Warning: Permanently added '10.128.0.186' (ECDSA) to the list of known hosts. 2019/08/26 21:18:22 fuzzer started syzkaller login: [ 76.513257][ T8877] as (8877) used greatest stack depth: 23256 bytes left 2019/08/26 21:18:25 dialing manager at 10.128.0.26:45029 2019/08/26 21:18:25 syscalls: 2487 2019/08/26 21:18:25 code coverage: enabled 2019/08/26 21:18:25 comparison tracing: enabled 2019/08/26 21:18:25 extra coverage: extra coverage is not supported by the kernel 2019/08/26 21:18:25 setuid sandbox: enabled 2019/08/26 21:18:25 namespace sandbox: enabled 2019/08/26 21:18:25 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/26 21:18:25 fault injection: enabled 2019/08/26 21:18:25 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/26 21:18:25 net packet injection: enabled 2019/08/26 21:18:25 net device setup: enabled 21:20:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0xc08c5114, 0x0) 21:20:36 executing program 1: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x90001) [ 207.701081][ T8884] IPVS: ftp: loaded support on port[0] = 21 [ 207.889714][ T8884] chnl_net:caif_netlink_parms(): no params data found [ 207.935410][ T8884] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.943362][ T8884] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.952301][ T8884] device bridge_slave_0 entered promiscuous mode [ 207.953686][ T8887] IPVS: ftp: loaded support on port[0] = 21 [ 207.966353][ T8884] bridge0: port 2(bridge_slave_1) entered blocking state [ 207.973545][ T8884] bridge0: port 2(bridge_slave_1) entered disabled state 21:20:36 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) [ 207.982316][ T8884] device bridge_slave_1 entered promiscuous mode [ 208.069406][ T8884] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.095624][ T8884] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 208.155543][ T8884] team0: Port device team_slave_0 added [ 208.171023][ T8889] IPVS: ftp: loaded support on port[0] = 21 [ 208.189499][ T8884] team0: Port device team_slave_1 added 21:20:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setreuid(0x0, 0x0) mknod(&(0x7f0000000340)='./bus\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000280)='./bus\x00', &(0x7f0000000380)='security.capability\x00', 0x0, 0x0, 0x0) [ 208.307870][ T8884] device hsr_slave_0 entered promiscuous mode [ 208.365247][ T8884] device hsr_slave_1 entered promiscuous mode [ 208.430179][ T8887] chnl_net:caif_netlink_parms(): no params data found [ 208.458090][ T8884] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.465409][ T8884] bridge0: port 2(bridge_slave_1) entered forwarding state 21:20:36 executing program 4: [ 208.473826][ T8884] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.481125][ T8884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 208.491249][ T8892] IPVS: ftp: loaded support on port[0] = 21 [ 208.687533][ T8887] bridge0: port 1(bridge_slave_0) entered blocking state [ 208.702810][ T8887] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.712631][ T8887] device bridge_slave_0 entered promiscuous mode [ 208.745387][ T8897] IPVS: ftp: loaded support on port[0] = 21 [ 208.747901][ T8889] chnl_net:caif_netlink_parms(): no params data found [ 208.762612][ T8887] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.771258][ T8887] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.779857][ T8887] device bridge_slave_1 entered promiscuous mode 21:20:37 executing program 5: [ 208.880799][ T8887] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.899727][ T8884] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.947403][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.957264][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.967740][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 208.998860][ T8887] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.016000][ T8889] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.023083][ T8889] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.032352][ T8889] device bridge_slave_0 entered promiscuous mode [ 209.042754][ T8889] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.050379][ T8889] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.059143][ T8889] device bridge_slave_1 entered promiscuous mode [ 209.082664][ T8887] team0: Port device team_slave_0 added [ 209.098980][ T8892] chnl_net:caif_netlink_parms(): no params data found [ 209.119283][ T8902] IPVS: ftp: loaded support on port[0] = 21 [ 209.127897][ T8887] team0: Port device team_slave_1 added [ 209.157952][ T8889] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.172506][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 209.183419][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 209.200540][ T8884] 8021q: adding VLAN 0 to HW filter on device team0 [ 209.223408][ T8889] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.316303][ T8887] device hsr_slave_0 entered promiscuous mode [ 209.374210][ T8887] device hsr_slave_1 entered promiscuous mode [ 209.433998][ T8887] debugfs: Directory 'hsr0' with parent '/' already present! [ 209.477392][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.487607][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 209.496259][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.504203][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 209.512082][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 209.522170][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.530982][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.538749][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 209.549593][ T8889] team0: Port device team_slave_0 added [ 209.559285][ T8889] team0: Port device team_slave_1 added [ 209.566224][ T8892] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.573536][ T8892] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.584841][ T8892] device bridge_slave_0 entered promiscuous mode [ 209.593458][ T8892] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.600781][ T8892] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.609871][ T8892] device bridge_slave_1 entered promiscuous mode [ 209.676030][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 209.737742][ T8889] device hsr_slave_0 entered promiscuous mode [ 209.794441][ T8889] device hsr_slave_1 entered promiscuous mode [ 209.884020][ T8889] debugfs: Directory 'hsr0' with parent '/' already present! [ 209.909719][ T8897] chnl_net:caif_netlink_parms(): no params data found [ 209.919708][ T8892] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.931004][ T8892] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.943347][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 209.997809][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 210.007698][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 210.016524][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 210.025180][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 210.034247][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 210.077289][ T8897] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.085423][ T8897] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.093406][ T8897] device bridge_slave_0 entered promiscuous mode [ 210.101807][ T8897] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.109157][ T8897] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.117346][ T8897] device bridge_slave_1 entered promiscuous mode [ 210.137131][ T8892] team0: Port device team_slave_0 added [ 210.152474][ T8897] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 210.164578][ T8897] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 210.182738][ T8892] team0: Port device team_slave_1 added [ 210.190616][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 210.199627][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 210.211385][ T8902] chnl_net:caif_netlink_parms(): no params data found [ 210.253081][ T8897] team0: Port device team_slave_0 added [ 210.262319][ T8897] team0: Port device team_slave_1 added [ 210.272996][ T8884] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 210.285627][ T8884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 210.307697][ T8902] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.315109][ T8902] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.324727][ T8902] device bridge_slave_0 entered promiscuous mode [ 210.334635][ T8902] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.341732][ T8902] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.350566][ T8902] device bridge_slave_1 entered promiscuous mode [ 210.372011][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 210.382159][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 210.409796][ T8887] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.447433][ T8892] device hsr_slave_0 entered promiscuous mode [ 210.504904][ T8892] device hsr_slave_1 entered promiscuous mode [ 210.544236][ T8892] debugfs: Directory 'hsr0' with parent '/' already present! [ 210.566679][ T8902] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 210.580482][ T8902] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 210.616721][ T8902] team0: Port device team_slave_0 added [ 210.631436][ T8902] team0: Port device team_slave_1 added [ 210.658361][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 210.666843][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 210.747331][ T8897] device hsr_slave_0 entered promiscuous mode [ 210.804342][ T8897] device hsr_slave_1 entered promiscuous mode [ 210.853935][ T8897] debugfs: Directory 'hsr0' with parent '/' already present! [ 210.864403][ T8884] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.946148][ T8902] device hsr_slave_0 entered promiscuous mode [ 210.994401][ T8902] device hsr_slave_1 entered promiscuous mode [ 211.034080][ T8902] debugfs: Directory 'hsr0' with parent '/' already present! [ 211.044391][ T8887] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.080965][ T8889] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.107423][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.125019][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.134227][ T8894] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.141313][ T8894] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.172293][ T8889] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.186113][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.198339][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.207328][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.217070][ T8894] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.224396][ T8894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.232543][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.244441][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.275428][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 211.287286][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 211.296096][ T8894] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.303329][ T8894] bridge0: port 1(bridge_slave_0) entered forwarding state [ 211.311951][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 211.320914][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 211.330107][ T8894] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.337486][ T8894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.346558][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.355793][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.365205][ T8894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 211.374365][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 211.471834][ T8892] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.480485][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.495375][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.507401][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 211.517140][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.526329][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.535212][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 211.545512][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 211.556484][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 211.565168][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.573423][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 211.582705][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 211.592038][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.600396][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 211.616735][ T8887] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 211.628506][ T8887] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 211.656189][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 21:20:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 211.665393][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 211.674428][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.687238][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.704581][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 211.713243][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 211.724097][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.746031][ T8889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 211.767184][ T8887] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 211.782081][ T8915] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 21:20:40 executing program 0: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffa000/0x3000)=nil) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x36, &(0x7f0000000600)='trustedposix_acl_access-$em0[wlan0\\\'trusted%\xbfsystem]@\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000140)='maps\x00') pipe2(&(0x7f00000006c0), 0x800) getpeername(0xffffffffffffffff, &(0x7f0000000480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x85c22563803682f9, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) readv(r1, 0x0, 0x1a5) r2 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x400000) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@add_del={0x2, &(0x7f00000002c0)='yam0\x00'}) pipe2(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000000)={0x0, 0x1, 0x18, 0x5f96, 0x0, 0x0, 0x4, 0xd0, 0x0, 0x0, 0x5, 0x10000, 0x8, 0x10001, &(0x7f0000000100)=""/192, 0x96b, 0x1, 0xdea}) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r4, 0x0, 0xfffffffffffffff4) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) splice(r3, &(0x7f0000000200)=0xffffffffffffffff, r3, &(0x7f00000001c0), 0x1, 0x3) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000500)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e24, @remote}, {0x2, 0x4e24, @empty}, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x3}) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0xffffffffffffffed) unshare(0x60000000) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000400)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e21, @empty}, 0x22, 0x0, 0x0, 0x0, 0x4, &(0x7f00000003c0)='lo\x00', 0x4, 0x9, 0x1}) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000340)=0x2, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000580), &(0x7f0000000280)=0x68) socket$inet_tcp(0x2, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x200400, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000700)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 211.831308][ T8897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.859158][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.878647][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 211.901291][ T8902] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.912613][ T8892] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.930810][ T8897] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.953633][ T8902] 8021q: adding VLAN 0 to HW filter on device team0 [ 211.968390][ C0] hrtimer: interrupt took 27632 ns [ 211.988332][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 211.996732][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.005515][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.014587][ T2999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.048155][ T8889] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 212.070846][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.076663][ T8921] IPVS: ftp: loaded support on port[0] = 21 [ 212.086995][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.099072][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.106269][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.115235][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.125247][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.138414][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.145856][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.154901][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 212.164048][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.172916][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.182133][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.191009][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.198513][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.210124][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.224995][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.236424][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.243658][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.251656][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 212.263433][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.273457][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 212.284765][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 212.294262][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.306695][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.315231][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 212.324254][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 212.335361][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.342607][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.421473][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.434795][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 21:20:40 executing program 1: r0 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x90001) [ 212.468793][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 212.491911][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.501871][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.512369][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.522730][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.539548][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 21:20:41 executing program 1: keyctl$join(0x1, &(0x7f0000000500)={'syz', 0x0}) [ 212.560950][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.573361][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 212.588749][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 21:20:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup\x00\x8a@\xd2e\xb4W\xab\x99\xac\xb4\x9a\a\xea\x1c\xc5\xf9\xfd(2+mTS\xbc\xd0F\x88\x10\xd2\x11\xdc\x81q_\xc0Q\x1bE\x970Wv\xbeKN\tV\xb0\x01\x15\x18\x9c\x8b\xea\xe9 \x19\x0e\xfc8M\xb1 \x05\x82\xccW \x06\xe2\x06\xd5\xb3\aTbK\xd9\xa1DY\xbeZ5\x85\x04!\x90_\xfb\xa5\xfaX\xe8R\xe1\r\x1b\xa1\xb6\xd2)\x8bM\xe2\xb6\xac^\xe5\x84\xa9\x8fE{o\xb8\b\xb6\xd7P\xa3\x1a\x01\x8b{\x10J o\xeb\xb2|\x1d\xdb\xf2n@\x83\xeae\xbf\x9b\xcb\xbdj\x02\x8e\xa09\xbfo;\xce\x85\xea%\xe8\x84\xd8\xc6\xdfI\xe6\xa8\xf1\x00\x19kN\xce', 0x200002, 0x0) fchdir(r0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) [ 212.725699][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 212.735441][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 212.755026][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.764988][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.783484][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.794149][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.802707][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.802885][ T8944] IPVS: ftp: loaded support on port[0] = 21 [ 212.812326][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 21:20:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@rand_addr, @rand_addr, 0x0, 0x2, [@multicast2, @loopback]}, 0x12) [ 212.826568][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 212.836790][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 212.862575][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 212.871612][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 212.880445][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 212.905461][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 212.920745][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 212.929597][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 212.939347][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:20:41 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) [ 212.960423][ T8902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 213.054207][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.075790][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 21:20:41 executing program 2: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RSTATFS(r1, &(0x7f0000000080)={0x43}, 0x43) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x19404, 0x0) [ 213.097051][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.112900][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.122839][ T8900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.150209][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 21:20:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_settime(0x0, &(0x7f0000000040)) [ 213.306798][ T8892] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.323053][ T8902] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 213.375574][ T8897] 8021q: adding VLAN 0 to HW filter on device batadv0 00:22:00 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000100)='./file0//ile0\x00') mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) delete_module(0x0, 0x0) 00:22:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000000)=0x80, 0x4) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, &(0x7f0000d12ffc)) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000240)='./file0//ile0\x00') mkdir(&(0x7f0000000000)='./file0//ile0\x00', 0x10000000) 00:22:00 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffffffffffe62, &(0x7f0000000080)={0x0}}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a00000000000000000008003900090035000c000600000019000500de800000000000dc1338d54400009b84132000000083de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, 0x0, 0xffffffffffffff6b}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x6000000000010, 0x3, 0x0) sendmmsg$alg(r1, &(0x7f0000000140), 0x492492492492502, 0x0) 00:22:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket(0x10, 0x80002, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a80)=ANY=[@ANYBLOB="7400000024000bd44c800400000000000000ff00", @ANYRES32=r3, @ANYBLOB="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"], 0x74}}, 0x0) sendmmsg$alg(r2, &(0x7f0000000180), 0x572, 0x0) [ 213.918929][ T8994] IPv6: NLM_F_REPLACE set, but no existing node found! 00:22:02 executing program 0: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffa000/0x3000)=nil) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x36, &(0x7f0000000600)='trustedposix_acl_access-$em0[wlan0\\\'trusted%\xbfsystem]@\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000140)='maps\x00') pipe2(&(0x7f00000006c0), 0x800) getpeername(0xffffffffffffffff, &(0x7f0000000480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x85c22563803682f9, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) readv(r1, 0x0, 0x1a5) r2 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x400000) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@add_del={0x2, &(0x7f00000002c0)='yam0\x00'}) pipe2(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000000)={0x0, 0x1, 0x18, 0x5f96, 0x0, 0x0, 0x4, 0xd0, 0x0, 0x0, 0x5, 0x10000, 0x8, 0x10001, &(0x7f0000000100)=""/192, 0x96b, 0x1, 0xdea}) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r4, 0x0, 0xfffffffffffffff4) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) splice(r3, &(0x7f0000000200)=0xffffffffffffffff, r3, &(0x7f00000001c0), 0x1, 0x3) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000500)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e24, @remote}, {0x2, 0x4e24, @empty}, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x3}) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0xffffffffffffffed) unshare(0x60000000) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000400)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e21, @empty}, 0x22, 0x0, 0x0, 0x0, 0x4, &(0x7f00000003c0)='lo\x00', 0x4, 0x9, 0x1}) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000340)=0x2, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000580), &(0x7f0000000280)=0x68) socket$inet_tcp(0x2, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x200400, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000700)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 00:22:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000005c0)=0x5, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") 00:22:02 executing program 5: write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 00:22:02 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x8100000, 0x0) 00:22:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xffffffffffffffd1, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x400000000004e22}, 0x1c) sendmmsg$inet(r1, &(0x7f0000002a40)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="b4", 0x1}], 0x1, &(0x7f0000000500)=[@ip_ttl={{0x18}}], 0x18}}], 0x1, 0x0) 00:22:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001e000b050000", @ANYBLOB="00000000dc2cb92810904fa9e5f21301ce646ba1a30a78d3abdf1e15"], 0x2}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000040)="2e360f2b99dc00660f71e0ff0f01c80fe0b41e002e0f01cb0f01cfba4000b860bdef0f58bd00000f01b100000f0118", 0x2f}], 0x1, 0x0, &(0x7f0000000200)=[@cstype0], 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 215.733222][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 215.822682][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:22:02 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x93, 0x0, 0x1, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16, @perf_config_ext, 0x0, 0x4, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001e000b05000000000000000007020000", @ANYRES32=0x0, @ANYBLOB="00000000dc2cb92810904fa9e5f21301ce646ba1a30a78d3abdf1e15"], 0x20}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000001d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000040)="2e360f2b99dc00660f71e0ff0f01c80fe0b41e002e0f01cb0f01cfba4000b860bdef0f58bd00000f01b100000f0118", 0x2f}], 0x1, 0x10, &(0x7f0000000200)=[@cstype0={0x4, 0x4}], 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:22:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) [ 215.976150][ T9024] IPVS: ftp: loaded support on port[0] = 21 [ 215.995868][ T9035] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 00:22:02 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000220000009500009b00000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 216.213723][ T9033] EXT4-fs (loop5): mounting ext2 file system using the ext4 subsystem [ 216.291174][ T9033] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 not in group (block 119556436)! [ 216.313946][ T9033] EXT4-fs (loop5): group descriptors corrupted! 00:22:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001a0000009500009b00000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:22:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000180000009500009b00000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:22:03 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000500)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) 00:22:03 executing program 0: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffa000/0x3000)=nil) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x36, &(0x7f0000000600)='trustedposix_acl_access-$em0[wlan0\\\'trusted%\xbfsystem]@\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000140)='maps\x00') pipe2(&(0x7f00000006c0), 0x800) getpeername(0xffffffffffffffff, &(0x7f0000000480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x85c22563803682f9, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) readv(r1, 0x0, 0x1a5) r2 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x400000) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@add_del={0x2, &(0x7f00000002c0)='yam0\x00'}) pipe2(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000000)={0x0, 0x1, 0x18, 0x5f96, 0x0, 0x0, 0x4, 0xd0, 0x0, 0x0, 0x5, 0x10000, 0x8, 0x10001, &(0x7f0000000100)=""/192, 0x96b, 0x1, 0xdea}) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r4, 0x0, 0xfffffffffffffff4) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) splice(r3, &(0x7f0000000200)=0xffffffffffffffff, r3, &(0x7f00000001c0), 0x1, 0x3) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000500)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e24, @remote}, {0x2, 0x4e24, @empty}, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x3}) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0xffffffffffffffed) unshare(0x60000000) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000400)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e21, @empty}, 0x22, 0x0, 0x0, 0x0, 0x4, &(0x7f00000003c0)='lo\x00', 0x4, 0x9, 0x1}) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000340)=0x2, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000580), &(0x7f0000000280)=0x68) socket$inet_tcp(0x2, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x200400, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000700)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 00:22:03 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001c0000009500009b00000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:22:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x7, 0x5, [@loopback]}]}}, @icmp=@timestamp_reply={0xffffff86, 0x4}}}}}, 0x0) 00:22:03 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x19) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) sendmmsg(r0, &(0x7f00000032c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2400ffe0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000008c0)={0x0, 0xa1, &(0x7f0000000740)=[{&(0x7f0000000180)="82", 0x1}], 0x200000000000023e}, 0x4000000) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0xc000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 00:22:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) listen(r0, 0x5) ioctl$VIDIOC_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f0000000680)={0x0, @reserved}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000340)) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000), 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f00000000c0)=0x2) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x800000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) [ 217.380041][ T9071] IPVS: ftp: loaded support on port[0] = 21 00:22:04 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x19) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) sendmmsg(r0, 0x0, 0x0, 0x2400ffe0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet6(r0, &(0x7f00000008c0)={0x0, 0xa1, &(0x7f0000000740)=[{&(0x7f0000000180)="82", 0x1}], 0x200000000000023e}, 0x4000000) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0xc000, 0x0) 00:22:04 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x19) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) sendmmsg(r0, &(0x7f00000032c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2400ffe0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000180), 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) execve(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000008c0)={0x0, 0xa1, &(0x7f0000000740)=[{&(0x7f0000000180)="82", 0x1}], 0x200000000000023e}, 0x4000000) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0xc000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='*\x00', r1}, 0x10) 00:22:04 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8032, 0xffffffffffffffff, 0x0) r0 = getpid() ptrace$peekuser(0x3, r0, 0x9) r1 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/247, 0xffffff80}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xadbf80a3}], 0x23a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f000000cec0)={{0x2, 0x4e23, @multicast2}, {0x1, @local}, 0x10, {0x2, 0x4e22, @rand_addr=0x9}, 'nlmon0\x00'}) 00:22:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001e000b050000", @ANYBLOB="00000000dc2cb92810904fa9e5f21301ce646ba1a30a78d3abdf1e15"], 0x2}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000040)="2e360f2b99dc00660f71e0ff0f01c80fe0b41e002e0f01cb0f01cfba4000b860bdef0f58bd00000f01b100000f0118", 0x2f}], 0x1, 0x0, &(0x7f0000000200)=[@cstype0], 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 00:22:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001e000b050000", @ANYBLOB="00000000dc2cb92810904fa9e5f21301ce646ba1a30a78d3abdf1e15"], 0x2}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000040)="2e360f2b99dc00660f71e0ff0f01c80fe0b41e002e0f01cb0f01cfba4000b860bdef0f58bd00000f01b100000f0118", 0x2f}], 0x1, 0x0, &(0x7f0000000200)=[@cstype0], 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 00:22:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x3e, 0x43, 0x6}, 0x3c) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xcd, &(0x7f0000000000), 0x0, 0x0, 0x56}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='wlan1:') bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000080)}, 0x10) 00:22:04 executing program 0: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffa000/0x3000)=nil) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x36, &(0x7f0000000600)='trustedposix_acl_access-$em0[wlan0\\\'trusted%\xbfsystem]@\x00', 0xffffffffffffffff}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000140)='maps\x00') pipe2(&(0x7f00000006c0), 0x800) getpeername(0xffffffffffffffff, &(0x7f0000000480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x85c22563803682f9, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) readv(r1, 0x0, 0x1a5) r2 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x0, 0x400000) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@add_del={0x2, &(0x7f00000002c0)='yam0\x00'}) pipe2(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000000)={0x0, 0x1, 0x18, 0x5f96, 0x0, 0x0, 0x4, 0xd0, 0x0, 0x0, 0x5, 0x10000, 0x8, 0x10001, &(0x7f0000000100)=""/192, 0x96b, 0x1, 0xdea}) r4 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet(r4, 0x0, 0xfffffffffffffff4) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x2, 0x46a}) splice(r3, &(0x7f0000000200)=0xffffffffffffffff, r3, &(0x7f00000001c0), 0x1, 0x3) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000500)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e24, @remote}, {0x2, 0x4e24, @empty}, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x3}) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0xffffffffffffffed) unshare(0x60000000) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000400)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e21, @empty}, 0x22, 0x0, 0x0, 0x0, 0x4, &(0x7f00000003c0)='lo\x00', 0x4, 0x9, 0x1}) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000340)=0x2, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, &(0x7f0000000580), &(0x7f0000000280)=0x68) socket$inet_tcp(0x2, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x200400, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000700)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 00:22:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x20006, 0x0, 0x0, 0xfffffffffffffffb}]}) flistxattr(0xffffffffffffffff, 0x0, 0x0) [ 218.192289][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 218.192355][ T26] audit: type=1326 audit(1324.789:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9118 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0xffff0000 [ 218.229182][ T9112] IPVS: ftp: loaded support on port[0] = 21 00:22:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x20006, 0x0, 0x0, 0xfffffffffffffffb}]}) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) dup(r0) [ 218.519233][ T26] audit: type=1326 audit(1325.099:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9128 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0xffff0000 [ 218.984364][ T26] audit: type=1326 audit(1325.579:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9118 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0xffff0000 00:22:05 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8032, 0xffffffffffffffff, 0x0) r0 = getpid() ptrace$peekuser(0x3, r0, 0x9) r1 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/247, 0xffffff80}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xadbf80a3}], 0x23a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f000000cec0)={{0x2, 0x4e23, @multicast2}, {0x1, @local}, 0x10, {0x2, 0x4e22, @rand_addr=0x9}, 'nlmon0\x00'}) 00:22:05 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8032, 0xffffffffffffffff, 0x0) r0 = getpid() ptrace$peekuser(0x3, r0, 0x9) r1 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/247, 0xffffff80}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xadbf80a3}], 0x23a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f000000cec0)={{0x2, 0x4e23, @multicast2}, {0x1, @local}, 0x10, {0x2, 0x4e22, @rand_addr=0x9}, 'nlmon0\x00'}) 00:22:05 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) [ 219.303032][ T26] audit: type=1326 audit(1325.899:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=9128 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0xffff0000 00:22:06 executing program 3: request_key(&(0x7f0000000140)='big_key\x00', 0x0, 0x0, 0xfffffffffffffffb) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaae53, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000000b00000040000080000000000000006d5ebe5a0000ffff53ef", 0x5cf, 0x400}], 0x1, 0x0) 00:22:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="200000001e000b050000", @ANYBLOB="00000000dc2cb92810904fa9e5f21301ce646ba1a30a78d3abdf1e15"], 0x2}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001d000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000040)="2e360f2b99dc00660f71e0ff0f01c80fe0b41e002e0f01cb0f01cfba4000b860bdef0f58bd00000f01b100000f0118", 0x2f}], 0x1, 0x0, &(0x7f0000000200)=[@cstype0], 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 00:22:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x26dd0ef5ef505b28, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c00000029000109000000e2ffffffff090000000e0000001400ffffffffff0000aecade214913b9005db365b7a72b0008000000682f540000000000"], 0x2c}}, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492627, 0x0) 00:22:06 executing program 5: creat(&(0x7f0000000100)='./file0\x00', 0x0) [ 219.638796][ T9156] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 219.732326][ T9152] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 219.751788][ T9152] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 219.835089][ T9152] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 219.903846][ T9152] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 219.971194][ T9165] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 219.997539][ T9152] EXT4-fs error (device loop3): ext4_fill_super:4469: inode #2: comm syz-executor.3: iget: root inode unallocated [ 220.021843][ T9152] EXT4-fs (loop3): get root inode failed [ 220.034855][ T9152] EXT4-fs (loop3): mount failed [ 220.060837][ T9152] ------------[ cut here ]------------ [ 220.066355][ T9152] ODEBUG: free active (active state 0) object type: percpu_counter hint: 0x0 [ 220.075435][ T9152] WARNING: CPU: 0 PID: 9152 at lib/debugobjects.c:481 debug_print_object+0x168/0x250 [ 220.084901][ T9152] Kernel panic - not syncing: panic_on_warn set ... [ 220.091499][ T9152] CPU: 0 PID: 9152 Comm: syz-executor.3 Not tainted 5.3.0-rc6-next-20190826 #73 [ 220.100507][ T9152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.110560][ T9152] Call Trace: [ 220.113882][ T9152] dump_stack+0x172/0x1f0 [ 220.118307][ T9152] ? debug_print_object+0x90/0x250 [ 220.123417][ T9152] panic+0x2dc/0x755 [ 220.127309][ T9152] ? add_taint.cold+0x16/0x16 [ 220.131991][ T9152] ? __kasan_check_write+0x14/0x20 [ 220.137099][ T9152] ? __warn.cold+0x14/0x3c [ 220.141521][ T9152] ? debug_print_object+0x168/0x250 [ 220.146729][ T9152] __warn.cold+0x2f/0x3c [ 220.151005][ T9152] ? debug_print_object+0x168/0x250 [ 220.156207][ T9152] report_bug+0x289/0x300 [ 220.160541][ T9152] do_error_trap+0x11b/0x200 [ 220.165130][ T9152] do_invalid_op+0x37/0x50 [ 220.169549][ T9152] ? debug_print_object+0x168/0x250 [ 220.174751][ T9152] invalid_op+0x23/0x30 [ 220.178951][ T9152] RIP: 0010:debug_print_object+0x168/0x250 [ 220.184932][ T9152] Code: dd 60 6c e6 87 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 00 00 00 48 8b 14 dd 60 6c e6 87 48 c7 c7 c0 61 e6 87 e8 20 31 01 fe <0f> 0b 83 05 f3 67 83 06 01 48 83 c4 20 5b 41 5c 41 5d 41 5e 5d c3 [ 220.204625][ T9152] RSP: 0018:ffff8880567df938 EFLAGS: 00010086 [ 220.210697][ T9152] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 220.218845][ T9152] RDX: 0000000000040000 RSI: ffffffff815bd606 RDI: ffffed100acfbf19 [ 220.226819][ T9152] RBP: ffff8880567df978 R08: ffff888098308040 R09: ffffed1015d04109 [ 220.234794][ T9152] R10: ffffed1015d04108 R11: ffff8880ae820847 R12: 0000000000000001 [ 220.242789][ T9152] R13: ffffffff8935e800 R14: 0000000000000000 R15: ffff8880974a1578 [ 220.250790][ T9152] ? vprintk_func+0x86/0x189 [ 220.255399][ T9152] ? debug_print_object+0x168/0x250 [ 220.260671][ T9152] debug_check_no_obj_freed+0x2d4/0x43f [ 220.266232][ T9152] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 220.271815][ T9152] kfree+0xf8/0x2c0 [ 220.275633][ T9152] ext4_fill_super+0x8cb/0xcc80 [ 220.280517][ T9152] ? ext4_calculate_overhead+0x1250/0x1250 [ 220.286334][ T9152] ? vsprintf+0x40/0x40 [ 220.290501][ T9152] ? wait_for_completion+0x440/0x440 [ 220.295786][ T9152] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 220.301600][ T9152] ? set_blocksize+0x2bf/0x340 [ 220.306376][ T9152] mount_bdev+0x304/0x3c0 [ 220.310707][ T9152] ? mount_bdev+0x304/0x3c0 [ 220.315210][ T9152] ? ext4_calculate_overhead+0x1250/0x1250 [ 220.321021][ T9152] ext4_mount+0x35/0x40 [ 220.325279][ T9152] ? ext4_nfs_get_inode+0xe0/0xe0 [ 220.330327][ T9152] legacy_get_tree+0x113/0x220 [ 220.335093][ T9152] ? ns_capable_common+0x93/0x100 [ 220.340246][ T9152] vfs_get_tree+0x8f/0x380 [ 220.344759][ T9152] do_mount+0x13b3/0x1c30 [ 220.349121][ T9152] ? copy_mount_string+0x40/0x40 [ 220.354068][ T9152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.360308][ T9152] ? copy_mount_options+0x2e8/0x3f0 [ 220.365518][ T9152] ksys_mount+0xdb/0x150 [ 220.369789][ T9152] __x64_sys_mount+0xbe/0x150 [ 220.374472][ T9152] do_syscall_64+0xfa/0x760 [ 220.379069][ T9152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.384958][ T9152] RIP: 0033:0x45c2ca [ 220.388857][ T9152] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 220.408668][ T9152] RSP: 002b:00007f502cc3da88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 220.417110][ T9152] RAX: ffffffffffffffda RBX: 00007f502cc3db40 RCX: 000000000045c2ca [ 220.425085][ T9152] RDX: 00007f502cc3dae0 RSI: 0000000020000000 RDI: 00007f502cc3db00 [ 220.433074][ T9152] RBP: 0000000000001000 R08: 00007f502cc3db40 R09: 00007f502cc3dae0 [ 220.441494][ T9152] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000004 [ 220.449566][ T9152] R13: 00000000004c89d6 R14: 00000000004df8f8 R15: 00000000ffffffff [ 220.459788][ T9152] Kernel Offset: disabled [ 220.464271][ T9152] Rebooting in 86400 seconds..