ T8867] debugfs: Directory 'hsr0' with parent '/' already present! [ 220.932640][ T8875] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 10:56:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000001c0)=0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000140)) [ 220.953498][ T8875] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 220.985373][ T8875] team0: Port device team_slave_0 added [ 221.016291][ T8890] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 221.046489][ T8865] device hsr_slave_0 entered promiscuous mode [ 221.083577][ T8865] device hsr_slave_1 entered promiscuous mode [ 221.123528][ T8865] debugfs: Directory 'hsr0' with parent '/' already present! [ 221.147890][ T8875] team0: Port device team_slave_1 added [ 221.246433][ T8875] device hsr_slave_0 entered promiscuous mode [ 221.293664][ T8875] device hsr_slave_1 entered promiscuous mode [ 221.333304][ T8875] debugfs: Directory 'hsr0' with parent '/' already present! [ 221.371100][ T8863] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.393927][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.401579][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.426533][ T8880] chnl_net:caif_netlink_parms(): no params data found [ 221.443778][ T8863] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.501800][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.510579][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.519074][ T2623] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.526185][ T2623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.537260][ T8880] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.544425][ T8880] bridge0: port 1(bridge_slave_0) entered disabled state [ 221.552142][ T8880] device bridge_slave_0 entered promiscuous mode [ 221.561068][ T8880] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.568640][ T8880] bridge0: port 2(bridge_slave_1) entered disabled state [ 221.576734][ T8880] device bridge_slave_1 entered promiscuous mode [ 221.598940][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.610019][ T8880] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 221.621779][ T8880] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 221.635565][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.644398][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.652854][ T8876] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.659966][ T8876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.696480][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.705848][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.736682][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.745805][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.756011][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 221.774048][ T8880] team0: Port device team_slave_0 added [ 221.781426][ T8880] team0: Port device team_slave_1 added [ 221.816335][ T8890] debugfs: Directory '8890-4' with parent 'kvm' already present! [ 221.829143][ T8867] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.839864][ T8865] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.855204][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.864032][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.879616][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.890135][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.899014][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.907380][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 10:56:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x2a0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) [ 221.977590][ T8880] device hsr_slave_0 entered promiscuous mode [ 222.017006][ T8880] device hsr_slave_1 entered promiscuous mode [ 222.053594][ T8880] debugfs: Directory 'hsr0' with parent '/' already present! [ 222.061736][ C0] hrtimer: interrupt took 27389 ns [ 222.063618][ T8863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.084302][ T8865] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.092787][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.103236][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.114317][ T8875] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.130464][ T8875] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.143003][ T8867] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.160012][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.168404][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.176223][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.184129][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.192010][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.200763][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.209239][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.216362][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state 10:56:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x2a0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) [ 222.265164][ T8863] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.318720][ T8875] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 222.329532][ T8875] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 222.369529][ T8867] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 222.380004][ T8867] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 222.404437][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.412514][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.421370][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.430137][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.437234][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.445652][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.454708][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.463122][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.470216][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.477912][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.486675][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.495118][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.502177][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.509847][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.518709][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.527405][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.536284][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.543400][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.551034][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.559773][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.568279][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.575438][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.583154][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.591957][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.600784][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.609568][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 10:56:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000580)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x296, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000eaff07"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 222.618497][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.627240][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.635677][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.644474][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.653188][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.661713][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.670653][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.679213][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.687690][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.696190][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.704923][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.713814][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.722533][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.731087][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.739506][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.747861][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.756631][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.765046][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.773482][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.781608][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.789947][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.798044][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.806478][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.822474][ T8865] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 222.833797][ T8865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.855811][ T8875] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.863818][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 10:56:09 executing program 0: setregid(0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000340), 0x41395527) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r2, 0xffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xff}, &(0x7f0000000200), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 222.874492][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.882452][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.890384][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.898884][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.906633][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.914534][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.922494][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.930931][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.957881][ T8867] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.968313][ T8865] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.997409][ T8880] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.041678][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 223.050447][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.063703][ T8880] 8021q: adding VLAN 0 to HW filter on device team0 [ 223.118434][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 223.127729][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 223.136196][ T8876] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.143321][ T8876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.150986][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.159717][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.168143][ T8876] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.175259][ T8876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.182918][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.191751][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.272357][ T8880] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 223.283225][ T8880] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 223.312447][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.320785][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.329630][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.338185][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.346952][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.355463][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.363897][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 10:56:10 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000100)='./file0\x00'}, 0x10) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000240)="66ba4300b801380000ef0f22dc66b8a1008ec0c4e21db7eb5766baa000b093ee362e0f01ef65d9f9ea00480000aa00b98e0400000f32", 0x36}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 223.372409][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.380901][ T8876] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.620201][ T8880] 8021q: adding VLAN 0 to HW filter on device batadv0 10:56:10 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) socket$nl_xfrm(0x10, 0x3, 0x6) 10:56:10 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f00000003c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='gfs2meta\x00', 0x0, 0x0) [ 223.953838][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.961883][ T2623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:56:10 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000001c0)={0x67, 0x0, 0x1000, {0x77359400}, 0x5fe5, 0x3ff}) [ 224.132116][ T8981] gfs2: gfs2 mount does not exist 10:56:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x11c, 0x1) syz_open_dev$sndseq(0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_smack_entry(r2, &(0x7f0000000000)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x40505330, &(0x7f0000000280)={0x31b}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0xffffffffffffd17d, 0x7f, 0x4, 0xffffffffffffff7f}, 0x14) read$FUSE(r0, 0x0, 0x0) socket$inet(0x10, 0x0, 0x0) 10:56:11 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) 10:56:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x8008, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, 0x0, &(0x7f00000003c0)) r0 = socket(0x10, 0x800000000000803, 0x0) sendto(r0, &(0x7f0000000000)="120000001600e70d017b00000600008e1584", 0x12, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2) recvmmsg(r0, &(0x7f0000004e00), 0x27b, 0x0, 0x0) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, &(0x7f00000004c0)={"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"}) 10:56:11 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f00000001c0)={0x67, 0x0, 0x1000, {0x77359400}, 0x5fe5, 0x3ff}) [ 224.257083][ T8981] gfs2: gfs2 mount does not exist 10:56:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000280)=ANY=[]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:56:11 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[@ANYRES32], 0x62f4c3e3) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5437, 0x0) 10:56:11 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x11c, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_smack_entry(r2, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x40505330, &(0x7f0000000280)={0x31b}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x1c, 0x0, @ib={0x1b, 0x0, 0x0, {"6481fe52f8eb5552f8528df6521ad608"}, 0x1, 0x5, 0x7fffffff}}}, 0x90) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0xffffffffffffd17d, 0x0, 0x4, 0xffffffffffffff7f, 0x9}, 0x14) read$FUSE(0xffffffffffffffff, &(0x7f0000000440), 0x1000) socket$inet(0x10, 0x3, 0x0) 10:56:11 executing program 5: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='errors=ro-remount,usrjquota=']) 10:56:11 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x11c, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_smack_entry(r2, &(0x7f0000000000)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x40505330, &(0x7f0000000280)={0x31b}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @ib={0x1b, 0x9, 0x0, {"6481fe52f8eb5552f8528df6521ad608"}, 0x1, 0x5, 0x7fffffff}}}, 0x90) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0xffffffffffffd17d, 0x7f, 0x4, 0xffffffffffffff7f, 0x9}, 0x14) read$FUSE(r0, &(0x7f0000000440), 0x1000) socket$inet(0x10, 0x3, 0x0) 10:56:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) [ 224.800138][ T9027] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 10:56:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget$private(0x0, 0x2000, 0x540018a0, &(0x7f0000ffd000/0x2000)=nil) 10:56:11 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000440)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x0, {0xb}}) 10:56:11 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000bd7000)={&(0x7f0000c07e98)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 10:56:11 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x11c, 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0xffffffffffffff3d}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bcsh0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') getdents(r1, &(0x7f0000000040)=""/46, 0x2e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_smack_entry(r2, &(0x7f0000000000)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x40505330, &(0x7f0000000280)={0x31b}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @ib={0x1b, 0x9, 0x0, {"6481fe52f8eb5552f8528df6521ad608"}, 0x1, 0x5, 0x7fffffff}}}, 0x90) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0xffffffffffffd17d, 0x7f, 0x4, 0xffffffffffffff7f, 0x9}, 0x14) read$FUSE(r0, &(0x7f0000000440), 0x1000) socket$inet(0x10, 0x3, 0x0) [ 225.028807][ T9027] REISERFS warning (device loop5): sh-2021 reiserfs_fill_super: can not find reiserfs on loop5 10:56:12 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000050000000a0000007177536e5ca92e87249b1cd4a3d500000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000519cf5db000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e2ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000086fb40036e1f14"], 0x310) 10:56:12 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0), 0x111}}, 0x20) 10:56:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) ptrace$setsig(0x4203, r1, 0xf2e, &(0x7f0000000340)={0xd, 0x273, 0xb1}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getresgid(&(0x7f00000015c0), 0x0, &(0x7f0000001640)) ioctl$sock_netdev_private(r0, 0x89fd, &(0x7f0000000340)) getgid() fsetxattr$security_selinux(r0, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xae, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffc) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000000024) syz_genetlink_get_family_id$fou(0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) add_key(&(0x7f0000000140)='.request_key_auth\x00', 0x0, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 10:56:12 executing program 2: 10:56:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001e000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="0fae0e8bb6e74c0fc75a00652e3e260fc75b0066b91708000066b8d18275ba66ba59790f740f30f2decf66b9800000c00f326635000800000f30c01da1f3d9f1ba210066b8feffffff66ef", 0x4b}], 0x1, 0x0, 0x0, 0x3c7) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000280)=ANY=[]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:56:12 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000440)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000240)={0x0, 0x0, 0x1, {0xb}}) 10:56:12 executing program 4: syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x24200) 10:56:12 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0\x00') mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000300)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f00000002c0)='./file0/file0\x00', 0x1000000000002) 10:56:12 executing program 4: 10:56:12 executing program 1: 10:56:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) ptrace$setsig(0x4203, r1, 0xf2e, &(0x7f0000000340)={0xd, 0x273, 0xb1}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getresgid(&(0x7f00000015c0), 0x0, &(0x7f0000001640)) ioctl$sock_netdev_private(r0, 0x89fd, &(0x7f0000000340)) getgid() fsetxattr$security_selinux(r0, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xae, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0xfffffffffffffffc) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000000024) syz_genetlink_get_family_id$fou(0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) add_key(&(0x7f0000000140)='.request_key_auth\x00', 0x0, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 10:56:12 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60d8652b00140601010000000000000000000d00000000aafe8000000040000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], 0x0) 10:56:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) ptrace$setsig(0x4203, r1, 0xf2e, &(0x7f0000000340)={0xd, 0x273, 0xb1}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) getresgid(&(0x7f00000015c0), 0x0, &(0x7f0000001640)) ioctl$sock_netdev_private(r0, 0x89fd, &(0x7f0000000340)) getgid() fsetxattr$security_selinux(r0, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xae, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000ab005404e4700800009b3d7e0b583c970cf3595e3ddf8c8b395f5120a2c630a85b6247bcb1129ef9850b349e170a59eefc97217776f9c4fd02f7e252c315f4dbf9e9bf64ca53eb473eed2827d0120011f938dc3ca2e4b2494aafb3f4787e0010000000000000de0d74141ad5189a03c43e5ada3625f34792d5af201d60849d243ab5d4dc84960e7f45a5313da50a3adfa490628a9741f4bc3c0e9f1b4004fb47a3bffb4939bf2f89a014e7306776ff4c34bc55231f2c12d3e730dcb9be333d0a056776e6b1235ea32d6fc4db1ad989dfc7bd2ff09589d616e608dd6c88fe06"], 0xfb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000000024) syz_genetlink_get_family_id$fou(0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) add_key(&(0x7f0000000140)='.request_key_auth\x00', 0x0, &(0x7f0000000280), 0x0, 0xfffffffffffffffd) 10:56:12 executing program 4: 10:56:12 executing program 5: [ 225.877650][ T9108] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:56:12 executing program 1: 10:56:12 executing program 4: 10:56:12 executing program 5: 10:56:12 executing program 1: 10:56:13 executing program 4: 10:56:13 executing program 3: 10:56:13 executing program 0: 10:56:13 executing program 5: 10:56:13 executing program 2: 10:56:13 executing program 4: 10:56:13 executing program 1: 10:56:13 executing program 4: 10:56:13 executing program 2: 10:56:13 executing program 5: 10:56:13 executing program 3: 10:56:13 executing program 0: 10:56:13 executing program 1: 10:56:13 executing program 5: 10:56:13 executing program 3: 10:56:13 executing program 4: 10:56:13 executing program 2: 10:56:13 executing program 0: 10:56:13 executing program 5: 10:56:13 executing program 1: 10:56:13 executing program 3: 10:56:13 executing program 4: 10:56:13 executing program 2: 10:56:13 executing program 0: 10:56:13 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:13 executing program 3: 10:56:13 executing program 1: 10:56:13 executing program 4: 10:56:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:14 executing program 2: 10:56:14 executing program 0: 10:56:14 executing program 4: 10:56:14 executing program 3: 10:56:14 executing program 1: 10:56:14 executing program 2: 10:56:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:14 executing program 4: 10:56:14 executing program 0: 10:56:14 executing program 3: 10:56:14 executing program 1: 10:56:14 executing program 2: 10:56:14 executing program 4: 10:56:14 executing program 0: 10:56:14 executing program 3: 10:56:14 executing program 2: 10:56:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:14 executing program 1: 10:56:14 executing program 0: 10:56:14 executing program 4: 10:56:14 executing program 3: 10:56:14 executing program 2: 10:56:14 executing program 1: 10:56:14 executing program 0: 10:56:14 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:15 executing program 4: 10:56:15 executing program 3: 10:56:15 executing program 2: 10:56:15 executing program 1: 10:56:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:15 executing program 0: 10:56:15 executing program 2: 10:56:15 executing program 3: 10:56:15 executing program 4: 10:56:15 executing program 1: 10:56:15 executing program 0: 10:56:15 executing program 3: 10:56:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:15 executing program 4: 10:56:15 executing program 1: 10:56:15 executing program 2: 10:56:15 executing program 0: 10:56:15 executing program 3: 10:56:15 executing program 1: 10:56:15 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:15 executing program 4: 10:56:15 executing program 0: 10:56:15 executing program 2: [ 228.980016][ T9292] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:56:15 executing program 1: 10:56:15 executing program 3: 10:56:16 executing program 4: 10:56:16 executing program 2: 10:56:16 executing program 0: 10:56:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:16 executing program 1: 10:56:16 executing program 1: 10:56:16 executing program 2: 10:56:16 executing program 0: 10:56:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, 0xfffffffffffffffd) 10:56:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) fsetxattr$system_posix_acl(r1, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000700)=ANY=[@ANYBLOB="020000000100000000000000040000000000000010000000000000426b1236e5a60cec2651dc80cf0be604f18008af5bd2c79d4075df00b8e945d663f04c59930b6cc9878ee246233b0000000000000000001e8e5ea998dbd3f011c75c83e1e36003e9ce5ca2bd89"], 0x24, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r0, r1, 0x0) 10:56:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f00000012c0)='./file1\x00', 0x6c2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000240)='ecryptfs\x00', 0x0, 0x0) 10:56:16 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 0x7fff}) 10:56:16 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000100)) 10:56:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) sigaltstack(&(0x7f00005ca000/0x4000)=nil, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 229.738110][ T9333] Error parsing options; rc = [-22] 10:56:16 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) bind$inet(r1, &(0x7f0000000380)={0x2, 0x200000000004e23}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x90000}, 0xc, &(0x7f0000000140)={&(0x7f0000000900)=@flushsa={0x154, 0x1c, 0x2, 0x70bd25, 0x25dfdbff, {0x7f}, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@empty}}, @algo_crypt={0x48, 0x2, {{'cbc(camellia)\x00'}}}, @replay_esn_val={0x20, 0x17, {0x1, 0x70bd2a, 0x70bd25, 0x70bd2a, 0x70bd25, 0x2, [0x0]}}, @algo_auth={0xbc, 0x1, {{'sha256-avx2\x00'}, 0x3a0, "6a43688d89fe409f0b5063c0932fe96b9da347e76218efa06fc0d099addf1101f95958dbfe22dc12bc3f4b25ceb69d7f2a5924482f2c614f0d97fbd9710d06aae096d82ed903376b4b4ab9fc5facd31e5a3617fec331d04e2963e80a058670c6783fde857f60a7706be6f019136259f4c5406a0c"}}]}, 0x154}, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 10:56:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:16 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000001c0), &(0x7f0000000240)=0x30) socket$inet_tcp(0x2, 0x1, 0x0) inotify_init1(0x0) pipe(&(0x7f0000000440)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xffffffffffffff3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) [ 229.890568][ T9349] Error parsing options; rc = [-22] 10:56:16 executing program 3: open(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000100)=@gcm_256={{0x9ec0faea642bb54b}, "a4c4b8fb191e59c8", "5aad11be0442e2a1e740c64de9554dde18ef7d681ee527f23336ed1a1c731db7", "3c7ecde3", "49ae091dd011de60"}, 0x38) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0xb, &(0x7f00000001c0), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) accept4(0xffffffffffffffff, &(0x7f0000000200)=@x25={0x9, @remote}, &(0x7f0000000280)=0x80, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000000)=0x100000001, 0x4) bind(r0, &(0x7f00000002c0)=@l2={0x1f, 0x9, {0x7, 0x100, 0x9, 0x2, 0x80000001, 0xfffffffffffffa3f}, 0x3, 0x101}, 0x80) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) unshare(0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000580)="04", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x9, 0x80ffffffff}, 0x14) shutdown(r0, 0x1) 10:56:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000100), 0xe1) 10:56:16 executing program 2: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffb000/0x4000)=nil, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, 0xfffffffffffffffd) 10:56:16 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:17 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e3, &(0x7f0000000000)) 10:56:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='\x00\xaeC\xae\xc4\x05\xa9\xbd~\xfb\x96\xf7,k\x1a+@\xe54\x01\x01\x01\x00w\xa7\x04~\\\xd4Y\x04\xaf^\xc6\xf2\x98\"\xa0\xa1\x04\xaf\x81\x00ov [ 336.523735][ C0] dump_stack+0x16f/0x1f0 [ 336.528090][ C0] ? lapic_can_unplug_cpu.cold+0x36/0x45 [ 336.533728][ C0] nmi_cpu_backtrace.cold+0x70/0xb2 [ 336.538951][ C0] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 336.544594][ C0] nmi_trigger_cpumask_backtrace+0x22d/0x25c [ 336.550594][ C0] arch_trigger_cpumask_backtrace+0x14/0x20 [ 336.556499][ C0] rcu_dump_cpu_stacks+0x183/0x1cf [ 336.561622][ C0] ? find_next_bit+0x107/0x130 [ 336.566416][ C0] rcu_sched_clock_irq.cold+0x491/0x8c0 [ 336.571975][ C0] ? raise_softirq+0x163/0x370 [ 336.576769][ C0] update_process_times+0x32/0x80 [ 336.581853][ C0] tick_sched_handle+0xa2/0x190 [ 336.586719][ C0] tick_sched_timer+0x47/0x130 [ 336.591491][ C0] __hrtimer_run_queues+0x364/0xd90 [ 336.596710][ C0] ? tick_sched_do_timer+0x1b0/0x1b0 [ 336.602003][ C0] ? hrtimer_start_range_ns+0xbc0/0xbc0 [ 336.607544][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 336.613271][ C0] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 336.619345][ C0] hrtimer_interrupt+0x2ea/0x730 [ 336.624341][ C0] smp_apic_timer_interrupt+0x10b/0x550 [ 336.629890][ C0] apic_timer_interrupt+0xf/0x20 [ 336.634814][ C0] [ 336.637775][ C0] RIP: 0010:_raw_spin_unlock_irqrestore+0x91/0xd0 [ 336.644193][ C0] Code: 48 c7 c0 90 e3 d2 88 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 32 48 83 3d 46 64 a0 01 00 74 16 48 89 df 57 9d <0f> 1f 44 00 00 65 ff 0d 2b 7e cf 78 5b 41 5c 5d c3 0f 0b 0f 0b 48 [ 336.663800][ C0] RSP: 0018:ffff888054467808 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 336.672215][ C0] RAX: 1ffffffff11a5c72 RBX: 0000000000000282 RCX: 0000000000000006 [ 336.680186][ C0] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: 0000000000000282 [ 336.688244][ C0] RBP: ffff888054467818 R08: 1ffffffff14a6d57 R09: fffffbfff14a6d58 [ 336.696214][ C0] R10: fffffbfff14a6d57 R11: ffffffff8a536abf R12: ffffffff89707060 [ 336.704183][ C0] R13: ffff88809ca10a40 R14: 0000000000000282 R15: ffffffff8b3afb80 [ 336.712256][ C0] snd_seq_client_use_ptr+0xa1/0x3f0 [ 336.717548][ C0] snd_seq_deliver_single_event.constprop.0+0xf5/0x890 [ 336.724420][ C0] ? lockdep_hardirqs_on+0x418/0x5d0 [ 336.729704][ C0] ? snd_seq_ioctl_running_mode+0x190/0x190 [ 336.735607][ C0] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 336.741076][ C0] snd_seq_deliver_event+0x57f/0x8d0 [ 336.746363][ C0] ? snd_seq_deliver_single_event.constprop.0+0x890/0x890 [ 336.753468][ C0] ? _raw_spin_unlock_irqrestore+0x91/0xd0 [ 336.759277][ C0] ? snd_seq_client_use_ptr+0xa6/0x3f0 [ 336.764753][ C0] snd_seq_dispatch_event+0x131/0x5b0 [ 336.770123][ C0] ? snd_seq_write+0x740/0x740 [ 336.774888][ C0] ? _raw_spin_unlock_irqrestore+0x91/0xd0 [ 336.780747][ C0] ? snd_seq_prioq_cell_out+0x1e8/0x350 [ 336.786294][ C0] snd_seq_check_queue.part.0+0x139/0x360 [ 336.792014][ C0] snd_seq_enqueue_event+0x1fb/0x4c0 [ 336.797295][ C0] ? snd_seq_client_enqueue_event.constprop.0+0x24c/0x470 [ 336.804404][ C0] snd_seq_client_enqueue_event.constprop.0+0x259/0x470 [ 336.811352][ C0] ? snd_seq_kernel_client_dispatch+0x180/0x180 [ 336.817608][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 336.823500][ C0] snd_seq_write+0x40b/0x740 [ 336.828094][ C0] ? snd_seq_kernel_client_enqueue+0x1e0/0x1e0 [ 336.834248][ C0] ? snd_seq_kernel_client_enqueue+0x1e0/0x1e0 [ 336.840420][ C0] __vfs_write+0x8a/0x110 [ 336.844744][ C0] ? snd_seq_kernel_client_enqueue+0x1e0/0x1e0 [ 336.850890][ C0] vfs_write+0x268/0x5d0 [ 336.855153][ C0] ksys_write+0x220/0x290 [ 336.859484][ C0] ? __ia32_sys_read+0xb0/0xb0 [ 336.864250][ C0] __x64_sys_write+0x73/0xb0 [ 336.868839][ C0] ? do_syscall_64+0x5b/0x6a0 [ 336.873512][ C0] do_syscall_64+0xfd/0x6a0 [ 336.878015][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.883898][ C0] RIP: 0033:0x459829 [ 336.887794][ C0] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.908911][ C0] RSP: 002b:00007fabdb97ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 336.917321][ C0] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 336.925298][ C0] RDX: 00000000ffffff76 RSI: 0000000020000000 RDI: 0000000000000007 [ 336.933265][ C0] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 336.941318][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fabdb97f6d4 [ 336.949281][ C0] R13: 00000000004c98c0 R14: 00000000004e0d38 R15: 00000000ffffffff 10:56:18 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:18 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000080)={r2, 0x0, 0x2, r2}) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000100)={r2, 0x0, 0x2, r3}) 10:56:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x7}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 10:56:19 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x296, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000380)=ANY=[@ANYBLOB="010000000000000007"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 10:56:19 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:56:19 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x7}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 10:58:09 executing program 4: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000000000)={0x0, 0xf0ffff, &(0x7f0000000040)=[{&(0x7f0000000600)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) 10:58:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:58:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) bind$inet(r1, &(0x7f0000000380)={0x2, 0x200000000004e23}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x90000}, 0xc, &(0x7f0000000140)={&(0x7f0000000900)=@flushsa={0x154, 0x1c, 0x2, 0x70bd25, 0x25dfdbff, {0x7f}, [@encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in6=@empty}}, @algo_crypt={0x48, 0x2, {{'cbc(camellia)\x00'}}}, @replay_esn_val={0x20, 0x17, {0x1, 0x70bd2a, 0x70bd25, 0x70bd2a, 0x70bd25, 0x2, [0x0]}}, @algo_auth={0xbc, 0x1, {{'sha256-avx2\x00'}, 0x3a0, "6a43688d89fe409f0b5063c0932fe96b9da347e76218efa06fc0d099addf1101f95958dbfe22dc12bc3f4b25ceb69d7f2a5924482f2c614f0d97fbd9710d06aae096d82ed903376b4b4ab9fc5facd31e5a3617fec331d04e2963e80a058670c6783fde857f60a7706be6f019136259f4c5406a0c"}}]}, 0x154}, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 10:58:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x7}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 10:58:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x6, 0x20000) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{0xff, 0x3f}, {0x0, 0x8}, 0x8579, 0x4, 0xfff}) r1 = socket(0x40000000002, 0x3, 0x2) sendmsg$unix(r1, &(0x7f0000000900)={&(0x7f0000000180)=@abs, 0x6e, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 10:58:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x41, 0x0, 0x671) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) fcntl$setstatus(r1, 0x4, 0x100000427ff) 10:58:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) [ 342.767063][ T9510] raw_sendmsg: syz-executor.1 forgot to set AF_INET. Fix it! 10:58:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x50}, [@ldst={0x7}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 10:58:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:58:09 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) 10:58:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev}}, 0x1c) sendto(r0, &(0x7f0000000040), 0xfe4c, 0x0, 0x0, 0x8b) 10:58:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002680)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0xda0], [0xc1]}) [ 344.985048][ T9537] IPVS: ftp: loaded support on port[0] = 21 [ 345.056653][ T89] device bridge_slave_1 left promiscuous mode [ 345.063973][ T89] bridge0: port 2(bridge_slave_1) entered disabled state [ 345.135968][ T89] device bridge_slave_0 left promiscuous mode [ 345.142992][ T89] bridge0: port 1(bridge_slave_0) entered disabled state