[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 57.657557][ T23] audit: type=1800 audit(1575473864.589:25): pid=8712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 57.701432][ T23] audit: type=1800 audit(1575473864.589:26): pid=8712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 57.751600][ T23] audit: type=1800 audit(1575473864.589:27): pid=8712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.24' (ECDSA) to the list of known hosts. 2019/12/04 15:37:54 fuzzer started 2019/12/04 15:37:56 dialing manager at 10.128.0.26:41299 2019/12/04 15:37:56 syscalls: 2691 2019/12/04 15:37:56 code coverage: enabled 2019/12/04 15:37:56 comparison tracing: enabled 2019/12/04 15:37:56 extra coverage: extra coverage is not supported by the kernel 2019/12/04 15:37:56 setuid sandbox: enabled 2019/12/04 15:37:56 namespace sandbox: enabled 2019/12/04 15:37:56 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/04 15:37:56 fault injection: enabled 2019/12/04 15:37:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/04 15:37:56 net packet injection: enabled 2019/12/04 15:37:56 net device setup: enabled 2019/12/04 15:37:56 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/04 15:37:56 devlink PCI setup: PCI device 0000:00:10.0 is not available 15:40:07 executing program 0: r0 = inotify_init1(0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x7) 15:40:07 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x84882) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x2000005) syzkaller login: [ 200.412798][ T8878] IPVS: ftp: loaded support on port[0] = 21 [ 200.610285][ T8880] IPVS: ftp: loaded support on port[0] = 21 15:40:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f00000001c0)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r3 = semget$private(0x0, 0x7, 0x0) semop(r3, &(0x7f0000000100)=[{0x0, 0x10001}], 0x1) semop(r3, &(0x7f0000000340), 0x21) [ 200.658478][ T8878] chnl_net:caif_netlink_parms(): no params data found [ 200.769479][ T8878] bridge0: port 1(bridge_slave_0) entered blocking state [ 200.783415][ T8878] bridge0: port 1(bridge_slave_0) entered disabled state [ 200.803348][ T8878] device bridge_slave_0 entered promiscuous mode [ 200.827434][ T8878] bridge0: port 2(bridge_slave_1) entered blocking state [ 200.835823][ T8878] bridge0: port 2(bridge_slave_1) entered disabled state [ 200.844075][ T8878] device bridge_slave_1 entered promiscuous mode [ 200.860373][ T8884] IPVS: ftp: loaded support on port[0] = 21 15:40:07 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) pwritev(r1, &(0x7f0000000300)=[{&(0x7f0000000180)='M', 0x1}], 0x1, 0x0) [ 200.963079][ T8878] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 200.974642][ T8880] chnl_net:caif_netlink_parms(): no params data found [ 200.995807][ T8878] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.131559][ T8878] team0: Port device team_slave_0 added [ 201.168860][ T8878] team0: Port device team_slave_1 added [ 201.171120][ T8888] IPVS: ftp: loaded support on port[0] = 21 [ 201.200707][ T8880] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.208679][ T8880] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.217419][ T8880] device bridge_slave_0 entered promiscuous mode [ 201.225373][ T8884] chnl_net:caif_netlink_parms(): no params data found 15:40:08 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/232) r1 = dup2(r0, r0) preadv(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/248, 0xf8}], 0x1, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0x0) [ 201.386953][ T8878] device hsr_slave_0 entered promiscuous mode [ 201.443695][ T8878] device hsr_slave_1 entered promiscuous mode [ 201.483708][ T8880] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.490786][ T8880] bridge0: port 2(bridge_slave_1) entered disabled state 15:40:08 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000140)={&(0x7f00000000c0)=[0x0], 0x1}) [ 201.514319][ T8880] device bridge_slave_1 entered promiscuous mode [ 201.587224][ T8880] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.621131][ T8890] IPVS: ftp: loaded support on port[0] = 21 [ 201.648371][ T8884] bridge0: port 1(bridge_slave_0) entered blocking state [ 201.673408][ T8884] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.681083][ T8884] device bridge_slave_0 entered promiscuous mode [ 201.700273][ T8880] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 201.730486][ T8884] bridge0: port 2(bridge_slave_1) entered blocking state [ 201.738890][ T8884] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.746664][ T8884] device bridge_slave_1 entered promiscuous mode [ 201.787547][ T8878] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 201.835985][ T8878] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 201.886624][ T8878] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 201.895376][ T8892] IPVS: ftp: loaded support on port[0] = 21 [ 201.949125][ T8884] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 201.967480][ T8880] team0: Port device team_slave_0 added [ 201.981548][ T8878] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 202.037910][ T8884] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 202.048116][ T8880] team0: Port device team_slave_1 added [ 202.108191][ T8884] team0: Port device team_slave_0 added [ 202.135959][ T8884] team0: Port device team_slave_1 added [ 202.148289][ T8888] chnl_net:caif_netlink_parms(): no params data found [ 202.245174][ T8880] device hsr_slave_0 entered promiscuous mode [ 202.313654][ T8880] device hsr_slave_1 entered promiscuous mode [ 202.363374][ T8880] debugfs: Directory 'hsr0' with parent '/' already present! [ 202.425376][ T8884] device hsr_slave_0 entered promiscuous mode [ 202.463452][ T8884] device hsr_slave_1 entered promiscuous mode [ 202.513499][ T8884] debugfs: Directory 'hsr0' with parent '/' already present! [ 202.572649][ T8888] bridge0: port 1(bridge_slave_0) entered blocking state [ 202.580287][ T8888] bridge0: port 1(bridge_slave_0) entered disabled state [ 202.587999][ T8888] device bridge_slave_0 entered promiscuous mode [ 202.597734][ T8888] bridge0: port 2(bridge_slave_1) entered blocking state [ 202.606120][ T8888] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.614364][ T8888] device bridge_slave_1 entered promiscuous mode [ 202.681441][ T8880] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 202.738386][ T8880] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 202.798556][ T8880] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 202.855224][ T8888] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 202.881360][ T8892] chnl_net:caif_netlink_parms(): no params data found [ 202.913625][ T8880] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 202.944540][ T8884] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 202.997664][ T8888] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 203.042945][ T8890] chnl_net:caif_netlink_parms(): no params data found [ 203.052739][ T8884] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 203.097103][ T8884] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 203.169237][ T8884] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 203.227488][ T8888] team0: Port device team_slave_0 added [ 203.266694][ T8888] team0: Port device team_slave_1 added [ 203.296876][ T8892] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.304136][ T8892] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.311789][ T8892] device bridge_slave_0 entered promiscuous mode [ 203.336900][ T8890] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.345265][ T8890] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.352838][ T8890] device bridge_slave_0 entered promiscuous mode [ 203.368602][ T8892] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.375795][ T8892] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.383592][ T8892] device bridge_slave_1 entered promiscuous mode [ 203.436272][ T8888] device hsr_slave_0 entered promiscuous mode [ 203.495755][ T8888] device hsr_slave_1 entered promiscuous mode [ 203.534005][ T8888] debugfs: Directory 'hsr0' with parent '/' already present! [ 203.549145][ T8878] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.556513][ T8890] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.564214][ T8890] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.571789][ T8890] device bridge_slave_1 entered promiscuous mode [ 203.610981][ T8878] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.620675][ T8892] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 203.647843][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 203.656296][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.667813][ T8892] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 203.682763][ T8890] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 203.700809][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 203.710764][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.719340][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.726522][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.757319][ T8892] team0: Port device team_slave_0 added [ 203.764460][ T8890] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 203.788262][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 203.796624][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 203.805200][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.816878][ T8882] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.823922][ T8882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.853088][ T8890] team0: Port device team_slave_0 added [ 203.860285][ T8892] team0: Port device team_slave_1 added [ 203.887497][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 203.896333][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 203.905404][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 203.913998][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.922205][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 203.930900][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.939716][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.950966][ T8890] team0: Port device team_slave_1 added [ 203.957038][ T8888] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 204.012604][ T8888] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 204.096551][ T8892] device hsr_slave_0 entered promiscuous mode [ 204.123724][ T8892] device hsr_slave_1 entered promiscuous mode [ 204.183359][ T8892] debugfs: Directory 'hsr0' with parent '/' already present! [ 204.202286][ T8888] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 204.244679][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 204.252976][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 204.268185][ T8878] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 204.281147][ T8878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 204.346062][ T8890] device hsr_slave_0 entered promiscuous mode [ 204.383620][ T8890] device hsr_slave_1 entered promiscuous mode [ 204.433521][ T8890] debugfs: Directory 'hsr0' with parent '/' already present! [ 204.441544][ T8888] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 204.495612][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 204.504058][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 204.535843][ T8880] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.542650][ T8892] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 204.598763][ T8884] 8021q: adding VLAN 0 to HW filter on device bond0 [ 204.615688][ T8892] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 204.678040][ T8878] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 204.686407][ T8892] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 204.742674][ T8880] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.756895][ T8884] 8021q: adding VLAN 0 to HW filter on device team0 [ 204.766131][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 204.777487][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 204.784965][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.792518][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.800387][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 204.808067][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 204.816093][ T8890] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 204.857143][ T8890] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 204.905515][ T8890] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 204.977082][ T8892] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 205.031228][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.040784][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.049563][ T8898] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.056771][ T8898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.068355][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.077006][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.085312][ T8898] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.092354][ T8898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.099975][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.109165][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.117963][ T8898] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.125134][ T8898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.134140][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.146613][ T8898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.155140][ T8898] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.162158][ T8898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.170032][ T8890] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 205.253561][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.261660][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.270652][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.280309][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.289291][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.298434][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.307283][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.318299][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.350514][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.359333][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.368257][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.376674][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.385094][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.409196][ T8884] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 205.421042][ T8884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.438574][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.450447][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.462518][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.478054][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.496497][ T8888] 8021q: adding VLAN 0 to HW filter on device bond0 15:40:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120005000200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 205.523166][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 205.538235][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.550035][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.571998][ T8884] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 205.604811][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 205.612222][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 15:40:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@empty}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f0000000400)=[{&(0x7f0000000180)=""/228, 0xe4}], 0x1, 0x0) [ 205.629355][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 205.638415][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 205.654800][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 205.662573][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 205.688613][ T8888] 8021q: adding VLAN 0 to HW filter on device team0 [ 205.719617][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 205.729965][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 205.741209][ T8899] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.748303][ T8899] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.756487][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 205.764914][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 205.773715][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 205.790500][ T8880] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 205.859589][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 205.869223][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 205.882499][ T8882] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.889617][ T8882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.899430][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 205.909351][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 205.918028][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 205.927287][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 205.935836][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 205.944872][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 205.961492][ T8888] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 205.973625][ T8888] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 15:40:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x274}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) pipe(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') socket$inet6_sctp(0xa, 0x0, 0x84) preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) [ 206.004350][ T8892] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.018900][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 206.034540][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 15:40:13 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xd, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000000000005d00000000000200046b103b00000000008000950000000000000085100000000000000500000000000000850e000080000000001000000000000085100000000000001800000000004baf000000000000000085100000000000f2fc00000000000000"], &(0x7f00000004c0)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f0000000240)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x1d, 0x400, 0xc, 0x42}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f00000002c0)}, 0x1b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000002540)={r0, &(0x7f0000000340), &(0x7f0000002440)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000003c0)='c', &(0x7f0000000540)="40b7efeca4ba5c81f00acb1d81e8ec0aa28e59a674d6882e00ae429067b5a6a43d014613b95fe2bf8a813620957f29985952c1e7f91490e5c80ff109709bd04cd7"}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f00000002c0), &(0x7f0000000380)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000280), &(0x7f0000000400)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000580), &(0x7f0000000680)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000800)={r0, &(0x7f00000003c0), &(0x7f0000000700)}, 0x20) [ 206.052183][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.062280][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.071415][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.079987][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 206.087733][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 206.098287][ C1] hrtimer: interrupt took 31374 ns [ 206.112074][ T8880] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.129554][ T8892] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.150012][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 206.160866][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.169790][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 15:40:13 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) dup2(r0, r2) [ 206.223066][ T8890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.249281][ T8888] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.270289][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 206.287329][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.307052][ T8899] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.314201][ T8899] bridge0: port 1(bridge_slave_0) entered forwarding state 15:40:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180), 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000100)={'veth0\x00', @ifru_hwaddr=@random="e02dcf12b367"}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) r3 = dup2(r1, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000001fc0)=ANY=[@ANYBLOB]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 206.323598][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 206.333044][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.343010][ T8899] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.350145][ T8899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.357881][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.367499][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 206.375112][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 206.409991][ T8890] 8021q: adding VLAN 0 to HW filter on device team0 [ 206.483615][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.494796][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.509446][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 206.542879][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 206.552440][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 206.561601][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 206.570751][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 206.579731][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 206.588090][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 206.596142][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 206.610501][ T8892] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 206.627134][ T8892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 15:40:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_mr_vif\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(r1, r0, &(0x7f0000000040)=0x9, 0x7dff) [ 206.667268][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 206.676004][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 206.687796][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 206.696450][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 15:40:13 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x84882) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x2000005) [ 206.731438][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 206.741770][ T8882] bridge0: port 1(bridge_slave_0) entered blocking state [ 206.748900][ T8882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 206.797450][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 206.825241][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 15:40:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x274}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) pipe(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') socket$inet6_sctp(0xa, 0x0, 0x84) preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 15:40:13 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00001e3000/0x3000)=nil, 0x3000, 0x0, 0x4000000000000000, 0x0) [ 206.848507][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 206.876696][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 206.883867][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 206.897941][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.919421][ T8892] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 206.978002][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 206.996501][ T8968] mmap: syz-executor.3 (8968) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 207.014411][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 207.060058][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 207.094079][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 207.102239][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 207.140282][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 207.155149][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 207.182789][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 207.209011][ T8890] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 207.226168][ T8890] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 207.254378][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 207.262785][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 207.284162][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 207.292910][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 207.338546][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 207.387994][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 207.410613][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 207.437727][ T8890] 8021q: adding VLAN 0 to HW filter on device batadv0 15:40:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fsopen(&(0x7f0000000000)='configfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x6, 0x0, 0x0, 0x0) fsmount(r2, 0x0, 0x26) 15:40:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x13, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)={0x58, r2, 0x21, 0x0, 0x0, {}, [{{0x8, 0x1, r1}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) 15:40:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x84882) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x2000005) 15:40:15 executing program 3: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x0, 0x0) setresuid(0x0, r3, 0x0) r4 = shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_RMID(r4, 0x0) 15:40:15 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r2 = dup2(r1, r1) write$cgroup_type(r2, &(0x7f0000000140)='t\x02\x04\x00', 0xfffffefa) 15:40:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x274}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) pipe(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') socket$inet6_sctp(0xa, 0x0, 0x84) preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) [ 208.392436][ T9005] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 208.467321][ T9006] hugetlbfs: syz-executor.3 (9006): Using mlock ulimits for SHM_HUGETLB is deprecated 15:40:15 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000080)=""/52) socket$inet_udplite(0x2, 0x2, 0x88) lstat(0x0, &(0x7f0000000100)) setregid(0x0, 0x0) getgid() setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x16, &(0x7f00000002c0)={0x28, 0x6}) setuid(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) getpid() mmap(&(0x7f0000014000/0x2000)=nil, 0x2000, 0x8, 0x40010, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x576, 0x4) connect(r2, &(0x7f00000001c0)=@in={0x2, 0x4e20, @remote}, 0x80) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000d7, 0xa000000) syz_open_dev$amidi(0x0, 0x3f, 0x32300) [ 208.512516][ T9017] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 208.523518][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 208.529539][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:40:15 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x84882) r1 = memfd_create(&(0x7f0000000380)='iC;`\xb6p+\x10', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x2000005) 15:40:15 executing program 3: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x0, 0x0) setresuid(0x0, r3, 0x0) r4 = shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_RMID(r4, 0x0) 15:40:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x13, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)={0x58, r2, 0x21, 0x0, 0x0, {}, [{{0x8, 0x1, r1}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) [ 208.843268][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 208.849064][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 208.949033][ T9022] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:40:16 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000200)={'eql\x00`\x02\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) [ 209.046384][ T9032] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 15:40:16 executing program 3: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x0, 0x0) setresuid(0x0, r3, 0x0) r4 = shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_RMID(r4, 0x0) 15:40:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x13, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)={0x58, r2, 0x21, 0x0, 0x0, {}, [{{0x8, 0x1, r1}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) 15:40:16 executing program 3: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x0, 0x0) setresuid(0x0, r3, 0x0) r4 = shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_RMID(r4, 0x0) 15:40:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0, 0x274}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) pipe(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') socket$inet6_sctp(0xa, 0x0, 0x84) preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 15:40:16 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r2 = dup2(r1, r1) write$cgroup_type(r2, &(0x7f0000000140)='t\x02\x04\x00', 0xfffffefa) [ 209.345305][ T9035] : renamed from eql [ 209.394908][ T9046] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 15:40:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x13, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)={0x58, r2, 0x21, 0x0, 0x0, {}, [{{0x8, 0x1, r1}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) 15:40:16 executing program 3: personality(0x154475b067e3966f) uname(&(0x7f0000000000)=""/57) [ 209.661409][ T9060] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 209.803366][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 209.809171][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:40:16 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xa, 0x12, r0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYRES64=0x0]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001300), 0x2e4, 0x0) 15:40:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'bridge0\x00'}, @IFLA_ADDRESS={0xc}]}, 0x40}}, 0x0) 15:40:16 executing program 1: r0 = socket(0x10, 0x80803, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x7}, 0x10) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000001a0007041dfffd946f610500020000e8fe02080100010800080004000400ff7e", 0x24}], 0x1}, 0x0) 15:40:16 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, 0x0) 15:40:16 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000080)=""/52) socket$inet_udplite(0x2, 0x2, 0x88) lstat(0x0, &(0x7f0000000100)) setregid(0x0, 0x0) getgid() setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x16, &(0x7f00000002c0)={0x28, 0x6}) setuid(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) getpid() mmap(&(0x7f0000014000/0x2000)=nil, 0x2000, 0x8, 0x40010, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x576, 0x4) connect(r2, &(0x7f00000001c0)=@in={0x2, 0x4e20, @remote}, 0x80) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000d7, 0xa000000) syz_open_dev$amidi(0x0, 0x3f, 0x32300) [ 210.043871][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 210.050401][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:40:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'bridge0\x00'}, @IFLA_ADDRESS={0xc}]}, 0x40}}, 0x0) 15:40:17 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000080)=""/52) socket$inet_udplite(0x2, 0x2, 0x88) lstat(0x0, &(0x7f0000000100)) setregid(0x0, 0x0) getgid() setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x16, &(0x7f00000002c0)={0x28, 0x6}) setuid(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) getpid() mmap(&(0x7f0000014000/0x2000)=nil, 0x2000, 0x8, 0x40010, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x576, 0x4) connect(r2, &(0x7f00000001c0)=@in={0x2, 0x4e20, @remote}, 0x80) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000d7, 0xa000000) syz_open_dev$amidi(0x0, 0x3f, 0x32300) 15:40:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'bridge0\x00'}, @IFLA_ADDRESS={0xc}]}, 0x40}}, 0x0) [ 210.367735][ T9089] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 15:40:17 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r2 = dup2(r1, r1) write$cgroup_type(r2, &(0x7f0000000140)='t\x02\x04\x00', 0xfffffefa) 15:40:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'bridge0\x00'}, @IFLA_ADDRESS={0xc}]}, 0x40}}, 0x0) 15:40:17 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, 0x0) 15:40:17 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xa, 0x12, r0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYRES64=0x0]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001300), 0x2e4, 0x0) 15:40:17 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xa, 0x12, r0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYRES64=0x0]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001300), 0x2e4, 0x0) [ 210.923679][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 210.929758][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:40:18 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, 0x0) 15:40:18 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000080)=""/52) socket$inet_udplite(0x2, 0x2, 0x88) lstat(0x0, &(0x7f0000000100)) setregid(0x0, 0x0) getgid() setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x16, &(0x7f00000002c0)={0x28, 0x6}) setuid(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) getpid() mmap(&(0x7f0000014000/0x2000)=nil, 0x2000, 0x8, 0x40010, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x576, 0x4) connect(r2, &(0x7f00000001c0)=@in={0x2, 0x4e20, @remote}, 0x80) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000d7, 0xa000000) syz_open_dev$amidi(0x0, 0x3f, 0x32300) 15:40:18 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xa, 0x12, r0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYRES64=0x0]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001300), 0x2e4, 0x0) 15:40:19 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000080)=""/52) socket$inet_udplite(0x2, 0x2, 0x88) lstat(0x0, &(0x7f0000000100)) setregid(0x0, 0x0) getgid() setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x16, &(0x7f00000002c0)={0x28, 0x6}) setuid(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) getpid() mmap(&(0x7f0000014000/0x2000)=nil, 0x2000, 0x8, 0x40010, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x576, 0x4) connect(r2, &(0x7f00000001c0)=@in={0x2, 0x4e20, @remote}, 0x80) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000d7, 0xa000000) syz_open_dev$amidi(0x0, 0x3f, 0x32300) 15:40:19 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r2 = dup2(r1, r1) write$cgroup_type(r2, &(0x7f0000000140)='t\x02\x04\x00', 0xfffffefa) 15:40:19 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$EVIOCGREP(r0, 0x4010744d, 0x0) 15:40:19 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xa, 0x12, r0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYRES64=0x0]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001300), 0x2e4, 0x0) 15:40:19 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xa, 0x12, r0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYRES64=0x0]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001300), 0x2e4, 0x0) 15:40:19 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cuse\x00', 0x2842, 0x0) io_setup(0x1, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000002600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 15:40:19 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000080)=""/52) socket$inet_udplite(0x2, 0x2, 0x88) lstat(0x0, &(0x7f0000000100)) setregid(0x0, 0x0) getgid() setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x16, &(0x7f00000002c0)={0x28, 0x6}) setuid(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) getpid() mmap(&(0x7f0000014000/0x2000)=nil, 0x2000, 0x8, 0x40010, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x576, 0x4) connect(r2, &(0x7f00000001c0)=@in={0x2, 0x4e20, @remote}, 0x80) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000d7, 0xa000000) syz_open_dev$amidi(0x0, 0x3f, 0x32300) 15:40:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xb40c0000, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="a00000001000010800000c00000003256de1e32f", @ANYRES32=0x0, @ANYBLOB="000000000000000078002b0074000100000000810a0300"/80, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="08000000000000000000000000000000100000000000000000000000000000000000000008001b0000000000"], 0xa0}}, 0x0) [ 212.980810][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 15:40:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "f0f3c23db58cbd48", "4a80970c81539622b93494f5266177be2f653d878723c5509f129ac6b5d7f2a9", "43d5f174", "ef770a7deeb0ad10"}, 0x38) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000140), 0x4) [ 213.070761][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 15:40:20 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xa, 0x12, r0, 0x0) mount$fuseblk(0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYRES64=0x0]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000001300), 0x2e4, 0x0) [ 213.130729][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 15:40:20 executing program 3: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000009c0)='.\x00\x9d\xfa\xb3\x13\x86.\x13', 0x0, 0x0) lseek(r0, 0xfffffffffffff000, 0x3) [ 213.179641][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 213.224681][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 15:40:20 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000080)=""/52) socket$inet_udplite(0x2, 0x2, 0x88) lstat(0x0, &(0x7f0000000100)) setregid(0x0, 0x0) getgid() setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x16, &(0x7f00000002c0)={0x28, 0x6}) setuid(0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) getpid() mmap(&(0x7f0000014000/0x2000)=nil, 0x2000, 0x8, 0x40010, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x576, 0x4) connect(r2, &(0x7f00000001c0)=@in={0x2, 0x4e20, @remote}, 0x80) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000d7, 0xa000000) syz_open_dev$amidi(0x0, 0x3f, 0x32300) 15:40:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6818a43c7f00128c768100"}, 0x1c) sendmmsg(r2, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x40000}], 0xc6, 0x24000000) [ 213.396254][ T9148] validate_nla: 3 callbacks suppressed [ 213.396281][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 213.539260][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 15:40:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "f0f3c23db58cbd48", "4a80970c81539622b93494f5266177be2f653d878723c5509f129ac6b5d7f2a9", "43d5f174", "ef770a7deeb0ad10"}, 0x38) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000140), 0x4) [ 213.659955][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 213.721530][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 15:40:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "f0f3c23db58cbd48", "4a80970c81539622b93494f5266177be2f653d878723c5509f129ac6b5d7f2a9", "43d5f174", "ef770a7deeb0ad10"}, 0x38) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000140), 0x4) [ 213.792633][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 213.853878][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 213.883617][ T9148] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 213.890987][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 213.954023][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 213.988412][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 214.033157][ T9148] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 214.069440][ T9148] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 15:40:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x304}, "f0f3c23db58cbd48", "4a80970c81539622b93494f5266177be2f653d878723c5509f129ac6b5d7f2a9", "43d5f174", "ef770a7deeb0ad10"}, 0x38) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000140), 0x4) 15:40:21 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x11, &(0x7f00000001c0)={r2}, 0x8) [ 214.094553][ T9148] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 15:40:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6818a43c7f00128c768100"}, 0x1c) sendmmsg(r2, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x40000}], 0xc6, 0x24000000) 15:40:21 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000003c0)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 15:40:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xb40c0000, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="a00000001000010800000c00000003256de1e32f", @ANYRES32=0x0, @ANYBLOB="000000000000000078002b0074000100000000810a0300"/80, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="08000000000000000000000000000000100000000000000000000000000000000000000008001b0000000000"], 0xa0}}, 0x0) 15:40:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$llc(0xffffffffffffffff, &(0x7f0000000000), 0x10) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000001800)={0x41c4a1d06427aaf8}) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x0, 0xfff, 0x49f}}, 0x30) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f00000001c0)=""/195) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xfffff000, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b00000000004610352db137112284aab2360a9acf09d20aab9b5d1e1fdf5bd80d2e602dd5988e90bf7b15ffd0ec8251d92dcc025fa83398a8acfb02ee8f86467121dcf6ccf2fab4d3b503e0ea651c02fdc849c72bad9a678edc6b8e222af4fe10989c6f47d32ff5a25d989961c2146d920f288b4cefa0b88c643fcfe197a3e4d77c083a09db19def7ed3f58331646e2b48b3c"], 0x28}}, 0x0) 15:40:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x9c}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 15:40:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0xffffffffffffff4f) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 214.879929][ T9207] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 214.892591][ T9200] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 15:40:21 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000003c0)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 15:40:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6818a43c7f00128c768100"}, 0x1c) sendmmsg(r2, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x40000}], 0xc6, 0x24000000) 15:40:22 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000003c0)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 215.180748][ T9200] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 215.254691][ T9200] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.482612][ T9198] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 215.580003][ T9198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 15:40:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xb40c0000, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="a00000001000010800000c00000003256de1e32f", @ANYRES32=0x0, @ANYBLOB="000000000000000078002b0074000100000000810a0300"/80, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="08000000000000000000000000000000100000000000000000000000000000000000000008001b0000000000"], 0xa0}}, 0x0) [ 215.681549][ T9198] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 15:40:22 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000003c0)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 15:40:22 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) 15:40:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r3, 0x1f00000000000000, 0x400000000000d4, &(0x7f0000000000)=0x6, 0x4) 15:40:22 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000003c0)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 216.069407][ T9226] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 15:40:23 executing program 5: getpid() r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40186f40, 0x76002d) 15:40:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000040)={0x1}, 0x8) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6818a43c7f00128c768100"}, 0x1c) sendmmsg(r2, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0}, 0x40000}], 0xc6, 0x24000000) 15:40:23 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 216.397467][ T9226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.461515][ T9226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 15:40:23 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000003c0)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 15:40:23 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000003c0)=@fragment, 0x8) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 15:40:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r3, 0x1f00000000000000, 0x400000000000d4, &(0x7f0000000000)=0x6, 0x4) 15:40:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0xb40c0000, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="a00000001000010800000c00000003256de1e32f", @ANYRES32=0x0, @ANYBLOB="000000000000000078002b0074000100000000810a0300"/80, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="08000000000000000000000000000000100000000000000000000000000000000000000008001b0000000000"], 0xa0}}, 0x0) 15:40:23 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 217.629197][ T9265] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 15:40:24 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 218.058548][ T9265] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 15:40:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 218.123792][ T9265] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 15:40:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r3, 0x1f00000000000000, 0x400000000000d4, &(0x7f0000000000)=0x6, 0x4) 15:40:25 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:25 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r3, 0x1f00000000000000, 0x400000000000d4, &(0x7f0000000000)=0x6, 0x4) 15:40:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r3, 0x1f00000000000000, 0x400000000000d4, &(0x7f0000000000)=0x6, 0x4) 15:40:26 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002240)=@polexpire={0xcc, 0x1b, 0x109, 0x0, 0x0, {{{@in=@broadcast, @in=@loopback}}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0xcc}}, 0x0) 15:40:26 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000100)={0x94000000, 0x7f, 0x39}) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') dup3(r2, r1, 0x0) 15:40:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r3, 0x1f00000000000000, 0x400000000000d4, &(0x7f0000000000)=0x6, 0x4) 15:40:26 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000200), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000200), &(0x7f0000000240)="e4", 0x1}, 0x20) 15:40:26 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002240)=@polexpire={0xcc, 0x1b, 0x109, 0x0, 0x0, {{{@in=@broadcast, @in=@loopback}}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0xcc}}, 0x0) 15:40:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r2, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r3, 0x1f00000000000000, 0x400000000000d4, &(0x7f0000000000)=0x6, 0x4) 15:40:27 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:27 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r1, 0x0, 0xc478, 0x5) fallocate(r1, 0x0, 0x0, 0x4005ef3) fallocate(r1, 0x0, 0x4, 0x108006) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18}, 0x18) fallocate(r2, 0x0, 0x0, 0x4005ef3) fallocate(r2, 0x3, 0x4, 0x108006) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f00000001c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 15:40:27 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000100)={0x94000000, 0x7f, 0x39}) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') dup3(r2, r1, 0x0) 15:40:27 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000100)={0x94000000, 0x7f, 0x39}) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') dup3(r2, r1, 0x0) 15:40:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002240)=@polexpire={0xcc, 0x1b, 0x109, 0x0, 0x0, {{{@in=@broadcast, @in=@loopback}}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0xcc}}, 0x0) 15:40:27 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) bind$packet(r0, &(0x7f0000000380)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) 15:40:27 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002240)=@polexpire={0xcc, 0x1b, 0x109, 0x0, 0x0, {{{@in=@broadcast, @in=@loopback}}}, [@sec_ctx={0xc, 0x8, {0x8}}]}, 0xcc}}, 0x0) 15:40:27 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000100)={0x94000000, 0x7f, 0x39}) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') dup3(r2, r1, 0x0) 15:40:27 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000100)={0x94000000, 0x7f, 0x39}) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') dup3(r2, r1, 0x0) 15:40:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#.\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000480)={0x7fffffff, 0x0, 'client0\x00', 0x0, "d7fc38c86c3a1f1a", "25e2530edf4182014a742ee57838df65a9427bd9f24e5568b7febcd776c39373"}) 15:40:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500022881001f038b050400080008001e004000ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 15:40:27 executing program 1: socket(0x10, 0x3, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0xa, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket(0xa, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket(0xa, 0x2, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/urandom\x00', 0x0, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001780)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$unix(0x1, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) dup2(r4, r3) dup2(0xffffffffffffffff, 0xffffffffffffffff) 15:40:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x1000000, 0x1}]}]}}, &(0x7f0000000240)=""/235, 0x2e, 0xeb, 0x1}, 0x20) 15:40:27 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000100)={0x94000000, 0x7f, 0x39}) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') dup3(r2, r1, 0x0) [ 220.802536][ T9378] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:40:27 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000100)={0x94000000, 0x7f, 0x39}) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') dup3(r2, r1, 0x0) 15:40:27 executing program 2: socket$inet(0x10, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x2000800c}, 0x4184) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 15:40:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#.\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000480)={0x7fffffff, 0x0, 'client0\x00', 0x0, "d7fc38c86c3a1f1a", "25e2530edf4182014a742ee57838df65a9427bd9f24e5568b7febcd776c39373"}) 15:40:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETS2(r0, 0x5434, 0x0) 15:40:28 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x287}}], 0x4000000000000b2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r0, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x333, 0x0) 15:40:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#.\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000480)={0x7fffffff, 0x0, 'client0\x00', 0x0, "d7fc38c86c3a1f1a", "25e2530edf4182014a742ee57838df65a9427bd9f24e5568b7febcd776c39373"}) 15:40:28 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = getpgrp(0x0) lstat(&(0x7f0000000240)='.\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(0x0, &(0x7f0000000180), &(0x7f0000000200)) r5 = shmget$private(0x0, 0x2000, 0x1, &(0x7f0000ffd000/0x2000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x1800) timerfd_create(0x0, 0x0) r6 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r6, 0x227a, &(0x7f00000002c0)) r7 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r7, 0x227a, &(0x7f00000002c0)) r8 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r8, 0x227a, &(0x7f00000002c0)) r9 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r9, 0x227a, &(0x7f00000002c0)) r10 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r10, 0x227a, &(0x7f00000002c0)) fstat(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r11, 0x0, 0x0) r12 = timerfd_create(0x0, 0x0) fstat(r12, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r13, 0x0, 0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000300)={{0x5, 0x0, r11, r4, r13, 0x0, 0x2}, 0x0, 0x400, 0x101, 0x1000000, r3, 0x0, 0x3}) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000001c0), 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r14 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r14, 0x7fff) sendfile(r1, r14, 0x0, 0x8040fffffffd) [ 221.323289][ C0] net_ratelimit: 6 callbacks suppressed [ 221.323297][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 221.334826][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:40:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000002c0)='em0vmnet1#.\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000480)={0x7fffffff, 0x0, 'client0\x00', 0x0, "d7fc38c86c3a1f1a", "25e2530edf4182014a742ee57838df65a9427bd9f24e5568b7febcd776c39373"}) [ 221.416411][ T9414] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 221.643740][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 221.650319][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 221.794224][ T9424] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 15:40:28 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r0, 0x800002, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00'], 0x1) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, 0x0, 0x800) fallocate(r0, 0x3, 0x0, 0x8020003) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x0, 0x82, 0x9, 0x5, 0x2, 0x3e, 0x0, 0x276, 0x40, 0x1aa, 0x10001, 0x0, 0x38, 0x2, 0x0, 0x7, 0x3f}, [{0x70000000, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x10001, 0x3}, {0x6, 0x4, 0x8, 0x2, 0x9, 0x67ce71c, 0x0, 0xc5}], "", [[], [], [], [], [], [], []]}, 0x7b0) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000014200000002c000000290700a09d0000000000000000"], 0x1c) lseek(r0, 0x0, 0x3) 15:40:28 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sysfs$2(0x2, 0x4, &(0x7f0000000000)=""/83) 15:40:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r3, 0x0, 0xd, 0x0, 0x0) 15:40:28 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = getpgrp(0x0) lstat(&(0x7f0000000240)='.\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(0x0, &(0x7f0000000180), &(0x7f0000000200)) r5 = shmget$private(0x0, 0x2000, 0x1, &(0x7f0000ffd000/0x2000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x1800) timerfd_create(0x0, 0x0) r6 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r6, 0x227a, &(0x7f00000002c0)) r7 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r7, 0x227a, &(0x7f00000002c0)) r8 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r8, 0x227a, &(0x7f00000002c0)) r9 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r9, 0x227a, &(0x7f00000002c0)) r10 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r10, 0x227a, &(0x7f00000002c0)) fstat(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r11, 0x0, 0x0) r12 = timerfd_create(0x0, 0x0) fstat(r12, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r13, 0x0, 0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000300)={{0x5, 0x0, r11, r4, r13, 0x0, 0x2}, 0x0, 0x400, 0x101, 0x1000000, r3, 0x0, 0x3}) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000001c0), 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r14 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r14, 0x7fff) sendfile(r1, r14, 0x0, 0x8040fffffffd) 15:40:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sysfs$2(0x2, 0x4, &(0x7f0000000000)=""/83) 15:40:29 executing program 2: socket$inet(0x10, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x2000800c}, 0x4184) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 15:40:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000d00)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) read(r0, &(0x7f0000000040)=""/127, 0x7f) write$input_event(r0, &(0x7f0000000000)={{0x77359400}}, 0xfe4f) 15:40:29 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x287}}], 0x4000000000000b2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r0, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x333, 0x0) 15:40:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sysfs$2(0x2, 0x4, &(0x7f0000000000)=""/83) [ 222.271108][ T9450] input: syz1 as /devices/virtual/input/input5 [ 222.453366][ T9450] input: syz1 as /devices/virtual/input/input6 15:40:29 executing program 0: socket$inet(0x10, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x2000800c}, 0x4184) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 15:40:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='dctcp\x00', 0x1fc) sendto$inet6(r0, &(0x7f0000000100)="b4", 0xfffffe46, 0x20000002, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) 15:40:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = getpgrp(0x0) lstat(&(0x7f0000000240)='.\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(0x0, &(0x7f0000000180), &(0x7f0000000200)) r5 = shmget$private(0x0, 0x2000, 0x1, &(0x7f0000ffd000/0x2000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x1800) timerfd_create(0x0, 0x0) r6 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r6, 0x227a, &(0x7f00000002c0)) r7 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r7, 0x227a, &(0x7f00000002c0)) r8 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r8, 0x227a, &(0x7f00000002c0)) r9 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r9, 0x227a, &(0x7f00000002c0)) r10 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r10, 0x227a, &(0x7f00000002c0)) fstat(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r11, 0x0, 0x0) r12 = timerfd_create(0x0, 0x0) fstat(r12, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r13, 0x0, 0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000300)={{0x5, 0x0, r11, r4, r13, 0x0, 0x2}, 0x0, 0x400, 0x101, 0x1000000, r3, 0x0, 0x3}) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000001c0), 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r14 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r14, 0x7fff) sendfile(r1, r14, 0x0, 0x8040fffffffd) [ 222.843304][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 222.849136][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:40:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sysfs$2(0x2, 0x4, &(0x7f0000000000)=""/83) 15:40:30 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) timer_create(0x0, 0x0, 0x0) r1 = dup(r0) shmget(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setuid(0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = getpgrp(0x0) lstat(&(0x7f0000000240)='.\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(0x0, &(0x7f0000000180), &(0x7f0000000200)) r5 = shmget$private(0x0, 0x2000, 0x1, &(0x7f0000ffd000/0x2000)=nil) shmat(r5, &(0x7f0000ffd000/0x3000)=nil, 0x1800) timerfd_create(0x0, 0x0) r6 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r6, 0x227a, &(0x7f00000002c0)) r7 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r7, 0x227a, &(0x7f00000002c0)) r8 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r8, 0x227a, &(0x7f00000002c0)) r9 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r9, 0x227a, &(0x7f00000002c0)) r10 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r10, 0x227a, &(0x7f00000002c0)) fstat(r10, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r11, 0x0, 0x0) r12 = timerfd_create(0x0, 0x0) fstat(r12, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r13, 0x0, 0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000300)={{0x5, 0x0, r11, r4, r13, 0x0, 0x2}, 0x0, 0x400, 0x101, 0x1000000, r3, 0x0, 0x3}) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f00000001c0), 0x4) rmdir(0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r14 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r14, 0x7fff) sendfile(r1, r14, 0x0, 0x8040fffffffd) [ 223.083303][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 223.089350][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:40:30 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x287}}], 0x4000000000000b2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r0, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x333, 0x0) [ 223.403330][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 223.409132][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:40:30 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="120800000083c9c4", 0x8}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/216) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 15:40:30 executing program 2: socket$inet(0x10, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x2000800c}, 0x4184) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 15:40:30 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000180), 0x400024c, 0x0) 15:40:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x103}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 15:40:30 executing program 0: socket$inet(0x10, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x2000800c}, 0x4184) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 15:40:30 executing program 2: socket$inet(0x10, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x2000800c}, 0x4184) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 15:40:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000000c0)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x287}}], 0x4000000000000b2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) flock(r0, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x333, 0x0) 15:40:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x321400, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc01456b8, &(0x7f0000000040)={0x0, {0x14, 0x14}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 15:40:31 executing program 0: socket$inet(0x10, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lseek(r0, 0x0, 0x1) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x2000800c}, 0x4184) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000100)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x20}}, 0x0) 15:40:31 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="120800000083c9c4", 0x8}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/216) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 15:40:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 15:40:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 15:40:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x321400, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc01456b8, &(0x7f0000000040)={0x0, {0x14, 0x14}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 15:40:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 15:40:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) [ 226.133438][ T21] tipc: TX() has been purged, node left! 15:40:33 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 15:40:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x321400, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc01456b8, &(0x7f0000000040)={0x0, {0x14, 0x14}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) [ 226.878693][ T9586] IPVS: ftp: loaded support on port[0] = 21 [ 227.422654][ T9586] chnl_net:caif_netlink_parms(): no params data found [ 227.424479][ T9604] IPVS: ftp: loaded support on port[0] = 21 [ 227.484058][ T9586] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.491306][ T9586] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.499260][ T9586] device bridge_slave_0 entered promiscuous mode [ 227.507357][ T9586] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.514769][ T9586] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.522371][ T9586] device bridge_slave_1 entered promiscuous mode [ 227.540633][ T9586] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 227.551858][ T9586] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.586580][ T9586] team0: Port device team_slave_0 added [ 227.671221][ T9586] team0: Port device team_slave_1 added [ 227.735216][ T9586] device hsr_slave_0 entered promiscuous mode [ 227.773632][ T9586] device hsr_slave_1 entered promiscuous mode [ 227.843422][ T9586] debugfs: Directory 'hsr0' with parent '/' already present! [ 227.855683][ T9604] chnl_net:caif_netlink_parms(): no params data found [ 227.957534][ T9604] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.966181][ T9604] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.974397][ T9604] device bridge_slave_0 entered promiscuous mode [ 227.982613][ T9604] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.989848][ T9604] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.997667][ T9604] device bridge_slave_1 entered promiscuous mode [ 228.021011][ T9604] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 228.032046][ T9604] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 228.057098][ T9586] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.064341][ T9586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.071947][ T9586] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.079022][ T9586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.091109][ T9604] team0: Port device team_slave_0 added [ 228.098986][ T9604] team0: Port device team_slave_1 added [ 228.156424][ T9604] device hsr_slave_0 entered promiscuous mode [ 228.193622][ T9604] device hsr_slave_1 entered promiscuous mode [ 228.233283][ T9604] debugfs: Directory 'hsr0' with parent '/' already present! [ 228.328427][ T9604] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.335513][ T9604] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.342801][ T9604] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.349872][ T9604] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.395218][ T9586] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.412997][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.427133][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.435115][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.443758][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 228.455725][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 228.463419][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 228.479203][ T9586] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.492083][ T9604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.500884][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.509504][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.518429][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.525528][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.630435][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.639283][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.647631][ T8882] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.654730][ T8882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.662919][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.671561][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.689772][ T9604] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.705344][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.717177][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.725678][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.733281][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.740833][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.749382][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.758454][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.769150][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.777579][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.784631][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.792160][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.800788][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.809083][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.816174][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.824958][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.850301][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.859529][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.871285][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.880124][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.889471][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.898056][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.906344][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.914840][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.925899][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.933757][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.942056][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.026098][ T9604] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 229.038125][ T9604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.049259][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.061541][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.073024][ T9586] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 229.084657][ T9586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.097585][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.106360][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.136401][ T9586] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.148168][ T9604] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.164964][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.172419][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.191109][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 229.198746][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.534198][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 229.540252][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 229.643385][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 229.649235][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 229.963444][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 229.969246][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 230.445303][ T21] device bridge_slave_1 left promiscuous mode [ 230.451684][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.496822][ T21] device bridge_slave_0 left promiscuous mode [ 230.503426][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.373722][ T21] device hsr_slave_0 left promiscuous mode [ 232.423480][ T21] device hsr_slave_1 left promiscuous mode [ 232.467476][ T21] team0 (unregistering): Port device team_slave_1 removed [ 232.479213][ T21] team0 (unregistering): Port device team_slave_0 removed [ 232.492409][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 232.532298][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 232.632720][ T21] bond0 (unregistering): Released all slaves 15:40:39 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x321400, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$VIDIOC_G_CROP(0xffffffffffffffff, 0xc01456b8, &(0x7f0000000040)={0x0, {0x14, 0x14}}) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) syz_read_part_table(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 15:40:39 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x80003, 0x6b) dup2(r1, r0) 15:40:39 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="120800000083c9c4", 0x8}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/216) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 15:40:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 15:40:39 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 15:40:39 executing program 2: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(r0, &(0x7f0000003640)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[{0x10, 0x110, 0x1}], 0x10}}], 0x1, 0x0) [ 232.821718][ T9626] syz-executor.2 (9626) used greatest stack depth: 22440 bytes left 15:40:39 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 15:40:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 15:40:40 executing program 1: r0 = fsopen(&(0x7f00000005c0)='securityfs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000180)='dirsync\x00', 0x0, 0x0) 15:40:40 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = memfd_create(&(0x7f0000000280)='queue1\x00\x00\x00\x00\xe5\xff\xff\xff1;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\xfc\x00\xcc\xbf\x7f\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00\xff\x04\xb6,a\xb8pULE~~\xf5m \x10p\xe4\xfc\xea=\xd9\x01#{w\xe4\xa4\xbc\xdb/\x05\xaa\x1c\x0f\x83\x14k>I\x05\xd2\x83ic\x9fJD\xdf\xe4\xcd\xc4t z\xba!', 0x0) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 15:40:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 15:40:40 executing program 4: getpgid(0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc), 0x4) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f00000004c0)={&(0x7f0000000480)}}, &(0x7f0000000680)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0xffffffff7fffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(0x0, 0x0, 0x10000) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xe0800, 0x0) bind$ax25(r3, &(0x7f00000003c0)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) pipe(&(0x7f0000000d40)) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/242, 0xf2}, {0x0}, {&(0x7f0000000500)=""/96, 0x60}, {0x0}, {0x0}], 0x6, &(0x7f0000000800)=""/217, 0xd9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 15:40:40 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000680)='\x00@\x00\x02\x00\x00\xff\x05\x00x\x92\x12\xbc\x06^\xbewV\xf3\xb3\xa4\x1d\xfb\xc5}\x9c\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xcajU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t\x15\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\x00\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|b\xe2\xff\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2oci(\xcb\x82\x05\xfe[H\xaf\x01\x18\xcc\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\x15\xc1&dC\x06`\xda\xc9\xf5<;\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa2\x13\xc9\x80\xc5\x99U\x049:\x1d\xdb\xccp\xc5\x93I\xb8\xb3w\x90t\xbc\xb2\x16\x85\xbe\xb4\x15\x8a\x9e\x8a\x95\fQ\xb0\xf1\x1a\xbdW\xbc\x8b>;\xf4\xcd\xa1\x14\xbd\xdd/\xd0?\xa8+\xc4\aSG\xdd\x85*\xea\xb28\xa7\xfdM\xc8\xa5l\x11Y\x9e3\xb3\x01\xd8DV\x01\t\x1c\xf4\x8eL\xf6?\x9d\x1egB\xe1\x94\x01\x86\x00\v5\x9b\x9c\x83\xbd[\x15\xbb0S\xde\xfe$\x05\xf3\xf0\x1dL?Y\xedVN \xeen\x1c\x94\xa7\xb0\xf0\a;\x18O\x97\xd9\a\xc6Ie\xf3U\x8f\xc1\x1a\x91\xfc\x90\x83\xd7H\xab\xe4\x8dG}*\x0fC\x83\xf1\x19\x91\x92\xc7\xa9\xd1P\v\xc8\x87\x1fP<9[J\x15\xa7\v\xcc\x00Xn)\xa9}:\xf2\x06\xec\xaf\x9fK\tcG\xea[\vb\x85\xbc@\x8a\x9d\x1a') close(r0) 15:40:40 executing program 0: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) write$P9_RRENAME(r2, &(0x7f0000000000)={0x7, 0x15, 0x1}, 0x7) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r3, 0x1, 0x2f, &(0x7f0000000180), 0xf0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000001c0)='syz_tun\x00', 0x10) r4 = dup2(r3, r3) write$cgroup_type(r4, &(0x7f0000000140)='t\x02\x04\x00', 0xfffffefa) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) 15:40:40 executing program 5: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) close(r0) 15:40:40 executing program 2: ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x2) splice(r0, 0x0, r1, 0x0, 0x18, 0x0) 15:40:40 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f0000000000)="120800000083c9c4", 0x8}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/216) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 15:40:40 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000040)='raiJ\x7f\x0e', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffbf, 0x0) r0 = socket(0x8, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0/bus\x00', r1, 0x0) r2 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000180)=@ng={0x4, 0x14, "dd576af94c5f51b25f5cc0e0ca35788f5da2d0"}, 0xffffffffffffffb2, 0x2) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) [ 234.060787][ T23] kauditd_printk_skb: 3 callbacks suppressed [ 234.060800][ T23] audit: type=1800 audit(1575474040.989:31): pid=9682 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16594 res=0 15:40:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_CONTROL(r1, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) dup3(r0, r1, 0x0) 15:40:41 executing program 4: getpgid(0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc), 0x4) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f00000004c0)={&(0x7f0000000480)}}, &(0x7f0000000680)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0xffffffff7fffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(0x0, 0x0, 0x10000) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xe0800, 0x0) bind$ax25(r3, &(0x7f00000003c0)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) pipe(&(0x7f0000000d40)) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/242, 0xf2}, {0x0}, {&(0x7f0000000500)=""/96, 0x60}, {0x0}, {0x0}], 0x6, &(0x7f0000000800)=""/217, 0xd9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 234.187754][ T9688] IPVS: ftp: loaded support on port[0] = 21 15:40:41 executing program 1: getpgid(0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc), 0x4) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f00000004c0)={&(0x7f0000000480)}}, &(0x7f0000000680)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0xffffffff7fffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(0x0, 0x0, 0x10000) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xe0800, 0x0) bind$ax25(r3, &(0x7f00000003c0)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) pipe(&(0x7f0000000d40)) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/242, 0xf2}, {0x0}, {&(0x7f0000000500)=""/96, 0x60}, {0x0}, {0x0}], 0x6, &(0x7f0000000800)=""/217, 0xd9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 15:40:41 executing program 3: getpgid(0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc), 0x4) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f00000004c0)={&(0x7f0000000480)}}, &(0x7f0000000680)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0xffffffff7fffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(0x0, 0x0, 0x10000) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xe0800, 0x0) bind$ax25(r3, &(0x7f00000003c0)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) pipe(&(0x7f0000000d40)) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/242, 0xf2}, {0x0}, {&(0x7f0000000500)=""/96, 0x60}, {0x0}, {0x0}], 0x6, &(0x7f0000000800)=""/217, 0xd9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 15:40:41 executing program 4: getpgid(0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc), 0x4) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f00000004c0)={&(0x7f0000000480)}}, &(0x7f0000000680)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0xffffffff7fffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(0x0, 0x0, 0x10000) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xe0800, 0x0) bind$ax25(r3, &(0x7f00000003c0)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) pipe(&(0x7f0000000d40)) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/242, 0xf2}, {0x0}, {&(0x7f0000000500)=""/96, 0x60}, {0x0}, {0x0}], 0x6, &(0x7f0000000800)=""/217, 0xd9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 15:40:41 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000040)='raiJ\x7f\x0e', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffbf, 0x0) r0 = socket(0x8, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0/bus\x00', r1, 0x0) r2 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000180)=@ng={0x4, 0x14, "dd576af94c5f51b25f5cc0e0ca35788f5da2d0"}, 0xffffffffffffffb2, 0x2) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) [ 234.724896][ T9711] IPVS: ftp: loaded support on port[0] = 21 15:40:41 executing program 4: getpgid(0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc), 0x4) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f00000004c0)={&(0x7f0000000480)}}, &(0x7f0000000680)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0xffffffff7fffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(0x0, 0x0, 0x10000) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xe0800, 0x0) bind$ax25(r3, &(0x7f00000003c0)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) pipe(&(0x7f0000000d40)) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/242, 0xf2}, {0x0}, {&(0x7f0000000500)=""/96, 0x60}, {0x0}, {0x0}], 0x6, &(0x7f0000000800)=""/217, 0xd9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 15:40:41 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000040)='raiJ\x7f\x0e', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffbf, 0x0) r0 = socket(0x8, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0/bus\x00', r1, 0x0) r2 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000180)=@ng={0x4, 0x14, "dd576af94c5f51b25f5cc0e0ca35788f5da2d0"}, 0xffffffffffffffb2, 0x2) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 15:40:42 executing program 1: getpgid(0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc), 0x4) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f00000004c0)={&(0x7f0000000480)}}, &(0x7f0000000680)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0xffffffff7fffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(0x0, 0x0, 0x10000) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xe0800, 0x0) bind$ax25(r3, &(0x7f00000003c0)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) pipe(&(0x7f0000000d40)) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/242, 0xf2}, {0x0}, {&(0x7f0000000500)=""/96, 0x60}, {0x0}, {0x0}], 0x6, &(0x7f0000000800)=""/217, 0xd9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 235.259077][ T9726] IPVS: ftp: loaded support on port[0] = 21 [ 236.392389][ T9733] IPVS: ftp: loaded support on port[0] = 21 [ 236.461709][ T9733] chnl_net:caif_netlink_parms(): no params data found [ 236.492736][ T9733] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.502770][ T9733] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.510551][ T9733] device bridge_slave_0 entered promiscuous mode [ 236.521121][ T9733] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.529567][ T9733] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.540401][ T9733] device bridge_slave_1 entered promiscuous mode [ 236.560561][ T9733] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 236.571464][ T9733] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 236.592667][ T9733] team0: Port device team_slave_0 added [ 236.600355][ T9733] team0: Port device team_slave_1 added [ 236.678169][ T9733] device hsr_slave_0 entered promiscuous mode [ 236.723555][ T9733] device hsr_slave_1 entered promiscuous mode [ 236.773357][ T9733] debugfs: Directory 'hsr0' with parent '/' already present! [ 236.789981][ T9733] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.803413][ T9733] bridge0: port 2(bridge_slave_1) entered forwarding state [ 236.810678][ T9733] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.817777][ T9733] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.856737][ T9733] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.869484][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 236.878201][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.887040][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.895791][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 236.910790][ T9733] 8021q: adding VLAN 0 to HW filter on device team0 [ 236.927333][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.936713][ T8897] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.943823][ T8897] bridge0: port 1(bridge_slave_0) entered forwarding state [ 236.967519][ T8928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 236.976852][ T8928] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.983963][ T8928] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.006838][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 237.016266][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 237.025193][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.039677][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 237.052280][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.062577][ T9733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 237.081642][ T9736] IPVS: ftp: loaded support on port[0] = 21 [ 237.088249][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 237.088377][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 237.095946][ T9733] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 237.220789][ T9736] chnl_net:caif_netlink_parms(): no params data found [ 237.255389][ T9736] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.262533][ T9736] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.276568][ T9736] device bridge_slave_0 entered promiscuous mode [ 237.288260][ T9736] bridge0: port 2(bridge_slave_1) entered blocking state 15:40:44 executing program 2: getpgid(0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc), 0x4) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f00000004c0)={&(0x7f0000000480)}}, &(0x7f0000000680)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0xffffffff7fffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(0x0, 0x0, 0x10000) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xe0800, 0x0) bind$ax25(r3, &(0x7f00000003c0)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) pipe(&(0x7f0000000d40)) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/242, 0xf2}, {0x0}, {&(0x7f0000000500)=""/96, 0x60}, {0x0}, {0x0}], 0x6, &(0x7f0000000800)=""/217, 0xd9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 15:40:44 executing program 3: getpgid(0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc), 0x4) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f00000004c0)={&(0x7f0000000480)}}, &(0x7f0000000680)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0xffffffff7fffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(0x0, 0x0, 0x10000) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xe0800, 0x0) bind$ax25(r3, &(0x7f00000003c0)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) pipe(&(0x7f0000000d40)) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/242, 0xf2}, {0x0}, {&(0x7f0000000500)=""/96, 0x60}, {0x0}, {0x0}], 0x6, &(0x7f0000000800)=""/217, 0xd9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 15:40:44 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000040)='raiJ\x7f\x0e', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffbf, 0x0) r0 = socket(0x8, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0/bus\x00', r1, 0x0) r2 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000180)=@ng={0x4, 0x14, "dd576af94c5f51b25f5cc0e0ca35788f5da2d0"}, 0xffffffffffffffb2, 0x2) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) [ 237.319441][ T9736] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.328411][ T9736] device bridge_slave_1 entered promiscuous mode [ 237.470504][ T9736] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.481792][ T9752] IPVS: ftp: loaded support on port[0] = 21 [ 237.512317][ T9736] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.599553][ T9736] team0: Port device team_slave_0 added [ 237.627212][ T9736] team0: Port device team_slave_1 added [ 237.737536][ T9736] device hsr_slave_0 entered promiscuous mode [ 237.834592][ T9736] device hsr_slave_1 entered promiscuous mode [ 237.873306][ T9736] debugfs: Directory 'hsr0' with parent '/' already present! [ 237.991672][ T9736] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.004907][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 238.016141][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.024068][ T8897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.035370][ T9736] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.046610][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.057130][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.065905][ T8882] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.072936][ T8882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.081088][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 238.094541][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 238.102977][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.111893][ T8882] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.118974][ T8882] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.127268][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 238.144630][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 238.154133][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.162487][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.180819][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.188703][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.200641][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.211142][ T9736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.232099][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 238.240060][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 238.253107][ T9736] 8021q: adding VLAN 0 to HW filter on device batadv0 15:40:45 executing program 1: getpgid(0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc), 0x4) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f00000004c0)={&(0x7f0000000480)}}, &(0x7f0000000680)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0xffffffff7fffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(0x0, 0x0, 0x10000) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xe0800, 0x0) bind$ax25(r3, &(0x7f00000003c0)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) pipe(&(0x7f0000000d40)) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/242, 0xf2}, {0x0}, {&(0x7f0000000500)=""/96, 0x60}, {0x0}, {0x0}], 0x6, &(0x7f0000000800)=""/217, 0xd9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 15:40:45 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000040)='raiJ\x7f\x0e', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffbf, 0x0) r0 = socket(0x8, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0/bus\x00', r1, 0x0) r2 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000180)=@ng={0x4, 0x14, "dd576af94c5f51b25f5cc0e0ca35788f5da2d0"}, 0xffffffffffffffb2, 0x2) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 15:40:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f00000001c0), 0x4) recvmmsg(r0, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000cc0)=""/4096, 0x1000}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2, 0x0) 15:40:45 executing program 2: getpgid(0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc), 0x4) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f00000004c0)={&(0x7f0000000480)}}, &(0x7f0000000680)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0xffffffff7fffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(0x0, 0x0, 0x10000) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xe0800, 0x0) bind$ax25(r3, &(0x7f00000003c0)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) pipe(&(0x7f0000000d40)) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/242, 0xf2}, {0x0}, {&(0x7f0000000500)=""/96, 0x60}, {0x0}, {0x0}], 0x6, &(0x7f0000000800)=""/217, 0xd9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 15:40:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_CONTROL(r1, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) dup3(r0, r1, 0x0) 15:40:45 executing program 3: getpgid(0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc), 0x4) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f00000004c0)={&(0x7f0000000480)}}, &(0x7f0000000680)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0xffffffff7fffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(0x0, 0x0, 0x10000) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xe0800, 0x0) bind$ax25(r3, &(0x7f00000003c0)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) pipe(&(0x7f0000000d40)) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/242, 0xf2}, {0x0}, {&(0x7f0000000500)=""/96, 0x60}, {0x0}, {0x0}], 0x6, &(0x7f0000000800)=""/217, 0xd9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 238.489064][ T9782] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 238.618729][ T9783] IPVS: ftp: loaded support on port[0] = 21 15:40:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_CONTROL(r1, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) dup3(r0, r1, 0x0) 15:40:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_CONTROL(r1, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) dup3(r0, r1, 0x0) 15:40:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_CONTROL(r1, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) dup3(r0, r1, 0x0) 15:40:45 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000040)='raiJ\x7f\x0e', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffbf, 0x0) r0 = socket(0x8, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0/bus\x00', r1, 0x0) r2 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000180)=@ng={0x4, 0x14, "dd576af94c5f51b25f5cc0e0ca35788f5da2d0"}, 0xffffffffffffffb2, 0x2) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 15:40:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_CONTROL(r1, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) dup3(r0, r1, 0x0) 15:40:46 executing program 0: mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x0, 0x800000032, 0xffffffffffffffff, 0x0) io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0}) [ 239.225243][ T9808] IPVS: ftp: loaded support on port[0] = 21 15:40:46 executing program 2: getpgid(0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc), 0x4) get_robust_list(0x0, &(0x7f0000000640)=&(0x7f0000000600)={&(0x7f00000004c0)={&(0x7f0000000480)}}, &(0x7f0000000680)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$mouse(0x0, 0xffffffff7fffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ec0)='IPVS\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(0x0, 0x0, 0x10000) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xe0800, 0x0) bind$ax25(r3, &(0x7f00000003c0)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) pipe(&(0x7f0000000d40)) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002200)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000180)=""/183, 0xb7}, {&(0x7f0000000240)=""/242, 0xf2}, {0x0}, {&(0x7f0000000500)=""/96, 0x60}, {0x0}, {0x0}], 0x6, &(0x7f0000000800)=""/217, 0xd9}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 15:40:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_CONTROL(r1, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SETINTERFACE(r1, 0x5522, 0x0) dup3(r0, r1, 0x0) 15:40:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_dev$vcsa(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x1, 0x1, 0x2, 0x20, 0x6, 0x3}, {0x4, 0x1, 0x7, 0x8001, 0x82}], [[], [], [], []]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) modify_ldt$write(0x1, &(0x7f0000000000)={0x10000, 0x20000800, 0x2000, 0x0, 0x3, 0x1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffd) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 15:40:46 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100071bde030000030000000c", 0x11, 0x1400}], 0x0, 0x0) 15:40:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000100)=ANY=[@ANYBLOB="0000a9050000005c087b08b809377000000000000800000000000000b697a3a484066c29dabdb53547d4b806ac504f39e6444deeff000da4a6f63330d32eecdef7cdb303e58a963dfd595d3d34ef36dfed4d2a0fc0016ecc63321a1d091db7381e04cc822a9f6960a66444bf736717e374e8ae1342269fabe3425f306968e7"], 0x8) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:40:46 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000000040)='raiJ\x7f\x0e', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffbf, 0x0) r0 = socket(0x8, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000140)='./file0/bus\x00', r1, 0x0) r2 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket(0x11, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000180)=@ng={0x4, 0x14, "dd576af94c5f51b25f5cc0e0ca35788f5da2d0"}, 0xffffffffffffffb2, 0x2) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) [ 239.676587][ T9831] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 239.703063][ T9831] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock 15:40:46 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x1, 0x0, 0x0, 0x9}]}}, &(0x7f00000003c0)=""/219, 0x26, 0xdb, 0x8}, 0x20) [ 239.818092][ T9831] F2FS-fs (loop0): Invalid log blocks per segment (0) [ 239.844307][ T9838] IPVS: ftp: loaded support on port[0] = 21 15:40:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x2, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000040), 0x0}, 0x20) [ 239.866062][ T9831] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock [ 239.961697][ T9844] BPF:[1] VOLATILE [ 239.990955][ T9831] F2FS-fs (loop0): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 240.003265][ T9844] BPF:type_id=4 [ 240.034033][ T9844] BPF: [ 240.036953][ T9844] BPF:Invalid name [ 240.093894][ T9844] BPF: [ 240.093894][ T9844] [ 240.142376][ T9831] F2FS-fs (loop0): Can't find valid F2FS filesystem in 1th superblock [ 240.160008][ T9852] BPF:[1] VOLATILE 15:40:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400108) [ 240.194555][ T9852] BPF:type_id=4 15:40:47 executing program 4: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a54f) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x2) [ 240.226448][ T9831] F2FS-fs (loop0): Invalid log blocks per segment (0) [ 240.234606][ T9852] BPF: [ 240.243380][ T9852] BPF:Invalid name [ 240.251687][ T9852] BPF: [ 240.251687][ T9852] [ 240.295005][ T9831] F2FS-fs (loop0): Can't find valid F2FS filesystem in 2th superblock 15:40:47 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x1, 0x0, 0x0, 0x9}]}}, &(0x7f00000003c0)=""/219, 0x26, 0xdb, 0x8}, 0x20) 15:40:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x3000000, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800004000"}}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x1ff) keyctl$invalidate(0x15, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) listen(0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x19) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000280)={0xf3d0004, 0x0, 0xea, [], &(0x7f0000000240)={0x990afc, 0x200, [], @p_u32=&(0x7f0000000200)=0x8}}) pipe2(0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x800000000008982, &(0x7f0000000080)) socket(0x40000000002, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0xffffffffffffffff) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000003) fcntl$setownex(r2, 0xf, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000640)=""/173, &(0x7f00000000c0)=0xad) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="e7005084c82bbbc97318e9500dc4ec6e1217d9a366062f952037fd9a7109192e7c08a9e5cd20700ca630571532f2f41bce4b43fbb272310c0211549ba0814e5d01000000350269e3aa20c1d4d9c2c850737a69fef2c6af9cd77cac6e0b2f68f423f657c36153a9596e214e4f91e12f2770ff82779da364f9f153085529b932eb02b9e06abe6349ec7ccdc5ecb91e932479cb14d9dce417edaa163297de0ab1e8ed45b3a15355bbdc808600"]}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000a00)=ANY=[@ANYRESOCT=r3], 0x1}}, 0x40040) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={0x0}}, 0x1) [ 240.476114][ T23] audit: type=1800 audit(1575474047.409:32): pid=9834 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=16652 res=0 [ 240.494738][ T9861] BPF:[1] VOLATILE [ 240.510634][ T9861] BPF:type_id=4 [ 240.523570][ T9861] BPF: [ 240.526362][ T9861] BPF:Invalid name [ 240.530080][ T9861] BPF: [ 240.530080][ T9861] 15:40:47 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6000, 0x0) setxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {}, [{}, {}, {}, {}, {}, {}], {}, [{}]}, 0x5c, 0x0) unlink(&(0x7f0000000000)='./file0\x00') 15:40:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_dev$vcsa(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x1, 0x1, 0x2, 0x20, 0x6, 0x3}, {0x4, 0x1, 0x7, 0x8001, 0x82}], [[], [], [], []]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) modify_ldt$write(0x1, &(0x7f0000000000)={0x10000, 0x20000800, 0x2000, 0x0, 0x3, 0x1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffd) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 15:40:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_dev$vcsa(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x1, 0x1, 0x2, 0x20, 0x6, 0x3}, {0x4, 0x1, 0x7, 0x8001, 0x82}], [[], [], [], []]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) modify_ldt$write(0x1, &(0x7f0000000000)={0x10000, 0x20000800, 0x2000, 0x0, 0x3, 0x1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffd) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 15:40:47 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x1, 0x0, 0x0, 0x9}]}}, &(0x7f00000003c0)=""/219, 0x26, 0xdb, 0x8}, 0x20) 15:40:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_dev$vcsa(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x1, 0x1, 0x2, 0x20, 0x6, 0x3}, {0x4, 0x1, 0x7, 0x8001, 0x82}], [[], [], [], []]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) modify_ldt$write(0x1, &(0x7f0000000000)={0x10000, 0x20000800, 0x2000, 0x0, 0x3, 0x1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffd) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 240.911588][ T9888] BPF:[1] VOLATILE [ 240.943667][ T9888] BPF:type_id=4 15:40:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_dev$vcsa(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x1, 0x1, 0x2, 0x20, 0x6, 0x3}, {0x4, 0x1, 0x7, 0x8001, 0x82}], [[], [], [], []]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) modify_ldt$write(0x1, &(0x7f0000000000)={0x10000, 0x20000800, 0x2000, 0x0, 0x3, 0x1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffd) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 240.964018][ T9888] BPF: [ 240.967096][ T9888] BPF:Invalid name [ 240.994129][ T9888] BPF: [ 240.994129][ T9888] 15:40:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x1, 0x0, 0x0, 0x9}]}}, &(0x7f00000003c0)=""/219, 0x26, 0xdb, 0x8}, 0x20) [ 241.231859][ T9902] BPF:[1] VOLATILE [ 241.248652][ T9902] BPF:type_id=4 [ 241.262204][ T9902] BPF: [ 241.275396][ T9902] BPF:Invalid name 15:40:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_dev$vcsa(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x1, 0x1, 0x2, 0x20, 0x6, 0x3}, {0x4, 0x1, 0x7, 0x8001, 0x82}], [[], [], [], []]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) modify_ldt$write(0x1, &(0x7f0000000000)={0x10000, 0x20000800, 0x2000, 0x0, 0x3, 0x1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffd) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) [ 241.293858][ T9902] BPF: [ 241.293858][ T9902] 15:40:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_dev$vcsa(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x1, 0x1, 0x2, 0x20, 0x6, 0x3}, {0x4, 0x1, 0x7, 0x8001, 0x82}], [[], [], [], []]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) modify_ldt$write(0x1, &(0x7f0000000000)={0x10000, 0x20000800, 0x2000, 0x0, 0x3, 0x1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffd) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 15:40:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioctl$KDDELIO(r0, 0x4b35, 0x3d9) 15:40:48 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)) getdents64(r0, &(0x7f00000045c0)=""/4087, 0xff7) 15:40:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioctl$KDDELIO(r0, 0x4b35, 0x3d9) 15:40:48 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)) getdents64(r0, &(0x7f00000045c0)=""/4087, 0xff7) 15:40:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioctl$KDDELIO(r0, 0x4b35, 0x3d9) 15:40:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_dev$vcsa(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x1, 0x1, 0x2, 0x20, 0x6, 0x3}, {0x4, 0x1, 0x7, 0x8001, 0x82}], [[], [], [], []]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) modify_ldt$write(0x1, &(0x7f0000000000)={0x10000, 0x20000800, 0x2000, 0x0, 0x3, 0x1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffd) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 15:40:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_dev$vcsa(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x1, 0x1, 0x2, 0x20, 0x6, 0x3}, {0x4, 0x1, 0x7, 0x8001, 0x82}], [[], [], [], []]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) modify_ldt$write(0x1, &(0x7f0000000000)={0x10000, 0x20000800, 0x2000, 0x0, 0x3, 0x1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffd) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 15:40:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioctl$KDDELIO(r0, 0x4b35, 0x3d9) 15:40:49 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)) getdents64(r0, &(0x7f00000045c0)=""/4087, 0xff7) 15:40:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x14}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000300)=""/195}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) write(r0, &(0x7f0000000180)="1000000012000f45a1d7b1ccff652186", 0x10) 15:40:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_dev$vcsa(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x1, 0x1, 0x2, 0x20, 0x6, 0x3}, {0x4, 0x1, 0x7, 0x8001, 0x82}], [[], [], [], []]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) modify_ldt$write(0x1, &(0x7f0000000000)={0x10000, 0x20000800, 0x2000, 0x0, 0x3, 0x1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffd) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 15:40:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_dev$vcsa(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x1, 0x1, 0x2, 0x20, 0x6, 0x3}, {0x4, 0x1, 0x7, 0x8001, 0x82}], [[], [], [], []]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) modify_ldt$write(0x1, &(0x7f0000000000)={0x10000, 0x20000800, 0x2000, 0x0, 0x3, 0x1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffd) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 15:40:49 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)) getdents64(r0, &(0x7f00000045c0)=""/4087, 0xff7) 15:40:49 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000180), 0x4) 15:40:49 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x83) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000080)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r3, &(0x7f0000000700), 0x100000000000000c) syz_open_dev$vbi(0x0, 0x2, 0x2) 15:40:49 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000180), 0x4) 15:40:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_dev$vcsa(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x1, 0x1, 0x2, 0x20, 0x6, 0x3}, {0x4, 0x1, 0x7, 0x8001, 0x82}], [[], [], [], []]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) modify_ldt$write(0x1, &(0x7f0000000000)={0x10000, 0x20000800, 0x2000, 0x0, 0x3, 0x1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffd) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 15:40:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) syz_open_dev$vcsa(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x1, 0x1, 0x2, 0x20, 0x6, 0x3}, {0x4, 0x1, 0x7, 0x8001, 0x82}], [[], [], [], []]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) modify_ldt$write(0x1, &(0x7f0000000000)={0x10000, 0x20000800, 0x2000, 0x0, 0x3, 0x1}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffffffd) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r2, 0x200004) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 15:40:50 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000180), 0x4) 15:40:50 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x1, &(0x7f0000000180), 0x4) 15:40:50 executing program 5: unshare(0x2a000400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') lseek(r2, 0x0, 0x1) 15:40:50 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}) 15:40:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpgid(0x0) r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffe01}, 0x0) 15:40:51 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) 15:40:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpgid(0x0) r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffe01}, 0x0) 15:40:51 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x3cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000001240)=""/75, 0x4b}], 0x1}}], 0x330, 0x0, 0x0) shutdown(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000300), 0x4) 15:40:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpgid(0x0) r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffe01}, 0x0) 15:40:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000140)=0x5, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 15:40:53 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x3cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000001240)=""/75, 0x4b}], 0x1}}], 0x330, 0x0, 0x0) shutdown(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000300), 0x4) 15:40:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(r0, 0xc020662a, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x1, [{}]}) ioctl$sock_bt_hci(0xffffffffffffffff, 0x400448ca, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020662a, &(0x7f00000000c0)={0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x1, [{}]}) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f0000000080)={0x3, 0x0, 0x3014, 0x8000001, 0xfffffff5, 0x0, 0xfffff449, 0x1}) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) close(0xffffffffffffffff) umount2(&(0x7f0000000540)='./file0\x00', 0x0) 15:40:53 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x83) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000080)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r3, &(0x7f0000000700), 0x100000000000000c) syz_open_dev$vbi(0x0, 0x2, 0x2) 15:40:53 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) [ 246.194189][ T21] tipc: TX() has been purged, node left! [ 246.202325][ T21] tipc: TX() has been purged, node left! [ 246.236064][T10037] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! 15:40:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = getpgid(0x0) r4 = pidfd_open(r3, 0x0) pidfd_send_signal(r4, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffe01}, 0x0) 15:40:53 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x83) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000080)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r3, &(0x7f0000000700), 0x100000000000000c) syz_open_dev$vbi(0x0, 0x2, 0x2) [ 246.463438][ T21] tipc: TX() has been purged, node left! 15:40:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129cde3}], 0x1, &(0x7f00000001c0)=""/17, 0x10036, 0x7301}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) 15:40:53 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x3cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000001240)=""/75, 0x4b}], 0x1}}], 0x330, 0x0, 0x0) shutdown(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000300), 0x4) 15:40:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)) move_pages(0x0, 0x0, 0x0, &(0x7f0000000380)=[0x0], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f00000018c0)=0x4) socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0)="37b1adfebf7d4a510bd3ae6316bb2516daa67fda3be3d6a322e4c38501d07c492835f52a28f512ef84c35444c7f395dd814fb4e112a8b53e045e31a091062031c9ef7c2a1c5807ffe70f166d3c9dca5ad9d1a6a35b710fa9fda428404b226e39b876403d5e70f778d63f93d1fd16a3651b521a893042a6046f70b7fdfb529d43f49c6b68da0206d14cb4b9ad2a10337383ec3e325f9f2abfe84ada6deea0f3b53b7574b34d1b7bc37e78c772af0b004a5d724f7a359465da00000000000000", 0xbf, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000000)={r2, 0x5}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x0, 0x0, 0x200, 0x4, 0x0, 0x4, 0x2, 0x3, r2}, 0x0) r3 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0xff37) r4 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r4, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r4, &(0x7f0000000a40), 0x8000000000000b0, 0x101d0) 15:40:54 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) 15:40:54 executing program 0: syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x3cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000001240)=""/75, 0x4b}], 0x1}}], 0x330, 0x0, 0x0) shutdown(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000300), 0x4) 15:40:54 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x83) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000080)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r3, &(0x7f0000000700), 0x100000000000000c) syz_open_dev$vbi(0x0, 0x2, 0x2) 15:40:54 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x4000000003, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000002c0007031dfffd946f610504000000000000fd21fe1c4095421ba3a20400ff7e28", 0x25}], 0x1}, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) getegid() writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffb) set_robust_list(&(0x7f0000000240)={&(0x7f0000000080), 0x0, &(0x7f0000000140)}, 0x18) shutdown(r2, 0x1) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000540)={0x5}) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x18, 0x0, 0xfffffe48) keyctl$update(0x2, 0x0, &(0x7f0000000380), 0x0) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000500)={0x0, 0x8, 0x0, 0x9}, 0x10) 15:40:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129cde3}], 0x1, &(0x7f00000001c0)=""/17, 0x10036, 0x7301}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) 15:41:00 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x83) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000080)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r3, &(0x7f0000000700), 0x100000000000000c) syz_open_dev$vbi(0x0, 0x2, 0x2) 15:41:00 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000240)=0xffffffff, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) recvfrom$unix(r0, &(0x7f00000000c0)=""/90, 0xffffffffffffffef, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xffffffffffffffe6, 0x0, 0x0, 0x18fae6fad8906d26) 15:41:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x4000000003, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000002c0007031dfffd946f610504000000000000fd21fe1c4095421ba3a20400ff7e28", 0x25}], 0x1}, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) getegid() writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffb) set_robust_list(&(0x7f0000000240)={&(0x7f0000000080), 0x0, &(0x7f0000000140)}, 0x18) shutdown(r2, 0x1) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000540)={0x5}) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x18, 0x0, 0xfffffe48) keyctl$update(0x2, 0x0, &(0x7f0000000380), 0x0) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000500)={0x0, 0x8, 0x0, 0x9}, 0x10) 15:41:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129cde3}], 0x1, &(0x7f00000001c0)=""/17, 0x10036, 0x7301}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) 15:41:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x4000000003, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000002c0007031dfffd946f610504000000000000fd21fe1c4095421ba3a20400ff7e28", 0x25}], 0x1}, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) getegid() writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffb) set_robust_list(&(0x7f0000000240)={&(0x7f0000000080), 0x0, &(0x7f0000000140)}, 0x18) shutdown(r2, 0x1) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000540)={0x5}) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x18, 0x0, 0xfffffe48) keyctl$update(0x2, 0x0, &(0x7f0000000380), 0x0) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000500)={0x0, 0x8, 0x0, 0x9}, 0x10) 15:41:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x4000000003, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000002c0007031dfffd946f610504000000000000fd21fe1c4095421ba3a20400ff7e28", 0x25}], 0x1}, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) getegid() writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffb) set_robust_list(&(0x7f0000000240)={&(0x7f0000000080), 0x0, &(0x7f0000000140)}, 0x18) shutdown(r2, 0x1) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000540)={0x5}) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x18, 0x0, 0xfffffe48) keyctl$update(0x2, 0x0, &(0x7f0000000380), 0x0) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000500)={0x0, 0x8, 0x0, 0x9}, 0x10) 15:41:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x4000000003, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000002c0007031dfffd946f610504000000000000fd21fe1c4095421ba3a20400ff7e28", 0x25}], 0x1}, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) getegid() writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffb) set_robust_list(&(0x7f0000000240)={&(0x7f0000000080), 0x0, &(0x7f0000000140)}, 0x18) shutdown(r2, 0x1) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000540)={0x5}) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x18, 0x0, 0xfffffe48) keyctl$update(0x2, 0x0, &(0x7f0000000380), 0x0) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000500)={0x0, 0x8, 0x0, 0x9}, 0x10) 15:41:00 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x4000000003, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000002c0007031dfffd946f610504000000000000fd21fe1c4095421ba3a20400ff7e28", 0x25}], 0x1}, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) getegid() writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffb) set_robust_list(&(0x7f0000000240)={&(0x7f0000000080), 0x0, &(0x7f0000000140)}, 0x18) shutdown(r2, 0x1) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000540)={0x5}) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x18, 0x0, 0xfffffe48) keyctl$update(0x2, 0x0, &(0x7f0000000380), 0x0) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000500)={0x0, 0x8, 0x0, 0x9}, 0x10) 15:41:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) r1 = socket$inet(0x10, 0x4000000003, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000002c0007031dfffd946f610504000000000000fd21fe1c4095421ba3a20400ff7e28", 0x25}], 0x1}, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000300)=0x80, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='bbr\x00', 0x4) getegid() writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffffb) set_robust_list(&(0x7f0000000240)={&(0x7f0000000080), 0x0, &(0x7f0000000140)}, 0x18) shutdown(r2, 0x1) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000540)={0x5}) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x18, 0x0, 0xfffffe48) keyctl$update(0x2, 0x0, &(0x7f0000000380), 0x0) socket$netlink(0x10, 0x3, 0xc) writev(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000500)={0x0, 0x8, 0x0, 0x9}, 0x10) 15:41:01 executing program 2: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x83) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000080)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r3, &(0x7f0000000700), 0x100000000000000c) syz_open_dev$vbi(0x0, 0x2, 0x2) 15:41:01 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000240)='gid_map\x00') r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1000, 0x4, 0x1000, 0x4}, 0x10) fcntl$dupfd(r1, 0x0, r0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x400000000000010, 0x802, 0x0) select(0x40, &(0x7f0000000180), &(0x7f0000000440)={0x7fd}, 0x0, 0x0) 15:41:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) [ 255.243323][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 257.594378][ T21] device bridge_slave_1 left promiscuous mode [ 257.600566][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.684537][ T21] device bridge_slave_0 left promiscuous mode [ 257.690731][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.745924][ T21] device bridge_slave_1 left promiscuous mode [ 257.752103][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.814482][ T21] device bridge_slave_0 left promiscuous mode [ 257.820680][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.885506][ T21] device bridge_slave_1 left promiscuous mode [ 257.891670][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.954081][ T21] device bridge_slave_0 left promiscuous mode [ 257.960248][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.413421][ T21] device hsr_slave_0 left promiscuous mode [ 263.483545][ T21] device hsr_slave_1 left promiscuous mode [ 263.536531][ T21] team0 (unregistering): Port device team_slave_1 removed [ 263.548287][ T21] team0 (unregistering): Port device team_slave_0 removed [ 263.561616][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 263.620998][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 263.730511][ T21] bond0 (unregistering): Released all slaves [ 263.893845][ T21] device hsr_slave_0 left promiscuous mode [ 263.933356][ T21] device hsr_slave_1 left promiscuous mode [ 263.997409][ T21] team0 (unregistering): Port device team_slave_1 removed [ 264.011770][ T21] team0 (unregistering): Port device team_slave_0 removed [ 264.024835][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 264.070256][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 264.199321][ T21] bond0 (unregistering): Released all slaves [ 264.384364][ T21] device hsr_slave_0 left promiscuous mode [ 264.453453][ T21] device hsr_slave_1 left promiscuous mode [ 264.518269][ T21] team0 (unregistering): Port device team_slave_1 removed [ 264.532855][ T21] team0 (unregistering): Port device team_slave_0 removed [ 264.546262][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 264.590750][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 15:41:11 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x83) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_buf(r1, 0x84, 0x0, &(0x7f0000dcffe8)=""/24, &(0x7f0000000080)=0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r3, &(0x7f0000000700), 0x100000000000000c) syz_open_dev$vbi(0x0, 0x2, 0x2) 15:41:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) 15:41:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129cde3}], 0x1, &(0x7f00000001c0)=""/17, 0x10036, 0x7301}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) 15:41:11 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000240)='gid_map\x00') r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1000, 0x4, 0x1000, 0x4}, 0x10) fcntl$dupfd(r1, 0x0, r0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x400000000000010, 0x802, 0x0) select(0x40, &(0x7f0000000180), &(0x7f0000000440)={0x7fd}, 0x0, 0x0) 15:41:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) [ 264.692455][ T21] bond0 (unregistering): Released all slaves 15:41:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) 15:41:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 15:41:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) 15:41:12 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000240)='gid_map\x00') r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1000, 0x4, 0x1000, 0x4}, 0x10) fcntl$dupfd(r1, 0x0, r0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x400000000000010, 0x802, 0x0) select(0x40, &(0x7f0000000180), &(0x7f0000000440)={0x7fd}, 0x0, 0x0) 15:41:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 15:41:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000fefff67a0af0ff050000f079a4f0ff00000000b7060000ffdfffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe00000000850000000b000000b7000000000000009500000000000000e84562303f000000747bdb75021ba0207fe3074c74386cf425c3bca0a124c143cc16ba5687f2058dab4dd5308667f76faca6dcc74d2859bffd47d6c2587ade172451fd84c4fe0c4423833c7233b49d9d5796d4b86c5939199de9b2457731e068fcee6e79562b46d10aea0c00c430957d0d623b47"], &(0x7f0000000340)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x57d, 0x0, &(0x7f0000000380)="a6833c15ce9573f3ce05d1a282ee", 0x0, 0x579, 0x0, 0x395, 0x0, &(0x7f00000000c0)}, 0x28) 15:41:15 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='asymmetric\x00', 0x0, &(0x7f0000000340)="04", 0x2, r0) 15:41:18 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x115) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000175396866000c000200080002"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 15:41:18 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='gid_map\x00') syz_open_procfs(0x0, &(0x7f0000000240)='gid_map\x00') r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req={0x1000, 0x4, 0x1000, 0x4}, 0x10) fcntl$dupfd(r1, 0x0, r0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x400000000000010, 0x802, 0x0) select(0x40, &(0x7f0000000180), &(0x7f0000000440)={0x7fd}, 0x0, 0x0) 15:41:18 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000080)={0x12}) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000080)) 15:41:18 executing program 4: r0 = socket$inet(0x2, 0x8000000003, 0x121000000032) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000400)='ip_vti0\x00', 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @initdev}, 0x10) write$FUSE_WRITE(r0, &(0x7f0000000040)={0x18}, 0x18) 15:41:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0x400000000000003, 0x0, 0x403, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @remote}}}, @sadb_key={0x4, 0x9, 0xa0, 0x0, "015422f57bbb07d97cf74dc65e987b51b087e446"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0d}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}]}, 0x90}}, 0x0) 15:41:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000000)={0xffffff2e}, 0x5339c2fa) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x19, &(0x7f00000001c0)={r2}, 0x8) 15:41:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = fsopen(&(0x7f0000000040)='ubifs\x00', 0x0) r4 = dup2(r2, r3) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:18 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='\x14Ym1\xa9\xa22\x0fN\xcb\xa2\xba\xe5\xf4\x97\x00\x04\x00\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0x3d1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xc, 0x0, &(0x7f0000000080)=0x1d2) 15:41:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = fsopen(&(0x7f0000000040)='ubifs\x00', 0x0) r4 = dup2(r2, r3) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:19 executing program 4: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000180)={0x84, @rand_addr, 0x0, 0x0, 'rr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 15:41:19 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) sendfile(r3, r1, 0x0, 0xfffffffd) 15:41:19 executing program 4: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000140)="5311778945effd9100036800000000cf", 0x66, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc6, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000200)={r1, r1, r0}, &(0x7f00000000c0)=""/83, 0x53, 0x0) [ 272.252646][T10234] cgroup: fork rejected by pids controller in /syz3 15:41:31 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x115) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000175396866000c000200080002"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 15:41:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = fsopen(&(0x7f0000000040)='ubifs\x00', 0x0) r4 = dup2(r2, r3) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) sendfile(r3, r1, 0x0, 0xfffffffd) 15:41:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0x400000000000003, 0x0, 0x403, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @remote}}}, @sadb_key={0x4, 0x9, 0xa0, 0x0, "015422f57bbb07d97cf74dc65e987b51b087e446"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0d}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}]}, 0x90}}, 0x0) 15:41:31 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f086ddd501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:41:31 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500028cfc000543280000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$pppoe(0x18, 0x1, 0x0) r3 = fsopen(&(0x7f0000000040)='ubifs\x00', 0x0) r4 = dup2(r2, r3) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 15:41:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0x400000000000003, 0x0, 0x403, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @remote}}}, @sadb_key={0x4, 0x9, 0xa0, 0x0, "015422f57bbb07d97cf74dc65e987b51b087e446"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0d}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}]}, 0x90}}, 0x0) 15:41:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x200, &(0x7f0000000080)=0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x1000010001}) setfsuid(0xee01) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000140)='r', 0x1}]) 15:41:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0x400000000000003, 0x0, 0x403, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000], [], @remote}}}, @sadb_key={0x4, 0x9, 0xa0, 0x0, "015422f57bbb07d97cf74dc65e987b51b087e446"}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0d}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}]}, 0x90}}, 0x0) 15:41:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e0000002f008151e00f80ecdb4cb904054865160b00030014000000000000140e00060003000000dc2976d153b4", 0x2e}], 0x1}, 0x0) [ 285.069663][T10387] validate_nla: 162 callbacks suppressed [ 285.069683][T10387] netlink: 'syz-executor.5': attribute type 3 has an invalid length. 15:41:32 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2251217bae2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f086ddd501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) [ 285.122874][T10387] netlink: 'syz-executor.5': attribute type 6 has an invalid length. [ 286.903352][ T273] tipc: TX() has been purged, node left! [ 287.591622][T10419] IPVS: ftp: loaded support on port[0] = 21 [ 287.839486][T10419] chnl_net:caif_netlink_parms(): no params data found [ 287.871324][T10419] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.880015][T10419] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.890003][T10419] device bridge_slave_0 entered promiscuous mode [ 287.898450][T10419] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.905946][T10419] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.914073][T10419] device bridge_slave_1 entered promiscuous mode [ 287.931909][T10419] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 287.943563][T10419] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 288.038402][T10419] team0: Port device team_slave_0 added [ 288.046301][T10419] team0: Port device team_slave_1 added [ 288.116544][T10419] device hsr_slave_0 entered promiscuous mode [ 288.153798][T10419] device hsr_slave_1 entered promiscuous mode [ 288.205415][T10419] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.212479][T10419] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.219837][T10419] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.226928][T10419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.262968][T10419] 8021q: adding VLAN 0 to HW filter on device bond0 [ 288.349625][T10419] 8021q: adding VLAN 0 to HW filter on device team0 [ 288.357441][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 288.365605][ T8882] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.373830][ T8882] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.382174][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 288.405229][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 288.417186][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 288.424276][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 288.431756][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 288.440245][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 288.447339][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 288.464139][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 288.472635][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 288.484675][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 288.499313][T10419] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 288.511357][T10419] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 288.519524][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 288.527657][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 288.549048][T10020] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 288.557098][T10020] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 288.570885][T10419] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 290.284949][ T273] device bridge_slave_1 left promiscuous mode [ 290.291273][ T273] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.354097][ T273] device bridge_slave_0 left promiscuous mode [ 290.360322][ T273] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.453715][ T273] device hsr_slave_0 left promiscuous mode [ 292.493575][ T273] device hsr_slave_1 left promiscuous mode [ 292.547337][ T273] team0 (unregistering): Port device team_slave_1 removed [ 292.559512][ T273] team0 (unregistering): Port device team_slave_0 removed [ 292.573237][ T273] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 292.602034][ T273] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 292.741180][ T273] bond0 (unregistering): Released all slaves 15:41:40 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x115) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000175396866000c000200080002"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 15:41:40 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0xc0506617) 15:41:40 executing program 4: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002f3753a9c3b630bf92dd696125265586f2043649b89ec9b91dc174d5701424fa24052b2fe97409000000058e4bf0391702519694cd73608fadb119a5ffc8f1460c55bcce412bc1cc14a1f64ad78f7efc6f2251217bae2233bacac999cbb0468424c2e8ab6cafc7bed227046c4ef20a09f4a46c382c1e7016a71a704c7b3cddf5306b500fda7b4a72bedb7c33a4c7e1f0c42819df5c26d28b450e2a9980b62fe2a57ac040892270e005a2e4ead36494a405cb500badb2b544"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe0, 0x900, &(0x7f00000006c0)="b9ff0300000d698cb89e40f086ddd501890600de0500000077fb7f11c72be9", 0x0, 0x100}, 0x28) 15:41:40 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x1f, 0xb, 0x5d}}) 15:41:40 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) sendfile(r3, r1, 0x0, 0xfffffffd) 15:41:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(r1, 0x0) ioprio_set$uid(0x3, r1, 0x0) 15:41:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\xedEl\xd0\xd2L\xf177\xdb\x02np\x18\"\xc0ma\x00\x80\xab\x9d\xd5\x8a\x9a\x14\xe4P\xf1\xc9\x18\b\xf5\a\xf9O\xfe\xdb\xa3\x030x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000001ec0)="5ba81c8b", 0x4}]) 15:41:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\xedEl\xd0\xd2L\xf177\xdb\x02np\x18\"\xc0ma\x00\x80\xab\x9d\xd5\x8a\x9a\x14\xe4P\xf1\xc9\x18\b\xf5\a\xf9O\xfe\xdb\xa3\x030x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000001ec0)="5ba81c8b", 0x4}]) 15:41:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\xedEl\xd0\xd2L\xf177\xdb\x02np\x18\"\xc0ma\x00\x80\xab\x9d\xd5\x8a\x9a\x14\xe4P\xf1\xc9\x18\b\xf5\a\xf9O\xfe\xdb\xa3\x030xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x115) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000175396866000c000200080002"], 0x3}}, 0x0) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 15:41:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4000000000000087) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_setup(0x101, &(0x7f00000000c0)=0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000001ec0)="5ba81c8b", 0x4}]) 15:41:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\xedEl\xd0\xd2L\xf177\xdb\x02np\x18\"\xc0ma\x00\x80\xab\x9d\xd5\x8a\x9a\x14\xe4P\xf1\xc9\x18\b\xf5\a\xf9O\xfe\xdb\xa3\x030xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp1\x00', 0x4802, 0x0) 15:41:56 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='.dead\x00', &(0x7f00000000c0)='&{{\\{bdev\x00') 15:41:56 executing program 0: syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400300, 0x100000f, 0x8012, r0, 0x0) 15:41:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4000000000000087) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_setup(0x101, &(0x7f00000000c0)=0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=@srh, 0x8) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000001ec0)="5ba81c8b", 0x4}]) 15:41:56 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='.dead\x00', &(0x7f00000000c0)='&{{\\{bdev\x00') 15:41:56 executing program 4: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='.dead\x00', &(0x7f00000000c0)='&{{\\{bdev\x00') [ 309.279938][T10502] IPVS: ftp: loaded support on port[0] = 21 [ 309.286421][T10506] [ 309.288755][T10506] ====================================================== [ 309.295761][T10506] WARNING: possible circular locking dependency detected [ 309.302774][T10506] 5.4.0-syzkaller #0 Not tainted [ 309.307696][T10506] ------------------------------------------------------ [ 309.314707][T10506] syz-executor.0/10506 is trying to acquire lock: [ 309.321113][T10506] ffff88809f741d00 (&rp->fetch_lock){+.+.}, at: mon_bin_vma_fault+0x73/0x2d0 15:41:56 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x2, @local, 'batadv0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) [ 309.329997][T10506] [ 309.329997][T10506] but task is already holding lock: [ 309.337355][T10506] ffff888059178e58 (&mm->mmap_sem#2){++++}, at: __mm_populate+0x270/0x380 [ 309.345939][T10506] [ 309.345939][T10506] which lock already depends on the new lock. [ 309.345939][T10506] [ 309.352775][T10502] kobject: 'lo' (0000000018671172): kobject_add_internal: parent: 'net', set: 'devices' [ 309.356332][T10506] [ 309.356332][T10506] the existing dependency chain (in reverse order) is: [ 309.356336][T10506] [ 309.356336][T10506] -> #1 (&mm->mmap_sem#2){++++}: [ 309.356363][T10506] __might_fault+0x15e/0x1e0 [ 309.356382][T10506] mon_bin_fetch+0x26f/0x340 [ 309.368511][T10502] kobject: 'lo' (0000000018671172): kobject_uevent_env [ 309.375167][T10506] mon_bin_ioctl+0x21e/0xc80 [ 309.375234][T10506] do_vfs_ioctl+0x977/0x14e0 [ 309.375249][T10506] ksys_ioctl+0xab/0xd0 [ 309.382413][T10502] kobject: 'lo' (0000000018671172): fill_kobj_path: path = '/devices/virtual/net/lo' [ 309.387424][T10506] __x64_sys_ioctl+0x73/0xb0 [ 309.387468][T10506] do_syscall_64+0xfa/0x790 [ 309.387509][T10506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.387518][T10506] [ 309.387518][T10506] -> #0 (&rp->fetch_lock){+.+.}: [ 309.392736][T10502] kobject: 'queues' (000000006509b6a8): kobject_add_internal: parent: 'lo', set: '' [ 309.399456][T10506] __lock_acquire+0x2596/0x4a00 [ 309.399470][T10506] lock_acquire+0x190/0x410 [ 309.404767][T10502] kobject: 'queues' (000000006509b6a8): kobject_uevent_env [ 309.409741][T10506] __mutex_lock+0x156/0x13c0 [ 309.409753][T10506] mutex_lock_nested+0x16/0x20 [ 309.409763][T10506] mon_bin_vma_fault+0x73/0x2d0 [ 309.409779][T10506] __do_fault+0x111/0x540 [ 309.414489][T10502] kobject: 'queues' (000000006509b6a8): kobject_uevent_env: filter function caused the event to drop! [ 309.423843][T10506] __handle_mm_fault+0x1258/0x3da0 [ 309.423853][T10506] handle_mm_fault+0x3b2/0xa50 [ 309.423862][T10506] __get_user_pages+0x7b2/0x1ac0 [ 309.423870][T10506] populate_vma_page_range+0x20d/0x2a0 [ 309.423883][T10506] __mm_populate+0x204/0x380 [ 309.429046][T10502] kobject: 'rx-0' (000000000d4eed76): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.433999][T10506] vm_mmap_pgoff+0x213/0x230 [ 309.434016][T10506] ksys_mmap_pgoff+0x4aa/0x630 [ 309.440503][T10502] kobject: 'rx-0' (000000000d4eed76): kobject_uevent_env [ 309.447531][T10506] __x64_sys_mmap+0xe9/0x1b0 [ 309.447551][T10506] do_syscall_64+0xfa/0x790 [ 309.457515][T10502] kobject: 'rx-0' (000000000d4eed76): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 309.462754][T10506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.462759][T10506] [ 309.462759][T10506] other info that might help us debug this: [ 309.462759][T10506] [ 309.462762][T10506] Possible unsafe locking scenario: [ 309.462762][T10506] [ 309.462765][T10506] CPU0 CPU1 [ 309.462772][T10506] ---- ---- [ 309.467910][T10502] kobject: 'tx-0' (000000000fff77a3): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.474925][T10506] lock(&mm->mmap_sem#2); [ 309.474936][T10506] lock(&rp->fetch_lock); [ 309.474943][T10506] lock(&mm->mmap_sem#2); [ 309.474951][T10506] lock(&rp->fetch_lock); [ 309.474958][T10506] [ 309.474958][T10506] *** DEADLOCK *** [ 309.474958][T10506] [ 309.474964][T10506] 1 lock held by syz-executor.0/10506: [ 309.474971][T10506] #0: ffff888059178e58 (&mm->mmap_sem#2){++++}, at: __mm_populate+0x270/0x380 [ 309.480231][T10502] kobject: 'tx-0' (000000000fff77a3): kobject_uevent_env [ 309.485305][T10506] [ 309.485305][T10506] stack backtrace: [ 309.485318][T10506] CPU: 1 PID: 10506 Comm: syz-executor.0 Not tainted 5.4.0-syzkaller #0 [ 309.485323][T10506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.485327][T10506] Call Trace: [ 309.485414][T10506] dump_stack+0x197/0x210 [ 309.485432][T10506] print_circular_bug.isra.0.cold+0x163/0x172 [ 309.490849][T10502] kobject: 'tx-0' (000000000fff77a3): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 309.495594][T10506] check_noncircular+0x32e/0x3e0 [ 309.495607][T10506] ? print_circular_bug.isra.0+0x230/0x230 [ 309.495646][T10506] ? alloc_list_entry+0xc0/0xc0 [ 309.495703][T10506] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 309.508090][T10502] kobject: 'tunl0' (00000000b84c0f13): kobject_add_internal: parent: 'net', set: 'devices' [ 309.512236][T10506] ? find_first_zero_bit+0x9a/0xc0 [ 309.512253][T10506] __lock_acquire+0x2596/0x4a00 [ 309.518209][T10502] kobject: 'tunl0' (00000000b84c0f13): kobject_uevent_env [ 309.522973][T10506] ? stack_depot_save+0x25a/0x450 [ 309.522991][T10506] ? mark_held_locks+0xf0/0xf0 [ 309.529042][T10502] kobject: 'tunl0' (00000000b84c0f13): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 309.534148][T10506] lock_acquire+0x190/0x410 [ 309.534180][T10506] ? mon_bin_vma_fault+0x73/0x2d0 [ 309.534202][T10506] __mutex_lock+0x156/0x13c0 [ 309.544376][T10502] kobject: 'queues' (0000000095889f43): kobject_add_internal: parent: 'tunl0', set: '' [ 309.549312][T10506] ? mon_bin_vma_fault+0x73/0x2d0 [ 309.549360][T10506] ? __kasan_check_read+0x11/0x20 [ 309.549376][T10506] ? mon_bin_vma_fault+0x73/0x2d0 [ 309.554716][T10502] kobject: 'queues' (0000000095889f43): kobject_uevent_env [ 309.561631][T10506] ? mutex_trylock+0x2f0/0x2f0 [ 309.561667][T10506] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 309.561684][T10506] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 309.566820][T10502] kobject: 'queues' (0000000095889f43): kobject_uevent_env: filter function caused the event to drop! [ 309.571752][T10506] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 309.571785][T10506] ? kmem_cache_alloc+0x364/0x710 [ 309.571800][T10506] ? rcu_read_lock_held+0x9c/0xb0 [ 309.582524][T10502] kobject: 'rx-0' (00000000d16daeb0): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.588854][T10506] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 309.588869][T10506] mutex_lock_nested+0x16/0x20 [ 309.588880][T10506] ? mutex_lock_nested+0x16/0x20 [ 309.588896][T10506] mon_bin_vma_fault+0x73/0x2d0 [ 309.599359][T10502] kobject: 'rx-0' (00000000d16daeb0): kobject_uevent_env [ 309.606651][T10506] __do_fault+0x111/0x540 [ 309.606717][T10506] ? mem_cgroup_try_charge_delay+0x6c/0xa0 [ 309.606733][T10506] __handle_mm_fault+0x1258/0x3da0 [ 309.612160][T10502] kobject: 'rx-0' (00000000d16daeb0): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 309.617422][T10506] ? vm_iomap_memory+0x1a0/0x1a0 [ 309.617435][T10506] ? handle_mm_fault+0x292/0xa50 [ 309.617466][T10506] ? handle_mm_fault+0x7a0/0xa50 [ 309.617483][T10506] ? __kasan_check_read+0x11/0x20 [ 309.627692][T10502] kobject: 'tx-0' (000000001362743a): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.631919][T10506] handle_mm_fault+0x3b2/0xa50 [ 309.631934][T10506] __get_user_pages+0x7b2/0x1ac0 [ 309.631944][T10506] ? mark_held_locks+0xf0/0xf0 [ 309.631960][T10506] ? follow_page_mask+0x1dd0/0x1dd0 [ 309.639068][T10502] kobject: 'tx-0' (000000001362743a): kobject_uevent_env [ 309.645771][T10506] ? __mm_populate+0x270/0x380 [ 309.645785][T10506] ? memset+0x32/0x40 [ 309.645799][T10506] populate_vma_page_range+0x20d/0x2a0 [ 309.645810][T10506] __mm_populate+0x204/0x380 [ 309.645826][T10506] ? populate_vma_page_range+0x2a0/0x2a0 [ 309.650287][T10502] kobject: 'tx-0' (000000001362743a): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 309.658331][T10506] ? __kasan_check_write+0x14/0x20 [ 309.658346][T10506] ? up_write+0x150/0x490 [ 309.658361][T10506] vm_mmap_pgoff+0x213/0x230 [ 309.658379][T10506] ? randomize_stack_top+0x110/0x110 [ 309.664584][T10502] kobject: 'gre0' (0000000033d0d8a9): kobject_add_internal: parent: 'net', set: 'devices' [ 309.672775][T10506] ? ksys_dup3+0x3e0/0x3e0 [ 309.672796][T10506] ? _copy_to_user+0x118/0x160 [ 309.680498][T10502] kobject: 'gre0' (0000000033d0d8a9): kobject_uevent_env [ 309.685670][T10506] ksys_mmap_pgoff+0x4aa/0x630 [ 309.685686][T10506] ? find_mergeable_anon_vma+0x2e0/0x2e0 [ 309.685706][T10506] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 309.694108][T10502] kobject: 'gre0' (0000000033d0d8a9): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 309.704028][T10506] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 309.704041][T10506] ? do_syscall_64+0x26/0x790 [ 309.704055][T10506] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.704074][T10506] __x64_sys_mmap+0xe9/0x1b0 [ 309.707475][T10502] kobject: 'queues' (00000000741584c3): kobject_add_internal: parent: 'gre0', set: '' [ 309.711661][T10506] do_syscall_64+0xfa/0x790 [ 309.711675][T10506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.711689][T10506] RIP: 0033:0x45a679 [ 309.717813][T10502] kobject: 'queues' (00000000741584c3): kobject_uevent_env [ 309.728470][T10506] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.728477][T10506] RSP: 002b:00007f87694dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 309.728489][T10506] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045a679 [ 309.728496][T10506] RDX: 000000000100000f RSI: 0000000000400300 RDI: 0000000020a05000 [ 309.728502][T10506] RBP: 000000000075bf20 R08: 0000000000000004 R09: 0000000000000000 [ 309.728514][T10506] R10: 0000000000008012 R11: 0000000000000246 R12: 00007f87694df6d4 [ 309.733490][T10502] kobject: 'queues' (00000000741584c3): kobject_uevent_env: filter function caused the event to drop! [ 309.739208][T10506] R13: 00000000004c7861 R14: 00000000004de5a8 R15: 00000000ffffffff [ 309.741269][ T4085] kobject: 'loop4' (000000007624f633): kobject_uevent_env [ 309.780648][T10502] kobject: 'rx-0' (000000005392473d): kobject_add_internal: parent: 'queues', set: 'queues' [ 309.797245][ T4085] kobject: 'loop4' (000000007624f633): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 309.815943][T10502] kobject: 'rx-0' (000000005392473d): kobject_uevent_env [ 309.840246][ T4085] kobject: 'loop5' (000000001318f5cc): kobject_uevent_env [ 309.903249][T10502] kobject: 'rx-0' (000000005392473d): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 310.049960][ T4085] kobject: 'loop5' (000000001318f5cc): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 310.053394][T10502] kobject: 'tx-0' (00000000ef241e51): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.073118][ T4085] kobject: 'loop0' (00000000d862cdb1): kobject_uevent_env [ 310.098549][T10502] kobject: 'tx-0' (00000000ef241e51): kobject_uevent_env [ 310.107179][ T4085] kobject: 'loop0' (00000000d862cdb1): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 310.114577][T10502] kobject: 'tx-0' (00000000ef241e51): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 310.115392][T10502] kobject: 'gretap0' (0000000067793964): kobject_add_internal: parent: 'net', set: 'devices' [ 310.265300][ T4085] kobject: 'loop4' (000000007624f633): kobject_uevent_env [ 310.296961][T10502] kobject: 'gretap0' (0000000067793964): kobject_uevent_env [ 310.333259][ T4085] kobject: 'loop4' (000000007624f633): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 310.345726][T10502] kobject: 'gretap0' (0000000067793964): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 310.406582][T10502] kobject: 'queues' (00000000cfa85f81): kobject_add_internal: parent: 'gretap0', set: '' [ 310.420164][T10502] kobject: 'queues' (00000000cfa85f81): kobject_uevent_env [ 310.427670][T10502] kobject: 'queues' (00000000cfa85f81): kobject_uevent_env: filter function caused the event to drop! [ 310.438686][T10502] kobject: 'rx-0' (000000007aa1e91f): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.449189][T10502] kobject: 'rx-0' (000000007aa1e91f): kobject_uevent_env [ 310.456260][T10502] kobject: 'rx-0' (000000007aa1e91f): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 310.467777][T10502] kobject: 'tx-0' (000000000aac0c0d): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.478126][T10502] kobject: 'tx-0' (000000000aac0c0d): kobject_uevent_env [ 310.485231][T10502] kobject: 'tx-0' (000000000aac0c0d): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 310.496917][T10502] kobject: 'batman_adv' (00000000ad2311d9): kobject_add_internal: parent: 'gretap0', set: '' [ 310.507891][ T273] kobject: 'veth0' (0000000090f1a5d5): kobject_cleanup, parent 0000000014180cb1 [ 310.508081][T10502] kobject: 'erspan0' (000000001d157a5d): kobject_add_internal: parent: 'net', set: 'devices' [ 310.520246][ T273] kobject: 'veth0' (0000000090f1a5d5): calling ktype release [ 310.527722][T10502] kobject: 'erspan0' (000000001d157a5d): kobject_uevent_env [ 310.537898][ T273] kobject: 'veth0': free name [ 310.541782][T10502] kobject: 'erspan0' (000000001d157a5d): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 310.556813][T10502] kobject: 'queues' (000000001fc9a14f): kobject_add_internal: parent: 'erspan0', set: '' [ 310.567166][T10502] kobject: 'queues' (000000001fc9a14f): kobject_uevent_env [ 310.574547][T10502] kobject: 'queues' (000000001fc9a14f): kobject_uevent_env: filter function caused the event to drop! [ 310.585524][T10502] kobject: 'rx-0' (0000000089739cba): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.595619][T10502] kobject: 'rx-0' (0000000089739cba): kobject_uevent_env [ 310.602633][T10502] kobject: 'rx-0' (0000000089739cba): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 310.613866][T10502] kobject: 'tx-0' (00000000732d5405): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.624080][T10502] kobject: 'tx-0' (00000000732d5405): kobject_uevent_env [ 310.631103][T10502] kobject: 'tx-0' (00000000732d5405): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 310.642876][T10502] kobject: 'batman_adv' (00000000cd4122bc): kobject_add_internal: parent: 'erspan0', set: '' [ 310.653910][T10502] kobject: 'ip_vti0' (00000000bc51d66e): kobject_add_internal: parent: 'net', set: 'devices' [ 310.664695][T10502] kobject: 'ip_vti0' (00000000bc51d66e): kobject_uevent_env [ 310.671980][T10502] kobject: 'ip_vti0' (00000000bc51d66e): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 310.682441][T10502] kobject: 'queues' (0000000067eb6095): kobject_add_internal: parent: 'ip_vti0', set: '' [ 310.692984][T10502] kobject: 'queues' (0000000067eb6095): kobject_uevent_env [ 310.700213][T10502] kobject: 'queues' (0000000067eb6095): kobject_uevent_env: filter function caused the event to drop! [ 310.711162][T10502] kobject: 'rx-0' (00000000a7a7b70b): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.721280][T10502] kobject: 'rx-0' (00000000a7a7b70b): kobject_uevent_env [ 310.728393][T10502] kobject: 'rx-0' (00000000a7a7b70b): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 310.739603][T10502] kobject: 'tx-0' (00000000e2dba990): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.749757][T10502] kobject: 'tx-0' (00000000e2dba990): kobject_uevent_env [ 310.756827][T10502] kobject: 'tx-0' (00000000e2dba990): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 310.768496][T10502] kobject: 'ip6_vti0' (000000008207a1ea): kobject_add_internal: parent: 'net', set: 'devices' [ 310.779208][T10502] kobject: 'ip6_vti0' (000000008207a1ea): kobject_uevent_env [ 310.786603][T10502] kobject: 'ip6_vti0' (000000008207a1ea): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 310.797451][T10502] kobject: 'queues' (00000000d95f2050): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 310.807902][T10502] kobject: 'queues' (00000000d95f2050): kobject_uevent_env [ 310.815110][T10502] kobject: 'queues' (00000000d95f2050): kobject_uevent_env: filter function caused the event to drop! [ 310.826063][T10502] kobject: 'rx-0' (00000000d20627c0): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.836161][T10502] kobject: 'rx-0' (00000000d20627c0): kobject_uevent_env [ 310.843288][T10502] kobject: 'rx-0' (00000000d20627c0): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 310.854539][T10502] kobject: 'tx-0' (00000000e716d8f2): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.864742][T10502] kobject: 'tx-0' (00000000e716d8f2): kobject_uevent_env [ 310.871779][T10502] kobject: 'tx-0' (00000000e716d8f2): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 310.883999][T10502] kobject: 'sit0' (000000009b75a249): kobject_add_internal: parent: 'net', set: 'devices' [ 310.894249][T10502] kobject: 'sit0' (000000009b75a249): kobject_uevent_env [ 310.901261][T10502] kobject: 'sit0' (000000009b75a249): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 310.911416][T10502] kobject: 'queues' (0000000095949cdb): kobject_add_internal: parent: 'sit0', set: '' [ 310.921533][T10502] kobject: 'queues' (0000000095949cdb): kobject_uevent_env [ 310.928784][T10502] kobject: 'queues' (0000000095949cdb): kobject_uevent_env: filter function caused the event to drop! [ 310.939754][T10502] kobject: 'rx-0' (000000000a3a7ea5): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.949871][T10502] kobject: 'rx-0' (000000000a3a7ea5): kobject_uevent_env [ 310.956937][T10502] kobject: 'rx-0' (000000000a3a7ea5): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 310.967827][T10502] kobject: 'tx-0' (0000000072740d98): kobject_add_internal: parent: 'queues', set: 'queues' [ 310.978040][T10502] kobject: 'tx-0' (0000000072740d98): kobject_uevent_env [ 310.985094][T10502] kobject: 'tx-0' (0000000072740d98): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 310.996615][ T273] kobject: 'vxcan1' (0000000070bd56a4): kobject_cleanup, parent 0000000014180cb1 [ 310.996786][T10502] kobject: 'ip6tnl0' (000000002c780cd8): kobject_add_internal: parent: 'net', set: 'devices' [ 311.008772][ T273] kobject: 'vxcan1' (0000000070bd56a4): calling ktype release [ 311.018285][T10502] kobject: 'ip6tnl0' (000000002c780cd8): kobject_uevent_env [ 311.024891][ T273] kobject: 'vxcan1': free name [ 311.033251][T10502] kobject: 'ip6tnl0' (000000002c780cd8): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 311.046969][T10502] kobject: 'queues' (00000000651eb4a8): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 311.057649][T10502] kobject: 'queues' (00000000651eb4a8): kobject_uevent_env [ 311.064864][T10502] kobject: 'queues' (00000000651eb4a8): kobject_uevent_env: filter function caused the event to drop! [ 311.075811][T10502] kobject: 'rx-0' (0000000088cdb807): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.086128][T10502] kobject: 'rx-0' (0000000088cdb807): kobject_uevent_env [ 311.093278][T10502] kobject: 'rx-0' (0000000088cdb807): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 311.104434][T10502] kobject: 'tx-0' (000000004b31137b): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.114636][T10502] kobject: 'tx-0' (000000004b31137b): kobject_uevent_env [ 311.121654][T10502] kobject: 'tx-0' (000000004b31137b): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 311.134606][T10502] kobject: 'ip6gre0' (00000000242b35f8): kobject_add_internal: parent: 'net', set: 'devices' [ 311.145126][T10502] kobject: 'ip6gre0' (00000000242b35f8): kobject_uevent_env [ 311.152425][T10502] kobject: 'ip6gre0' (00000000242b35f8): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 311.162830][T10502] kobject: 'queues' (00000000a54b117b): kobject_add_internal: parent: 'ip6gre0', set: '' [ 311.173281][T10502] kobject: 'queues' (00000000a54b117b): kobject_uevent_env [ 311.180457][T10502] kobject: 'queues' (00000000a54b117b): kobject_uevent_env: filter function caused the event to drop! [ 311.191425][T10502] kobject: 'rx-0' (000000003c65081f): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.201545][T10502] kobject: 'rx-0' (000000003c65081f): kobject_uevent_env [ 311.208618][T10502] kobject: 'rx-0' (000000003c65081f): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 311.219803][T10502] kobject: 'tx-0' (0000000093a72ba2): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.229986][T10502] kobject: 'tx-0' (0000000093a72ba2): kobject_uevent_env [ 311.237222][T10502] kobject: 'tx-0' (0000000093a72ba2): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 311.252442][ T4085] kobject: 'loop2' (0000000053558e10): kobject_uevent_env [ 311.254552][T10502] kobject: 'syz_tun' (0000000008969ba1): kobject_add_internal: parent: 'net', set: 'devices' [ 311.262460][ T4085] kobject: 'loop2' (0000000053558e10): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 311.270299][T10502] kobject: 'syz_tun' (0000000008969ba1): kobject_uevent_env [ 311.287675][T10502] kobject: 'syz_tun' (0000000008969ba1): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 311.298386][T10502] kobject: 'queues' (00000000669442a2): kobject_add_internal: parent: 'syz_tun', set: '' [ 311.308776][T10502] kobject: 'queues' (00000000669442a2): kobject_uevent_env [ 311.316099][T10502] kobject: 'queues' (00000000669442a2): kobject_uevent_env: filter function caused the event to drop! [ 311.327952][T10502] kobject: 'rx-0' (000000009744d674): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.338104][T10502] kobject: 'rx-0' (000000009744d674): kobject_uevent_env [ 311.345466][T10502] kobject: 'rx-0' (000000009744d674): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 311.356670][T10502] kobject: 'tx-0' (0000000033fe34cc): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.366840][T10502] kobject: 'tx-0' (0000000033fe34cc): kobject_uevent_env [ 311.373908][T10502] kobject: 'tx-0' (0000000033fe34cc): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 311.385500][T10502] kobject: 'batman_adv' (00000000df0d49ae): kobject_add_internal: parent: 'syz_tun', set: '' [ 311.399568][T10502] kobject: 'ip6gretap0' (0000000044597ac0): kobject_add_internal: parent: 'net', set: 'devices' [ 311.410383][T10502] kobject: 'ip6gretap0' (0000000044597ac0): kobject_uevent_env [ 311.417969][T10502] kobject: 'ip6gretap0' (0000000044597ac0): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0' [ 311.428967][T10502] kobject: 'queues' (000000003c9d4e0c): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 311.439576][T10502] kobject: 'queues' (000000003c9d4e0c): kobject_uevent_env [ 311.446768][T10502] kobject: 'queues' (000000003c9d4e0c): kobject_uevent_env: filter function caused the event to drop! [ 311.457958][T10502] kobject: 'rx-0' (00000000e8c9ea0d): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.468084][T10502] kobject: 'rx-0' (00000000e8c9ea0d): kobject_uevent_env [ 311.475282][T10502] kobject: 'rx-0' (00000000e8c9ea0d): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/rx-0' [ 311.486864][T10502] kobject: 'tx-0' (00000000c3bf4ad1): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.497018][T10502] kobject: 'tx-0' (00000000c3bf4ad1): kobject_uevent_env [ 311.504097][T10502] kobject: 'tx-0' (00000000c3bf4ad1): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/tx-0' [ 311.516314][T10502] kobject: 'batman_adv' (00000000f7f19f54): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 311.527572][ T273] kobject: 'vxcan0' (000000003347f26a): kobject_cleanup, parent 0000000014180cb1 [ 311.527918][T10502] kobject: 'bridge0' (0000000056159496): kobject_add_internal: parent: 'net', set: 'devices' [ 311.539211][ T273] kobject: 'vxcan0' (000000003347f26a): calling ktype release [ 311.547437][T10502] kobject: 'bridge0' (0000000056159496): kobject_uevent_env [ 311.556989][ T273] kobject: 'vxcan0': free name [ 311.561601][T10502] kobject: 'bridge0' (0000000056159496): fill_kobj_path: path = '/devices/virtual/net/bridge0' [ 311.576904][T10502] kobject: 'queues' (000000003684b42f): kobject_add_internal: parent: 'bridge0', set: '' [ 311.587268][T10502] kobject: 'queues' (000000003684b42f): kobject_uevent_env [ 311.594593][T10502] kobject: 'queues' (000000003684b42f): kobject_uevent_env: filter function caused the event to drop! [ 311.605644][T10502] kobject: 'rx-0' (0000000037ed1cab): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.615740][T10502] kobject: 'rx-0' (0000000037ed1cab): kobject_uevent_env [ 311.622744][T10502] kobject: 'rx-0' (0000000037ed1cab): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/rx-0' [ 311.633969][T10502] kobject: 'tx-0' (00000000d5cadcc1): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.644740][T10502] kobject: 'tx-0' (00000000d5cadcc1): kobject_uevent_env [ 311.651763][T10502] kobject: 'tx-0' (00000000d5cadcc1): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/tx-0' [ 311.664218][T10502] kobject: 'brif' (000000008d491b9c): kobject_add_internal: parent: 'bridge0', set: '' [ 311.674558][T10502] kobject: 'batman_adv' (0000000020982c91): kobject_add_internal: parent: 'bridge0', set: '' [ 311.685982][T10502] kobject: 'vcan0' (00000000452146d8): kobject_add_internal: parent: 'net', set: 'devices' [ 311.696404][T10502] kobject: 'vcan0' (00000000452146d8): kobject_uevent_env [ 311.703547][T10502] kobject: 'vcan0' (00000000452146d8): fill_kobj_path: path = '/devices/virtual/net/vcan0' [ 311.713613][T10502] kobject: 'queues' (00000000bc0d2eec): kobject_add_internal: parent: 'vcan0', set: '' [ 311.723782][T10502] kobject: 'queues' (00000000bc0d2eec): kobject_uevent_env [ 311.730961][T10502] kobject: 'queues' (00000000bc0d2eec): kobject_uevent_env: filter function caused the event to drop! [ 311.741919][T10502] kobject: 'rx-0' (00000000ea52379a): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.752010][T10502] kobject: 'rx-0' (00000000ea52379a): kobject_uevent_env [ 311.759084][T10502] kobject: 'rx-0' (00000000ea52379a): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/rx-0' [ 311.770068][T10502] kobject: 'tx-0' (00000000750c06ad): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.780297][T10502] kobject: 'tx-0' (00000000750c06ad): kobject_uevent_env [ 311.787429][T10502] kobject: 'tx-0' (00000000750c06ad): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/tx-0' [ 311.799664][T10502] kobject: 'bond0' (00000000746e0775): kobject_add_internal: parent: 'net', set: 'devices' [ 311.810583][T10502] kobject: 'bond0' (00000000746e0775): kobject_uevent_env [ 311.817762][T10502] kobject: 'bond0' (00000000746e0775): fill_kobj_path: path = '/devices/virtual/net/bond0' [ 311.827807][T10502] kobject: 'queues' (0000000036d1f69a): kobject_add_internal: parent: 'bond0', set: '' [ 311.837987][T10502] kobject: 'queues' (0000000036d1f69a): kobject_uevent_env [ 311.845198][T10502] kobject: 'queues' (0000000036d1f69a): kobject_uevent_env: filter function caused the event to drop! [ 311.856209][T10502] kobject: 'rx-0' (00000000539feef3): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.866313][T10502] kobject: 'rx-0' (00000000539feef3): kobject_uevent_env [ 311.873546][T10502] kobject: 'rx-0' (00000000539feef3): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-0' [ 311.884754][T10502] kobject: 'rx-1' (000000004e1de257): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.895002][T10502] kobject: 'rx-1' (000000004e1de257): kobject_uevent_env [ 311.902017][T10502] kobject: 'rx-1' (000000004e1de257): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-1' [ 311.913732][T10502] kobject: 'rx-2' (000000001c1c559b): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.924034][T10502] kobject: 'rx-2' (000000001c1c559b): kobject_uevent_env [ 311.931055][T10502] kobject: 'rx-2' (000000001c1c559b): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-2' [ 311.942300][T10502] kobject: 'rx-3' (000000005964de3d): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.952383][T10502] kobject: 'rx-3' (000000005964de3d): kobject_uevent_env [ 311.959552][T10502] kobject: 'rx-3' (000000005964de3d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-3' [ 311.970686][T10502] kobject: 'rx-4' (0000000096280b24): kobject_add_internal: parent: 'queues', set: 'queues' [ 311.980967][T10502] kobject: 'rx-4' (0000000096280b24): kobject_uevent_env [ 311.988042][T10502] kobject: 'rx-4' (0000000096280b24): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-4' [ 311.999234][T10502] kobject: 'rx-5' (000000004aab0b3e): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.009452][T10502] kobject: 'rx-5' (000000004aab0b3e): kobject_uevent_env [ 312.016495][T10502] kobject: 'rx-5' (000000004aab0b3e): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-5' [ 312.027760][T10502] kobject: 'rx-6' (00000000bc9a89c4): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.037903][T10502] kobject: 'rx-6' (00000000bc9a89c4): kobject_uevent_env [ 312.045095][T10502] kobject: 'rx-6' (00000000bc9a89c4): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-6' [ 312.056124][T10502] kobject: 'rx-7' (000000003937863e): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.066220][T10502] kobject: 'rx-7' (000000003937863e): kobject_uevent_env [ 312.073309][T10502] kobject: 'rx-7' (000000003937863e): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-7' [ 312.084335][T10502] kobject: 'rx-8' (00000000c834375f): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.094464][T10502] kobject: 'rx-8' (00000000c834375f): kobject_uevent_env [ 312.101484][T10502] kobject: 'rx-8' (00000000c834375f): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-8' [ 312.112486][T10502] kobject: 'rx-9' (00000000aa790f9a): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.122584][T10502] kobject: 'rx-9' (00000000aa790f9a): kobject_uevent_env [ 312.129774][T10502] kobject: 'rx-9' (00000000aa790f9a): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-9' [ 312.141068][T10502] kobject: 'rx-10' (00000000b70ba4e0): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.151281][T10502] kobject: 'rx-10' (00000000b70ba4e0): kobject_uevent_env [ 312.158422][T10502] kobject: 'rx-10' (00000000b70ba4e0): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-10' [ 312.169603][T10502] kobject: 'rx-11' (00000000b7943c5e): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.179807][T10502] kobject: 'rx-11' (00000000b7943c5e): kobject_uevent_env [ 312.186947][T10502] kobject: 'rx-11' (00000000b7943c5e): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-11' [ 312.198118][T10502] kobject: 'rx-12' (00000000a81797a5): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.208331][T10502] kobject: 'rx-12' (00000000a81797a5): kobject_uevent_env [ 312.215463][T10502] kobject: 'rx-12' (00000000a81797a5): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-12' [ 312.226663][T10502] kobject: 'rx-13' (0000000085e6b3ea): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.236955][T10502] kobject: 'rx-13' (0000000085e6b3ea): kobject_uevent_env [ 312.244418][T10502] kobject: 'rx-13' (0000000085e6b3ea): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-13' [ 312.255658][T10502] kobject: 'rx-14' (000000005927f13f): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.265863][T10502] kobject: 'rx-14' (000000005927f13f): kobject_uevent_env [ 312.272970][T10502] kobject: 'rx-14' (000000005927f13f): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-14' [ 312.284535][T10502] kobject: 'rx-15' (0000000019d4421b): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.294784][T10502] kobject: 'rx-15' (0000000019d4421b): kobject_uevent_env [ 312.301898][T10502] kobject: 'rx-15' (0000000019d4421b): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-15' [ 312.313128][T10502] kobject: 'tx-0' (000000004a42d82e): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.323338][T10502] kobject: 'tx-0' (000000004a42d82e): kobject_uevent_env [ 312.330365][T10502] kobject: 'tx-0' (000000004a42d82e): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-0' [ 312.341392][T10502] kobject: 'tx-1' (00000000f1e799cf): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.351580][T10502] kobject: 'tx-1' (00000000f1e799cf): kobject_uevent_env [ 312.358905][T10502] kobject: 'tx-1' (00000000f1e799cf): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-1' [ 312.370088][T10502] kobject: 'tx-2' (00000000e47e5e0f): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.380328][T10502] kobject: 'tx-2' (00000000e47e5e0f): kobject_uevent_env [ 312.387466][T10502] kobject: 'tx-2' (00000000e47e5e0f): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-2' [ 312.398498][T10502] kobject: 'tx-3' (00000000b70c3e48): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.408647][T10502] kobject: 'tx-3' (00000000b70c3e48): kobject_uevent_env [ 312.415696][T10502] kobject: 'tx-3' (00000000b70c3e48): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-3' [ 312.426683][T10502] kobject: 'tx-4' (00000000aad5b827): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.436862][T10502] kobject: 'tx-4' (00000000aad5b827): kobject_uevent_env [ 312.444649][T10502] kobject: 'tx-4' (00000000aad5b827): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-4' [ 312.455662][T10502] kobject: 'tx-5' (00000000ab996aba): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.465957][T10502] kobject: 'tx-5' (00000000ab996aba): kobject_uevent_env [ 312.472965][T10502] kobject: 'tx-5' (00000000ab996aba): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-5' [ 312.484013][T10502] kobject: 'tx-6' (0000000058a0b3ea): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.494239][T10502] kobject: 'tx-6' (0000000058a0b3ea): kobject_uevent_env [ 312.501409][T10502] kobject: 'tx-6' (0000000058a0b3ea): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-6' [ 312.512414][T10502] kobject: 'tx-7' (000000004e6b6c54): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.522952][T10502] kobject: 'tx-7' (000000004e6b6c54): kobject_uevent_env [ 312.530015][T10502] kobject: 'tx-7' (000000004e6b6c54): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-7' [ 312.541000][T10502] kobject: 'tx-8' (00000000ed27b2c1): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.551197][T10502] kobject: 'tx-8' (00000000ed27b2c1): kobject_uevent_env [ 312.558269][T10502] kobject: 'tx-8' (00000000ed27b2c1): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-8' [ 312.569325][T10502] kobject: 'tx-9' (00000000151f640d): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.579646][T10502] kobject: 'tx-9' (00000000151f640d): kobject_uevent_env [ 312.586705][T10502] kobject: 'tx-9' (00000000151f640d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-9' [ 312.597686][T10502] kobject: 'tx-10' (000000000437cd10): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.607968][T10502] kobject: 'tx-10' (000000000437cd10): kobject_uevent_env [ 312.615092][T10502] kobject: 'tx-10' (000000000437cd10): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-10' [ 312.626271][T10502] kobject: 'tx-11' (0000000013f5ac1a): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.636486][T10502] kobject: 'tx-11' (0000000013f5ac1a): kobject_uevent_env [ 312.643628][T10502] kobject: 'tx-11' (0000000013f5ac1a): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-11' [ 312.654789][T10502] kobject: 'tx-12' (00000000fa6938f4): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.665082][T10502] kobject: 'tx-12' (00000000fa6938f4): kobject_uevent_env [ 312.672192][T10502] kobject: 'tx-12' (00000000fa6938f4): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-12' [ 312.683674][T10502] kobject: 'tx-13' (00000000efe726ff): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.693967][T10502] kobject: 'tx-13' (00000000efe726ff): kobject_uevent_env [ 312.701080][T10502] kobject: 'tx-13' (00000000efe726ff): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-13' [ 312.712269][T10502] kobject: 'tx-14' (00000000d55f56bb): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.722524][T10502] kobject: 'tx-14' (00000000d55f56bb): kobject_uevent_env [ 312.729670][T10502] kobject: 'tx-14' (00000000d55f56bb): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-14' [ 312.740825][T10502] kobject: 'tx-15' (00000000368ad0b3): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.751208][T10502] kobject: 'tx-15' (00000000368ad0b3): kobject_uevent_env [ 312.758335][T10502] kobject: 'tx-15' (00000000368ad0b3): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-15' [ 312.770019][T10502] kobject: 'batman_adv' (000000002f2a59de): kobject_add_internal: parent: 'bond0', set: '' [ 312.780807][ T273] kobject: 'batadv0' (0000000062acb69f): kobject_cleanup, parent 0000000014180cb1 [ 312.781378][T10502] kobject: 'team0' (00000000483b28d7): kobject_add_internal: parent: 'net', set: 'devices' [ 312.792380][ T273] kobject: 'batadv0' (0000000062acb69f): calling ktype release [ 312.800864][T10502] kobject: 'team0' (00000000483b28d7): kobject_uevent_env [ 312.810034][ T273] kobject: 'batadv0': free name [ 312.814707][T10502] kobject: 'team0' (00000000483b28d7): fill_kobj_path: path = '/devices/virtual/net/team0' [ 312.829972][T10502] kobject: 'queues' (000000004db03ba8): kobject_add_internal: parent: 'team0', set: '' [ 312.840145][T10502] kobject: 'queues' (000000004db03ba8): kobject_uevent_env [ 312.847365][T10502] kobject: 'queues' (000000004db03ba8): kobject_uevent_env: filter function caused the event to drop! [ 312.858329][T10502] kobject: 'rx-0' (000000006700cf6c): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.868431][T10502] kobject: 'rx-0' (000000006700cf6c): kobject_uevent_env [ 312.875468][T10502] kobject: 'rx-0' (000000006700cf6c): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-0' [ 312.886730][T10502] kobject: 'rx-1' (0000000034a01f2d): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.896872][T10502] kobject: 'rx-1' (0000000034a01f2d): kobject_uevent_env [ 312.904093][T10502] kobject: 'rx-1' (0000000034a01f2d): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-1' [ 312.915124][T10502] kobject: 'rx-2' (0000000042effdb3): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.925272][T10502] kobject: 'rx-2' (0000000042effdb3): kobject_uevent_env [ 312.932285][T10502] kobject: 'rx-2' (0000000042effdb3): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-2' [ 312.943301][T10502] kobject: 'rx-3' (00000000f0e70e31): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.953415][T10502] kobject: 'rx-3' (00000000f0e70e31): kobject_uevent_env [ 312.960442][T10502] kobject: 'rx-3' (00000000f0e70e31): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-3' [ 312.971453][T10502] kobject: 'rx-4' (000000003cd7e73a): kobject_add_internal: parent: 'queues', set: 'queues' [ 312.981543][T10502] kobject: 'rx-4' (000000003cd7e73a): kobject_uevent_env [ 312.988606][T10502] kobject: 'rx-4' (000000003cd7e73a): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-4' [ 312.999586][T10502] kobject: 'rx-5' (000000006503505b): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.009746][T10502] kobject: 'rx-5' (000000006503505b): kobject_uevent_env [ 313.017022][T10502] kobject: 'rx-5' (000000006503505b): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-5' [ 313.028041][T10502] kobject: 'rx-6' (00000000b8d1b848): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.038137][T10502] kobject: 'rx-6' (00000000b8d1b848): kobject_uevent_env [ 313.045309][T10502] kobject: 'rx-6' (00000000b8d1b848): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-6' [ 313.056415][T10502] kobject: 'rx-7' (000000007a49d8e9): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.066535][T10502] kobject: 'rx-7' (000000007a49d8e9): kobject_uevent_env [ 313.073692][T10502] kobject: 'rx-7' (000000007a49d8e9): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-7' [ 313.084849][T10502] kobject: 'rx-8' (000000009715d4cd): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.094967][T10502] kobject: 'rx-8' (000000009715d4cd): kobject_uevent_env [ 313.101984][T10502] kobject: 'rx-8' (000000009715d4cd): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-8' [ 313.113006][T10502] kobject: 'rx-9' (0000000054dd5e77): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.123095][T10502] kobject: 'rx-9' (0000000054dd5e77): kobject_uevent_env [ 313.130406][T10502] kobject: 'rx-9' (0000000054dd5e77): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-9' [ 313.141434][T10502] kobject: 'rx-10' (0000000002477d7a): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.151655][T10502] kobject: 'rx-10' (0000000002477d7a): kobject_uevent_env [ 313.158783][T10502] kobject: 'rx-10' (0000000002477d7a): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-10' [ 313.170094][T10502] kobject: 'rx-11' (00000000d429ed14): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.180749][T10502] kobject: 'rx-11' (00000000d429ed14): kobject_uevent_env [ 313.187886][T10502] kobject: 'rx-11' (00000000d429ed14): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-11' [ 313.199079][T10502] kobject: 'rx-12' (000000001c142e27): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.209265][T10502] kobject: 'rx-12' (000000001c142e27): kobject_uevent_env [ 313.216485][T10502] kobject: 'rx-12' (000000001c142e27): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-12' [ 313.227658][T10502] kobject: 'rx-13' (00000000bed71c94): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.238075][T10502] kobject: 'rx-13' (00000000bed71c94): kobject_uevent_env [ 313.245238][T10502] kobject: 'rx-13' (00000000bed71c94): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-13' [ 313.256389][T10502] kobject: 'rx-14' (0000000018c236b8): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.266694][T10502] kobject: 'rx-14' (0000000018c236b8): kobject_uevent_env [ 313.273824][T10502] kobject: 'rx-14' (0000000018c236b8): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-14' [ 313.285045][T10502] kobject: 'rx-15' (000000002b8e7383): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.295272][T10502] kobject: 'rx-15' (000000002b8e7383): kobject_uevent_env [ 313.302582][T10502] kobject: 'rx-15' (000000002b8e7383): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-15' [ 313.313818][T10502] kobject: 'tx-0' (00000000ef374933): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.324991][T10502] kobject: 'tx-0' (00000000ef374933): kobject_uevent_env [ 313.332015][T10502] kobject: 'tx-0' (00000000ef374933): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-0' [ 313.343045][T10502] kobject: 'tx-1' (00000000ee19592a): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.353624][T10502] kobject: 'tx-1' (00000000ee19592a): kobject_uevent_env [ 313.360664][T10502] kobject: 'tx-1' (00000000ee19592a): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-1' [ 313.371701][T10502] kobject: 'tx-2' (00000000f70cc739): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.381927][T10502] kobject: 'tx-2' (00000000f70cc739): kobject_uevent_env [ 313.389015][T10502] kobject: 'tx-2' (00000000f70cc739): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-2' [ 313.400022][T10502] kobject: 'tx-3' (0000000023cdbd0f): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.411013][T10502] kobject: 'tx-3' (0000000023cdbd0f): kobject_uevent_env [ 313.418613][T10502] kobject: 'tx-3' (0000000023cdbd0f): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-3' [ 313.430413][T10502] kobject: 'tx-4' (00000000a38a24f3): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.441002][T10502] kobject: 'tx-4' (00000000a38a24f3): kobject_uevent_env [ 313.448095][T10502] kobject: 'tx-4' (00000000a38a24f3): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-4' [ 313.459099][T10502] kobject: 'tx-5' (00000000441b6859): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.469558][T10502] kobject: 'tx-5' (00000000441b6859): kobject_uevent_env [ 313.476637][T10502] kobject: 'tx-5' (00000000441b6859): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-5' [ 313.487670][T10502] kobject: 'tx-6' (0000000041fe6be7): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.497871][T10502] kobject: 'tx-6' (0000000041fe6be7): kobject_uevent_env [ 313.504941][T10502] kobject: 'tx-6' (0000000041fe6be7): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-6' [ 313.515962][T10502] kobject: 'tx-7' (000000007d696725): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.526141][T10502] kobject: 'tx-7' (000000007d696725): kobject_uevent_env [ 313.533150][T10502] kobject: 'tx-7' (000000007d696725): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-7' [ 313.544153][T10502] kobject: 'tx-8' (0000000081066450): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.554348][T10502] kobject: 'tx-8' (0000000081066450): kobject_uevent_env [ 313.561370][T10502] kobject: 'tx-8' (0000000081066450): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-8' [ 313.572368][T10502] kobject: 'tx-9' (00000000d3beab37): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.582684][T10502] kobject: 'tx-9' (00000000d3beab37): kobject_uevent_env [ 313.589802][T10502] kobject: 'tx-9' (00000000d3beab37): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-9' [ 313.600999][T10502] kobject: 'tx-10' (000000000178cee6): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.611278][T10502] kobject: 'tx-10' (000000000178cee6): kobject_uevent_env [ 313.618411][T10502] kobject: 'tx-10' (000000000178cee6): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-10' [ 313.629595][T10502] kobject: 'tx-11' (000000005a5fdea1): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.639825][T10502] kobject: 'tx-11' (000000005a5fdea1): kobject_uevent_env [ 313.646968][T10502] kobject: 'tx-11' (000000005a5fdea1): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-11' [ 313.658119][T10502] kobject: 'tx-12' (00000000b35347a8): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.668495][T10502] kobject: 'tx-12' (00000000b35347a8): kobject_uevent_env [ 313.675636][T10502] kobject: 'tx-12' (00000000b35347a8): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-12' [ 313.687049][T10502] kobject: 'tx-13' (00000000e525e317): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.697339][T10502] kobject: 'tx-13' (00000000e525e317): kobject_uevent_env [ 313.704497][T10502] kobject: 'tx-13' (00000000e525e317): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-13' [ 313.715796][T10502] kobject: 'tx-14' (000000004d157505): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.726026][T10502] kobject: 'tx-14' (000000004d157505): kobject_uevent_env [ 313.733123][T10502] kobject: 'tx-14' (000000004d157505): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-14' [ 313.744340][T10502] kobject: 'tx-15' (000000000898a45d): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.754636][T10502] kobject: 'tx-15' (000000000898a45d): kobject_uevent_env [ 313.761742][T10502] kobject: 'tx-15' (000000000898a45d): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-15' [ 313.773552][T10502] kobject: 'batman_adv' (000000007ba9b72e): kobject_add_internal: parent: 'team0', set: '' [ 313.784332][ T273] kobject: 'caif0' (000000001acd6842): kobject_cleanup, parent 0000000014180cb1 [ 313.784584][T10502] kobject: 'dummy0' (00000000fd9d3f6f): kobject_add_internal: parent: 'net', set: 'devices' [ 313.795677][ T273] kobject: 'caif0' (000000001acd6842): calling ktype release [ 313.804779][T10502] kobject: 'dummy0' (00000000fd9d3f6f): kobject_uevent_env [ 313.811216][ T273] kobject: 'caif0': free name [ 313.818029][T10502] kobject: 'dummy0' (00000000fd9d3f6f): fill_kobj_path: path = '/devices/virtual/net/dummy0' [ 313.818116][T10502] kobject: 'queues' (00000000ffa4209e): kobject_add_internal: parent: 'dummy0', set: '' [ 313.843084][T10502] kobject: 'queues' (00000000ffa4209e): kobject_uevent_env [ 313.850290][T10502] kobject: 'queues' (00000000ffa4209e): kobject_uevent_env: filter function caused the event to drop! [ 313.861239][T10502] kobject: 'rx-0' (0000000055c2e0f7): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.871355][T10502] kobject: 'rx-0' (0000000055c2e0f7): kobject_uevent_env [ 313.878392][T10502] kobject: 'rx-0' (0000000055c2e0f7): fill_kobj_path: path = '/devices/virtual/net/dummy0/queues/rx-0' [ 313.889736][T10502] kobject: 'tx-0' (0000000041eaa4d2): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.899941][T10502] kobject: 'tx-0' (0000000041eaa4d2): kobject_uevent_env [ 313.906993][T10502] kobject: 'tx-0' (0000000041eaa4d2): fill_kobj_path: path = '/devices/virtual/net/dummy0/queues/tx-0' [ 313.918747][T10502] kobject: 'batman_adv' (0000000022a44ee4): kobject_add_internal: parent: 'dummy0', set: '' [ 313.929799][T10502] kobject: 'nlmon0' (000000006ec6d458): kobject_add_internal: parent: 'net', set: 'devices' [ 313.940208][T10502] kobject: 'nlmon0' (000000006ec6d458): kobject_uevent_env [ 313.947478][T10502] kobject: 'nlmon0' (000000006ec6d458): fill_kobj_path: path = '/devices/virtual/net/nlmon0' [ 313.957738][T10502] kobject: 'queues' (000000000bce7262): kobject_add_internal: parent: 'nlmon0', set: '' [ 313.968093][T10502] kobject: 'queues' (000000000bce7262): kobject_uevent_env [ 313.975299][T10502] kobject: 'queues' (000000000bce7262): kobject_uevent_env: filter function caused the event to drop! [ 313.986279][T10502] kobject: 'rx-0' (00000000b9c161f9): kobject_add_internal: parent: 'queues', set: 'queues' [ 313.996374][T10502] kobject: 'rx-0' (00000000b9c161f9): kobject_uevent_env [ 314.003433][T10502] kobject: 'rx-0' (00000000b9c161f9): fill_kobj_path: path = '/devices/virtual/net/nlmon0/queues/rx-0' [ 314.014737][T10502] kobject: 'tx-0' (00000000ad847134): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.025161][T10502] kobject: 'tx-0' (00000000ad847134): kobject_uevent_env [ 314.032182][T10502] kobject: 'tx-0' (00000000ad847134): fill_kobj_path: path = '/devices/virtual/net/nlmon0/queues/tx-0' [ 314.044354][T10502] chnl_net:caif_netlink_parms(): no params data found [ 314.051233][T10502] kobject: 'caif0' (00000000f0232679): kobject_add_internal: parent: 'net', set: 'devices' [ 314.061666][T10502] kobject: 'caif0' (00000000f0232679): kobject_uevent_env [ 314.068803][T10502] kobject: 'caif0' (00000000f0232679): fill_kobj_path: path = '/devices/virtual/net/caif0' [ 314.078879][T10502] kobject: 'queues' (000000007165aea4): kobject_add_internal: parent: 'caif0', set: '' [ 314.089229][T10502] kobject: 'queues' (000000007165aea4): kobject_uevent_env [ 314.096428][T10502] kobject: 'queues' (000000007165aea4): kobject_uevent_env: filter function caused the event to drop! [ 314.107376][T10502] kobject: 'rx-0' (00000000b89ea1a5): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.117516][T10502] kobject: 'rx-0' (00000000b89ea1a5): kobject_uevent_env [ 314.124589][T10502] kobject: 'rx-0' (00000000b89ea1a5): fill_kobj_path: path = '/devices/virtual/net/caif0/queues/rx-0' [ 314.135876][T10502] kobject: 'tx-0' (00000000ccdb338e): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.146088][T10502] kobject: 'tx-0' (00000000ccdb338e): kobject_uevent_env [ 314.153109][T10502] kobject: 'tx-0' (00000000ccdb338e): fill_kobj_path: path = '/devices/virtual/net/caif0/queues/tx-0' [ 314.165244][T10502] kobject: 'batadv0' (0000000082054ea6): kobject_add_internal: parent: 'net', set: 'devices' [ 314.175928][T10502] kobject: 'batadv0' (0000000082054ea6): kobject_uevent_env [ 314.183277][T10502] kobject: 'batadv0' (0000000082054ea6): fill_kobj_path: path = '/devices/virtual/net/batadv0' [ 314.193652][T10502] kobject: 'queues' (000000001f71e7b8): kobject_add_internal: parent: 'batadv0', set: '' [ 314.204144][T10502] kobject: 'queues' (000000001f71e7b8): kobject_uevent_env [ 314.211326][T10502] kobject: 'queues' (000000001f71e7b8): kobject_uevent_env: filter function caused the event to drop! [ 314.222291][T10502] kobject: 'rx-0' (000000008d961a63): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.232605][T10502] kobject: 'rx-0' (000000008d961a63): kobject_uevent_env [ 314.239666][T10502] kobject: 'rx-0' (000000008d961a63): fill_kobj_path: path = '/devices/virtual/net/batadv0/queues/rx-0' [ 314.251004][T10502] kobject: 'tx-0' (0000000040097a8b): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.261215][T10502] kobject: 'tx-0' (0000000040097a8b): kobject_uevent_env [ 314.268277][T10502] kobject: 'tx-0' (0000000040097a8b): fill_kobj_path: path = '/devices/virtual/net/batadv0/queues/tx-0' [ 314.279947][T10502] kobject: 'mesh' (00000000b9e060d1): kobject_add_internal: parent: 'batadv0', set: '' [ 314.290684][T10502] kobject: 'vxcan0' (000000002c392e79): kobject_add_internal: parent: 'net', set: 'devices' [ 314.301289][T10502] kobject: 'vxcan0' (000000002c392e79): kobject_uevent_env [ 314.308509][T10502] kobject: 'vxcan0' (000000002c392e79): fill_kobj_path: path = '/devices/virtual/net/vxcan0' [ 314.318749][T10502] kobject: 'queues' (000000005e6521c8): kobject_add_internal: parent: 'vxcan0', set: '' [ 314.328999][T10502] kobject: 'queues' (000000005e6521c8): kobject_uevent_env [ 314.336194][T10502] kobject: 'queues' (000000005e6521c8): kobject_uevent_env: filter function caused the event to drop! [ 314.347174][T10502] kobject: 'rx-0' (000000008ca36407): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.357533][T10502] kobject: 'rx-0' (000000008ca36407): kobject_uevent_env [ 314.364642][T10502] kobject: 'rx-0' (000000008ca36407): fill_kobj_path: path = '/devices/virtual/net/vxcan0/queues/rx-0' [ 314.381159][T10502] kobject: 'tx-0' (000000000b6b198f): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.391385][T10502] kobject: 'tx-0' (000000000b6b198f): kobject_uevent_env [ 314.398436][T10502] kobject: 'tx-0' (000000000b6b198f): fill_kobj_path: path = '/devices/virtual/net/vxcan0/queues/tx-0' [ 314.409998][T10502] kobject: 'vxcan1' (00000000a5d7c006): kobject_add_internal: parent: 'net', set: 'devices' [ 314.420462][T10502] kobject: 'vxcan1' (00000000a5d7c006): kobject_uevent_env [ 314.427722][T10502] kobject: 'vxcan1' (00000000a5d7c006): fill_kobj_path: path = '/devices/virtual/net/vxcan1' [ 314.438046][T10502] kobject: 'queues' (000000006aedf8a5): kobject_add_internal: parent: 'vxcan1', set: '' [ 314.448905][T10502] kobject: 'queues' (000000006aedf8a5): kobject_uevent_env [ 314.456125][T10502] kobject: 'queues' (000000006aedf8a5): kobject_uevent_env: filter function caused the event to drop! [ 314.468214][T10502] kobject: 'rx-0' (000000007fc9d311): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.478413][T10502] kobject: 'rx-0' (000000007fc9d311): kobject_uevent_env [ 314.485565][T10502] kobject: 'rx-0' (000000007fc9d311): fill_kobj_path: path = '/devices/virtual/net/vxcan1/queues/rx-0' [ 314.496661][T10502] kobject: 'tx-0' (00000000c883fa1f): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.506813][T10502] kobject: 'tx-0' (00000000c883fa1f): kobject_uevent_env [ 314.513876][T10502] kobject: 'tx-0' (00000000c883fa1f): fill_kobj_path: path = '/devices/virtual/net/vxcan1/queues/tx-0' [ 314.525444][ T273] kobject: 'nlmon0' (00000000f2a5bd04): kobject_cleanup, parent 0000000014180cb1 [ 314.525907][T10502] kobject: 'veth0' (000000006621b268): kobject_add_internal: parent: 'net', set: 'devices' [ 314.537927][ T273] kobject: 'nlmon0' (00000000f2a5bd04): calling ktype release [ 314.545167][T10502] kobject: 'veth0' (000000006621b268): kobject_uevent_env [ 314.552099][ T273] kobject: 'nlmon0': free name [ 314.559155][T10502] kobject: 'veth0' (000000006621b268): fill_kobj_path: path = '/devices/virtual/net/veth0' [ 314.574120][T10502] kobject: 'queues' (0000000052cba5c6): kobject_add_internal: parent: 'veth0', set: '' [ 314.584329][T10502] kobject: 'queues' (0000000052cba5c6): kobject_uevent_env [ 314.591632][T10502] kobject: 'queues' (0000000052cba5c6): kobject_uevent_env: filter function caused the event to drop! [ 314.602594][T10502] kobject: 'rx-0' (00000000e3ebd29a): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.612746][T10502] kobject: 'rx-0' (00000000e3ebd29a): kobject_uevent_env [ 314.619848][T10502] kobject: 'rx-0' (00000000e3ebd29a): fill_kobj_path: path = '/devices/virtual/net/veth0/queues/rx-0' [ 314.630852][T10502] kobject: 'tx-0' (00000000517811cf): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.641063][T10502] kobject: 'tx-0' (00000000517811cf): kobject_uevent_env [ 314.648207][T10502] kobject: 'tx-0' (00000000517811cf): fill_kobj_path: path = '/devices/virtual/net/veth0/queues/tx-0' [ 314.659740][T10502] kobject: 'batman_adv' (0000000022e3f0f1): kobject_add_internal: parent: 'veth0', set: '' [ 314.670639][T10502] kobject: 'veth1' (00000000cb010643): kobject_add_internal: parent: 'net', set: 'devices' [ 314.681169][T10502] kobject: 'veth1' (00000000cb010643): kobject_uevent_env [ 314.688514][T10502] kobject: 'veth1' (00000000cb010643): fill_kobj_path: path = '/devices/virtual/net/veth1' [ 314.698607][T10502] kobject: 'queues' (0000000041cb7c9e): kobject_add_internal: parent: 'veth1', set: '' [ 314.708801][T10502] kobject: 'queues' (0000000041cb7c9e): kobject_uevent_env [ 314.716013][T10502] kobject: 'queues' (0000000041cb7c9e): kobject_uevent_env: filter function caused the event to drop! [ 314.727390][T10502] kobject: 'rx-0' (00000000303a9783): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.737514][T10502] kobject: 'rx-0' (00000000303a9783): kobject_uevent_env [ 314.744563][T10502] kobject: 'rx-0' (00000000303a9783): fill_kobj_path: path = '/devices/virtual/net/veth1/queues/rx-0' [ 314.755606][T10502] kobject: 'tx-0' (0000000034936973): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.765779][T10502] kobject: 'tx-0' (0000000034936973): kobject_uevent_env [ 314.772827][T10502] kobject: 'tx-0' (0000000034936973): fill_kobj_path: path = '/devices/virtual/net/veth1/queues/tx-0' [ 314.784419][T10502] kobject: 'batman_adv' (000000001ac83a8d): kobject_add_internal: parent: 'veth1', set: '' [ 314.795980][T10502] kobject: 'veth0_to_bridge' (00000000300b3a71): kobject_add_internal: parent: 'net', set: 'devices' [ 314.807426][T10502] kobject: 'veth0_to_bridge' (00000000300b3a71): kobject_uevent_env [ 314.815447][T10502] kobject: 'veth0_to_bridge' (00000000300b3a71): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge' [ 314.827259][T10502] kobject: 'queues' (0000000075aeab81): kobject_add_internal: parent: 'veth0_to_bridge', set: '' [ 314.838295][T10502] kobject: 'queues' (0000000075aeab81): kobject_uevent_env [ 314.846346][T10502] kobject: 'queues' (0000000075aeab81): kobject_uevent_env: filter function caused the event to drop! [ 314.857315][T10502] kobject: 'rx-0' (000000007414bc8f): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.867427][T10502] kobject: 'rx-0' (000000007414bc8f): kobject_uevent_env [ 314.874487][T10502] kobject: 'rx-0' (000000007414bc8f): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge/queues/rx-0' [ 314.886356][T10502] kobject: 'tx-0' (00000000c4a2c412): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.896540][T10502] kobject: 'tx-0' (00000000c4a2c412): kobject_uevent_env [ 314.903896][T10502] kobject: 'tx-0' (00000000c4a2c412): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge/queues/tx-0' [ 314.916315][T10502] kobject: 'batman_adv' (00000000e295a9fb): kobject_add_internal: parent: 'veth0_to_bridge', set: '' [ 314.928025][T10502] kobject: 'bridge_slave_0' (00000000799cba56): kobject_add_internal: parent: 'net', set: 'devices' [ 314.939521][T10502] kobject: 'bridge_slave_0' (00000000799cba56): kobject_uevent_env [ 314.947510][T10502] kobject: 'bridge_slave_0' (00000000799cba56): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_0' [ 314.959386][T10502] kobject: 'queues' (00000000f175d30b): kobject_add_internal: parent: 'bridge_slave_0', set: '' [ 314.970365][T10502] kobject: 'queues' (00000000f175d30b): kobject_uevent_env [ 314.977583][T10502] kobject: 'queues' (00000000f175d30b): kobject_uevent_env: filter function caused the event to drop! [ 314.988556][T10502] kobject: 'rx-0' (000000006c3981d4): kobject_add_internal: parent: 'queues', set: 'queues' [ 314.998650][T10502] kobject: 'rx-0' (000000006c3981d4): kobject_uevent_env [ 315.005781][T10502] kobject: 'rx-0' (000000006c3981d4): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_0/queues/rx-0' [ 315.017901][T10502] kobject: 'tx-0' (00000000996df383): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.028142][T10502] kobject: 'tx-0' (00000000996df383): kobject_uevent_env [ 315.035212][T10502] kobject: 'tx-0' (00000000996df383): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_0/queues/tx-0' [ 315.047659][T10502] kobject: 'batman_adv' (000000004225b084): kobject_add_internal: parent: 'bridge_slave_0', set: '' [ 315.059219][ T273] kobject: 'dummy0' (00000000ede7f2e4): kobject_cleanup, parent 0000000014180cb1 [ 315.059572][T10502] kobject: 'veth1_to_bridge' (00000000c822d8ce): kobject_add_internal: parent: 'net', set: 'devices' [ 315.071130][ T273] kobject: 'dummy0' (00000000ede7f2e4): calling ktype release [ 315.079850][T10502] kobject: 'veth1_to_bridge' (00000000c822d8ce): kobject_uevent_env [ 315.089510][ T273] kobject: 'dummy0': free name [ 315.094787][T10502] kobject: 'veth1_to_bridge' (00000000c822d8ce): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bridge' [ 315.111434][T10502] kobject: 'queues' (000000004fa81509): kobject_add_internal: parent: 'veth1_to_bridge', set: '' [ 315.124520][T10502] kobject: 'queues' (000000004fa81509): kobject_uevent_env [ 315.131693][T10502] kobject: 'queues' (000000004fa81509): kobject_uevent_env: filter function caused the event to drop! [ 315.142648][T10502] kobject: 'rx-0' (00000000a65a0f71): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.152754][T10502] kobject: 'rx-0' (00000000a65a0f71): kobject_uevent_env [ 315.159805][T10502] kobject: 'rx-0' (00000000a65a0f71): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bridge/queues/rx-0' [ 315.171746][T10502] kobject: 'tx-0' (000000001832f9b4): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.181948][T10502] kobject: 'tx-0' (000000001832f9b4): kobject_uevent_env [ 315.189002][T10502] kobject: 'tx-0' (000000001832f9b4): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bridge/queues/tx-0' [ 315.201407][T10502] kobject: 'batman_adv' (0000000075af1a6c): kobject_add_internal: parent: 'veth1_to_bridge', set: '' [ 315.213183][T10502] kobject: 'bridge_slave_1' (00000000ef7274da): kobject_add_internal: parent: 'net', set: 'devices' [ 315.224499][T10502] kobject: 'bridge_slave_1' (00000000ef7274da): kobject_uevent_env [ 315.232382][T10502] kobject: 'bridge_slave_1' (00000000ef7274da): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_1' [ 315.244552][T10502] kobject: 'queues' (000000004ee9a955): kobject_add_internal: parent: 'bridge_slave_1', set: '' [ 315.255542][T10502] kobject: 'queues' (000000004ee9a955): kobject_uevent_env [ 315.262719][T10502] kobject: 'queues' (000000004ee9a955): kobject_uevent_env: filter function caused the event to drop! [ 315.273685][T10502] kobject: 'rx-0' (000000005109c8da): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.283819][T10502] kobject: 'rx-0' (000000005109c8da): kobject_uevent_env [ 315.291255][T10502] kobject: 'rx-0' (000000005109c8da): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_1/queues/rx-0' [ 315.303069][T10502] kobject: 'tx-0' (000000006f9c7702): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.313271][T10502] kobject: 'tx-0' (000000006f9c7702): kobject_uevent_env [ 315.320300][T10502] kobject: 'tx-0' (000000006f9c7702): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_1/queues/tx-0' [ 315.332541][T10502] kobject: 'batman_adv' (00000000a5f4c96b): kobject_add_internal: parent: 'bridge_slave_1', set: '' [ 315.344354][T10502] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.351395][T10502] bridge0: port 1(bridge_slave_0) entered disabled state [ 315.358791][T10502] kobject: 'brport' (00000000ef1f83a5): kobject_add_internal: parent: 'bridge_slave_0', set: '' [ 315.370221][T10502] device bridge_slave_0 entered promiscuous mode [ 315.377169][T10502] kobject: 'brport' (00000000ef1f83a5): kobject_uevent_env [ 315.384402][T10502] kobject: 'brport' (00000000ef1f83a5): kobject_uevent_env: filter function caused the event to drop! [ 315.395406][ T273] kobject: 'team0' (00000000a5c51e5e): kobject_cleanup, parent 0000000014180cb1 [ 315.395873][T10502] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.407802][ T273] kobject: 'team0' (00000000a5c51e5e): calling ktype release [ 315.416754][T10502] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.419386][ T273] kobject: 'team0': free name [ 315.426053][T10502] kobject: 'brport' (0000000007c1453d): kobject_add_internal: parent: 'bridge_slave_1', set: '' [ 315.441957][T10502] device bridge_slave_1 entered promiscuous mode [ 315.448785][T10502] kobject: 'brport' (0000000007c1453d): kobject_uevent_env [ 315.456039][T10502] kobject: 'brport' (0000000007c1453d): kobject_uevent_env: filter function caused the event to drop! [ 315.467644][T10502] kobject: 'veth0_to_bond' (000000000adfdc42): kobject_add_internal: parent: 'net', set: 'devices' [ 315.478792][T10502] kobject: 'veth0_to_bond' (000000000adfdc42): kobject_uevent_env [ 315.490741][T10502] kobject: 'veth0_to_bond' (000000000adfdc42): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bond' [ 315.502216][T10502] kobject: 'queues' (00000000ba02d25a): kobject_add_internal: parent: 'veth0_to_bond', set: '' [ 315.513085][T10502] kobject: 'queues' (00000000ba02d25a): kobject_uevent_env [ 315.520284][T10502] kobject: 'queues' (00000000ba02d25a): kobject_uevent_env: filter function caused the event to drop! [ 315.531238][T10502] kobject: 'rx-0' (000000009047817f): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.541354][T10502] kobject: 'rx-0' (000000009047817f): kobject_uevent_env [ 315.548434][T10502] kobject: 'rx-0' (000000009047817f): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bond/queues/rx-0' [ 315.560168][T10502] kobject: 'tx-0' (00000000bf9e43d5): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.570350][T10502] kobject: 'tx-0' (00000000bf9e43d5): kobject_uevent_env [ 315.577722][T10502] kobject: 'tx-0' (00000000bf9e43d5): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bond/queues/tx-0' [ 315.591164][T10502] kobject: 'batman_adv' (0000000019222179): kobject_add_internal: parent: 'veth0_to_bond', set: '' [ 315.602783][T10502] kobject: 'bond_slave_0' (0000000059e730cf): kobject_add_internal: parent: 'net', set: 'devices' [ 315.613723][T10502] kobject: 'bond_slave_0' (0000000059e730cf): kobject_uevent_env [ 315.621427][T10502] kobject: 'bond_slave_0' (0000000059e730cf): fill_kobj_path: path = '/devices/virtual/net/bond_slave_0' [ 315.632716][T10502] kobject: 'queues' (00000000c79e3736): kobject_add_internal: parent: 'bond_slave_0', set: '' [ 315.643492][T10502] kobject: 'queues' (00000000c79e3736): kobject_uevent_env [ 315.650664][T10502] kobject: 'queues' (00000000c79e3736): kobject_uevent_env: filter function caused the event to drop! [ 315.661610][T10502] kobject: 'rx-0' (0000000066f23650): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.671704][T10502] kobject: 'rx-0' (0000000066f23650): kobject_uevent_env [ 315.678763][T10502] kobject: 'rx-0' (0000000066f23650): fill_kobj_path: path = '/devices/virtual/net/bond_slave_0/queues/rx-0' [ 315.690529][T10502] kobject: 'tx-0' (0000000003efc332): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.700765][T10502] kobject: 'tx-0' (0000000003efc332): kobject_uevent_env [ 315.707834][T10502] kobject: 'tx-0' (0000000003efc332): fill_kobj_path: path = '/devices/virtual/net/bond_slave_0/queues/tx-0' [ 315.719946][T10502] kobject: 'batman_adv' (00000000cba3a436): kobject_add_internal: parent: 'bond_slave_0', set: '' [ 315.731296][ T273] kobject: 'bond0' (0000000054ae7783): kobject_cleanup, parent 0000000014180cb1 [ 315.731620][T10502] kobject: 'veth1_to_bond' (00000000b5ca2a07): kobject_add_internal: parent: 'net', set: 'devices' [ 315.743663][ T273] kobject: 'bond0' (0000000054ae7783): calling ktype release [ 315.751618][T10502] kobject: 'veth1_to_bond' (00000000b5ca2a07): kobject_uevent_env [ 315.761112][ T273] kobject: 'bond0': free name [ 315.766211][T10502] kobject: 'veth1_to_bond' (00000000b5ca2a07): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bond' [ 315.782246][T10502] kobject: 'queues' (00000000443e23d0): kobject_add_internal: parent: 'veth1_to_bond', set: '' [ 315.793137][T10502] kobject: 'queues' (00000000443e23d0): kobject_uevent_env [ 315.800526][T10502] kobject: 'queues' (00000000443e23d0): kobject_uevent_env: filter function caused the event to drop! [ 315.811500][T10502] kobject: 'rx-0' (00000000289d9817): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.821620][T10502] kobject: 'rx-0' (00000000289d9817): kobject_uevent_env [ 315.828685][T10502] kobject: 'rx-0' (00000000289d9817): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bond/queues/rx-0' [ 315.840378][T10502] kobject: 'tx-0' (0000000052a634ab): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.850580][T10502] kobject: 'tx-0' (0000000052a634ab): kobject_uevent_env [ 315.857640][T10502] kobject: 'tx-0' (0000000052a634ab): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bond/queues/tx-0' [ 315.869844][T10502] kobject: 'batman_adv' (00000000ae359ba7): kobject_add_internal: parent: 'veth1_to_bond', set: '' [ 315.881341][T10502] kobject: 'bond_slave_1' (000000005646ef3e): kobject_add_internal: parent: 'net', set: 'devices' [ 315.892398][T10502] kobject: 'bond_slave_1' (000000005646ef3e): kobject_uevent_env [ 315.900127][T10502] kobject: 'bond_slave_1' (000000005646ef3e): fill_kobj_path: path = '/devices/virtual/net/bond_slave_1' [ 315.911620][T10502] kobject: 'queues' (000000001773a361): kobject_add_internal: parent: 'bond_slave_1', set: '' [ 315.922544][T10502] kobject: 'queues' (000000001773a361): kobject_uevent_env [ 315.929747][T10502] kobject: 'queues' (000000001773a361): kobject_uevent_env: filter function caused the event to drop! [ 315.940715][T10502] kobject: 'rx-0' (00000000ebbe0798): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.950907][T10502] kobject: 'rx-0' (00000000ebbe0798): kobject_uevent_env [ 315.957958][T10502] kobject: 'rx-0' (00000000ebbe0798): fill_kobj_path: path = '/devices/virtual/net/bond_slave_1/queues/rx-0' [ 315.969816][T10502] kobject: 'tx-0' (0000000074898a03): kobject_add_internal: parent: 'queues', set: 'queues' [ 315.980000][T10502] kobject: 'tx-0' (0000000074898a03): kobject_uevent_env [ 315.987053][T10502] kobject: 'tx-0' (0000000074898a03): fill_kobj_path: path = '/devices/virtual/net/bond_slave_1/queues/tx-0' [ 315.999171][T10502] kobject: 'batman_adv' (000000006a8f2f36): kobject_add_internal: parent: 'bond_slave_1', set: '' [ 316.011610][T10502] kobject: 'bonding_slave' (000000004cf08d2d): kobject_add_internal: parent: 'bond_slave_0', set: '' [ 316.023573][T10502] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 316.033886][T10502] kobject: 'bonding_slave' (000000002a698e87): kobject_add_internal: parent: 'bond_slave_1', set: '' [ 316.045490][T10502] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 316.054929][T10502] kobject: 'veth0_to_team' (00000000581729e5): kobject_add_internal: parent: 'net', set: 'devices' [ 316.066004][T10502] kobject: 'veth0_to_team' (00000000581729e5): kobject_uevent_env [ 316.073849][T10502] kobject: 'veth0_to_team' (00000000581729e5): fill_kobj_path: path = '/devices/virtual/net/veth0_to_team' [ 316.085289][T10502] kobject: 'queues' (00000000afe1acd0): kobject_add_internal: parent: 'veth0_to_team', set: '' [ 316.096159][T10502] kobject: 'queues' (00000000afe1acd0): kobject_uevent_env [ 316.103478][T10502] kobject: 'queues' (00000000afe1acd0): kobject_uevent_env: filter function caused the event to drop! [ 316.114439][T10502] kobject: 'rx-0' (00000000ace2d599): kobject_add_internal: parent: 'queues', set: 'queues' [ 316.124642][T10502] kobject: 'rx-0' (00000000ace2d599): kobject_uevent_env [ 316.131670][T10502] kobject: 'rx-0' (00000000ace2d599): fill_kobj_path: path = '/devices/virtual/net/veth0_to_team/queues/rx-0' [ 316.143766][T10502] kobject: 'tx-0' (0000000097eb9102): kobject_add_internal: parent: 'queues', set: 'queues' [ 316.154006][T10502] kobject: 'tx-0' (0000000097eb9102): kobject_uevent_env [ 316.161072][T10502] kobject: 'tx-0' (0000000097eb9102): fill_kobj_path: path = '/devices/virtual/net/veth0_to_team/queues/tx-0' [ 316.173404][T10502] kobject: 'batman_adv' (00000000bb180d7f): kobject_add_internal: parent: 'veth0_to_team', set: '' [ 316.185468][T10502] kobject: 'team_slave_0' (00000000bcf53ec6): kobject_add_internal: parent: 'net', set: 'devices' [ 316.196516][T10502] kobject: 'team_slave_0' (00000000bcf53ec6): kobject_uevent_env [ 316.204444][T10502] kobject: 'team_slave_0' (00000000bcf53ec6): fill_kobj_path: path = '/devices/virtual/net/team_slave_0' [ 316.215754][T10502] kobject: 'queues' (000000003b2f6e08): kobject_add_internal: parent: 'team_slave_0', set: '' [ 316.226684][T10502] kobject: 'queues' (000000003b2f6e08): kobject_uevent_env [ 316.233887][T10502] kobject: 'queues' (000000003b2f6e08): kobject_uevent_env: filter function caused the event to drop! [ 316.244992][T10502] kobject: 'rx-0' (00000000e755b9f7): kobject_add_internal: parent: 'queues', set: 'queues' [ 316.255711][T10502] kobject: 'rx-0' (00000000e755b9f7): kobject_uevent_env [ 316.262730][T10502] kobject: 'rx-0' (00000000e755b9f7): fill_kobj_path: path = '/devices/virtual/net/team_slave_0/queues/rx-0' [ 316.274407][T10502] kobject: 'tx-0' (0000000009454b6c): kobject_add_internal: parent: 'queues', set: 'queues' [ 316.284847][T10502] kobject: 'tx-0' (0000000009454b6c): kobject_uevent_env [ 316.291862][T10502] kobject: 'tx-0' (0000000009454b6c): fill_kobj_path: path = '/devices/virtual/net/team_slave_0/queues/tx-0' [ 316.304014][T10502] kobject: 'batman_adv' (00000000b1af45b1): kobject_add_internal: parent: 'team_slave_0', set: '' [ 316.315476][ T273] kobject: 'vcan0' (00000000c156c2c4): kobject_cleanup, parent 0000000014180cb1 [ 316.315869][T10502] kobject: 'veth1_to_team' (000000006fafc78e): kobject_add_internal: parent: 'net', set: 'devices' [ 316.326861][ T273] kobject: 'vcan0' (00000000c156c2c4): calling ktype release [ 316.335762][T10502] kobject: 'veth1_to_team' (000000006fafc78e): kobject_uevent_env [ 316.342994][ T273] kobject: 'vcan0': free name [ 316.350397][T10502] kobject: 'veth1_to_team' (000000006fafc78e): fill_kobj_path: path = '/devices/virtual/net/veth1_to_team' [ 316.366654][T10502] kobject: 'queues' (000000001d65c368): kobject_add_internal: parent: 'veth1_to_team', set: '' [ 316.377562][T10502] kobject: 'queues' (000000001d65c368): kobject_uevent_env [ 316.384791][T10502] kobject: 'queues' (000000001d65c368): kobject_uevent_env: filter function caused the event to drop! [ 316.395743][T10502] kobject: 'rx-0' (0000000003401874): kobject_add_internal: parent: 'queues', set: 'queues' [ 316.405850][T10502] kobject: 'rx-0' (0000000003401874): kobject_uevent_env [ 316.412875][T10502] kobject: 'rx-0' (0000000003401874): fill_kobj_path: path = '/devices/virtual/net/veth1_to_team/queues/rx-0' [ 316.424612][T10502] kobject: 'tx-0' (00000000dbf5a16f): kobject_add_internal: parent: 'queues', set: 'queues' [ 316.434802][T10502] kobject: 'tx-0' (00000000dbf5a16f): kobject_uevent_env [ 316.441817][T10502] kobject: 'tx-0' (00000000dbf5a16f): fill_kobj_path: path = '/devices/virtual/net/veth1_to_team/queues/tx-0' [ 316.455032][T10502] kobject: 'batman_adv' (00000000215cbfe2): kobject_add_internal: parent: 'veth1_to_team', set: '' [ 316.466600][T10502] kobject: 'team_slave_1' (00000000c28462a8): kobject_add_internal: parent: 'net', set: 'devices' [ 316.477736][T10502] kobject: 'team_slave_1' (00000000c28462a8): kobject_uevent_env [ 316.485512][T10502] kobject: 'team_slave_1' (00000000c28462a8): fill_kobj_path: path = '/devices/virtual/net/team_slave_1' [ 316.496849][T10502] kobject: 'queues' (00000000588cc8f9): kobject_add_internal: parent: 'team_slave_1', set: '' [ 316.507639][T10502] kobject: 'queues' (00000000588cc8f9): kobject_uevent_env [ 316.514846][T10502] kobject: 'queues' (00000000588cc8f9): kobject_uevent_env: filter function caused the event to drop! [ 316.525851][T10502] kobject: 'rx-0' (0000000023a83f2f): kobject_add_internal: parent: 'queues', set: 'queues' [ 316.535969][T10502] kobject: 'rx-0' (0000000023a83f2f): kobject_uevent_env [ 316.542982][T10502] kobject: 'rx-0' (0000000023a83f2f): fill_kobj_path: path = '/devices/virtual/net/team_slave_1/queues/rx-0' [ 316.554690][T10502] kobject: 'tx-0' (00000000a2f97160): kobject_add_internal: parent: 'queues', set: 'queues' [ 316.564908][T10502] kobject: 'tx-0' (00000000a2f97160): kobject_uevent_env [ 316.571930][T10502] kobject: 'tx-0' (00000000a2f97160): fill_kobj_path: path = '/devices/virtual/net/team_slave_1/queues/tx-0' [ 316.584391][T10502] kobject: 'batman_adv' (00000000f414d9d1): kobject_add_internal: parent: 'team_slave_1', set: '' [ 316.596826][T10502] team0: Port device team_slave_0 added [ 316.603294][T10502] team0: Port device team_slave_1 added [ 316.609898][T10502] kobject: 'veth0_to_hsr' (000000006af6d7b6): kobject_add_internal: parent: 'net', set: 'devices' [ 316.620935][T10502] kobject: 'veth0_to_hsr' (000000006af6d7b6): kobject_uevent_env [ 316.628675][T10502] kobject: 'veth0_to_hsr' (000000006af6d7b6): fill_kobj_path: path = '/devices/virtual/net/veth0_to_hsr' [ 316.639953][T10502] kobject: 'queues' (0000000049ea43f6): kobject_add_internal: parent: 'veth0_to_hsr', set: '' [ 316.650735][T10502] kobject: 'queues' (0000000049ea43f6): kobject_uevent_env [ 316.657934][T10502] kobject: 'queues' (0000000049ea43f6): kobject_uevent_env: filter function caused the event to drop! [ 316.668881][T10502] kobject: 'rx-0' (000000006a8839d5): kobject_add_internal: parent: 'queues', set: 'queues' [ 316.678984][T10502] kobject: 'rx-0' (000000006a8839d5): kobject_uevent_env [ 316.686038][T10502] kobject: 'rx-0' (000000006a8839d5): fill_kobj_path: path = '/devices/virtual/net/veth0_to_hsr/queues/rx-0' [ 316.697913][T10502] kobject: 'tx-0' (000000001f00a3d0): kobject_add_internal: parent: 'queues', set: 'queues' [ 316.708126][T10502] kobject: 'tx-0' (000000001f00a3d0): kobject_uevent_env [ 316.715192][T10502] kobject: 'tx-0' (000000001f00a3d0): fill_kobj_path: path = '/devices/virtual/net/veth0_to_hsr/queues/tx-0' [ 316.727311][T10502] kobject: 'batman_adv' (00000000a3c85a62): kobject_add_internal: parent: 'veth0_to_hsr', set: '' [ 316.738781][T10502] kobject: 'hsr_slave_0' (00000000bfe65307): kobject_add_internal: parent: 'net', set: 'devices' [ 316.749764][T10502] kobject: 'hsr_slave_0' (00000000bfe65307): kobject_uevent_env [ 316.757421][T10502] kobject: 'hsr_slave_0' (00000000bfe65307): fill_kobj_path: path = '/devices/virtual/net/hsr_slave_0' [ 316.770078][T10502] kobject: 'queues' (00000000a3c64409): kobject_add_internal: parent: 'hsr_slave_0', set: '' [ 316.780810][T10502] kobject: 'queues' (00000000a3c64409): kobject_uevent_env [ 316.788082][T10502] kobject: 'queues' (00000000a3c64409): kobject_uevent_env: filter function caused the event to drop! [ 316.799246][T10502] kobject: 'rx-0' (000000004111d198): kobject_add_internal: parent: 'queues', set: 'queues' [ 316.809516][T10502] kobject: 'rx-0' (000000004111d198): kobject_uevent_env [ 316.816749][T10502] kobject: 'rx-0' (000000004111d198): fill_kobj_path: path = '/devices/virtual/net/hsr_slave_0/queues/rx-0' [ 316.828302][T10502] kobject: 'tx-0' (000000000a73ac25): kobject_add_internal: parent: 'queues', set: 'queues' [ 316.838594][T10502] kobject: 'tx-0' (000000000a73ac25): kobject_uevent_env [ 316.845658][T10502] kobject: 'tx-0' (000000000a73ac25): fill_kobj_path: path = '/devices/virtual/net/hsr_slave_0/queues/tx-0' [ 316.857684][T10502] kobject: 'batman_adv' (00000000fb634be0): kobject_add_internal: parent: 'hsr_slave_0', set: '' [ 316.868999][ T273] kobject: 'bridge0' (00000000c3bf575a): kobject_cleanup, parent 0000000014180cb1 [ 316.878375][ T273] kobject: 'bridge0' (00000000c3bf575a): calling ktype release [ 316.885950][ T273] kobject: 'bridge0': free name [ 316.891279][T10502] kobject: 'veth1_to_hsr' (00000000df6a7d2b): kobject_add_internal: parent: 'net', set: 'devices' [ 316.902302][T10502] kobject: 'veth1_to_hsr' (00000000df6a7d2b): kobject_uevent_env [ 316.910030][T10502] kobject: 'veth1_to_hsr' (00000000df6a7d2b): fill_kobj_path: path = '/devices/virtual/net/veth1_to_hsr' [ 316.921308][T10502] kobject: 'queues' (00000000f0bc879a): kobject_add_internal: parent: 'veth1_to_hsr', set: '' [ 316.932077][T10502] kobject: 'queues' (00000000f0bc879a): kobject_uevent_env [ 316.939420][T10502] kobject: 'queues' (00000000f0bc879a): kobject_uevent_env: filter function caused the event to drop! [ 316.950916][T10502] kobject: 'rx-0' (00000000fde3156f): kobject_add_internal: parent: 'queues', set: 'queues' [ 316.961232][T10502] kobject: 'rx-0' (00000000fde3156f): kobject_uevent_env [ 316.968482][T10502] kobject: 'rx-0' (00000000fde3156f): fill_kobj_path: path = '/devices/virtual/net/veth1_to_hsr/queues/rx-0' [ 316.980108][T10502] kobject: 'tx-0' (00000000901d2f2c): kobject_add_internal: parent: 'queues', set: 'queues' [ 316.990253][T10502] kobject: 'tx-0' (00000000901d2f2c): kobject_uevent_env [ 316.997303][T10502] kobject: 'tx-0' (00000000901d2f2c): fill_kobj_path: path = '/devices/virtual/net/veth1_to_hsr/queues/tx-0' [ 317.009668][T10502] kobject: 'batman_adv' (00000000445d19c5): kobject_add_internal: parent: 'veth1_to_hsr', set: '' [ 317.021186][T10502] kobject: 'hsr_slave_1' (000000008350d09d): kobject_add_internal: parent: 'net', set: 'devices' [ 317.032510][T10502] kobject: 'hsr_slave_1' (000000008350d09d): kobject_uevent_env [ 317.040185][T10502] kobject: 'hsr_slave_1' (000000008350d09d): fill_kobj_path: path = '/devices/virtual/net/hsr_slave_1' [ 317.051397][T10502] kobject: 'queues' (00000000ba378933): kobject_add_internal: parent: 'hsr_slave_1', set: '' [ 317.062478][T10502] kobject: 'queues' (00000000ba378933): kobject_uevent_env [ 317.069693][T10502] kobject: 'queues' (00000000ba378933): kobject_uevent_env: filter function caused the event to drop! [ 317.080626][T10502] kobject: 'rx-0' (00000000989ca280): kobject_add_internal: parent: 'queues', set: 'queues' [ 317.090770][T10502] kobject: 'rx-0' (00000000989ca280): kobject_uevent_env [ 317.098062][T10502] kobject: 'rx-0' (00000000989ca280): fill_kobj_path: path = '/devices/virtual/net/hsr_slave_1/queues/rx-0' [ 317.109718][T10502] kobject: 'tx-0' (000000005b06274d): kobject_add_internal: parent: 'queues', set: 'queues' [ 317.119858][T10502] kobject: 'tx-0' (000000005b06274d): kobject_uevent_env [ 317.126906][T10502] kobject: 'tx-0' (000000005b06274d): fill_kobj_path: path = '/devices/virtual/net/hsr_slave_1/queues/tx-0' [ 317.138967][T10502] kobject: 'batman_adv' (000000005f612ab4): kobject_add_internal: parent: 'hsr_slave_1', set: '' [ 317.173606][T10502] kobject: 'hsr0' (00000000859b06fd): kobject_add_internal: parent: 'net', set: 'devices' [ 317.183912][T10502] kobject: 'hsr0' (00000000859b06fd): kobject_uevent_env [ 317.191013][T10502] kobject: 'hsr0' (00000000859b06fd): fill_kobj_path: path = '/devices/virtual/net/hsr0' [ 317.200915][T10502] kobject: 'queues' (00000000f063d6f8): kobject_add_internal: parent: 'hsr0', set: '' [ 317.210992][T10502] kobject: 'queues' (00000000f063d6f8): kobject_uevent_env [ 317.218186][T10502] kobject: 'queues' (00000000f063d6f8): kobject_uevent_env: filter function caused the event to drop! [ 317.229300][T10502] kobject: 'rx-0' (00000000f7e06aa7): kobject_add_internal: parent: 'queues', set: 'queues' [ 317.239432][T10502] kobject: 'rx-0' (00000000f7e06aa7): kobject_uevent_env [ 317.246506][T10502] kobject: 'rx-0' (00000000f7e06aa7): fill_kobj_path: path = '/devices/virtual/net/hsr0/queues/rx-0' [ 317.257447][T10502] kobject: 'tx-0' (00000000beec0ffe): kobject_add_internal: parent: 'queues', set: 'queues' [ 317.267618][T10502] kobject: 'tx-0' (00000000beec0ffe): kobject_uevent_env [ 317.275255][T10502] kobject: 'tx-0' (00000000beec0ffe): fill_kobj_path: path = '/devices/virtual/net/hsr0/queues/tx-0' [ 317.286652][T10502] kobject: 'batman_adv' (000000003e9854e5): kobject_add_internal: parent: 'hsr0', set: '' [ 317.297211][T10502] device hsr_slave_0 entered promiscuous mode [ 317.343606][T10502] device hsr_slave_1 entered promiscuous mode [ 317.394115][ T273] kobject: 'lo' (0000000088b79fd4): kobject_cleanup, parent 0000000014180cb1 [ 317.402917][ T273] kobject: 'lo' (0000000088b79fd4): calling ktype release [ 317.412137][ T273] kobject: 'lo': free name [ 317.457634][T10502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 317.471466][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 317.480735][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 317.495055][T10502] 8021q: adding VLAN 0 to HW filter on device team0 [ 317.507532][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 317.517341][ T8882] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 317.528651][ T8882] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.535726][ T8882] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.555286][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 317.566194][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 317.574814][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 317.587060][ T8899] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.594136][ T8899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.602039][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 317.613743][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 317.622402][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 317.634105][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 317.650449][T10502] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 317.664405][T10502] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 317.679115][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 317.688193][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 317.698953][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 317.710731][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 317.721776][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 317.730634][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 317.748726][T10502] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 317.755747][T10502] kobject: 'vlan0' (000000005b670783): kobject_add_internal: parent: 'mesh', set: '' [ 317.766707][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 317.774551][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 317.782003][ T8899] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 317.838429][ T4085] kobject: 'loop3' (000000002d54e373): kobject_uevent_env [ 317.845668][ T4085] kobject: 'loop3' (000000002d54e373): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 318.033657][ T273] kobject: 'nfs_client' (00000000589dd9e2): kobject_uevent_env [ 318.042278][ T273] kobject: 'nfs_client' (00000000589dd9e2): fill_kobj_path: path = '/fs/nfs/net/nfs_client' [ 318.052479][ T273] kobject: 'nfs_client' (00000000589dd9e2): kobject_cleanup, parent 0000000014180cb1 [ 318.062253][ T273] kobject: 'nfs_client' (00000000589dd9e2): calling ktype release [ 318.070081][ T273] kobject: 'nfs_client': free name [ 318.413299][ T273] tipc: TX() has been purged, node left! [ 318.517799][ T273] kobject: 'rx-0' (0000000035ecaf77): kobject_cleanup, parent 000000007c73bc87 [ 318.526922][ T273] kobject: 'rx-0' (0000000035ecaf77): auto cleanup 'remove' event [ 318.534749][ T273] kobject: 'rx-0' (0000000035ecaf77): kobject_uevent_env [ 318.541758][ T273] kobject: 'rx-0' (0000000035ecaf77): kobject_uevent_env: uevent_suppress caused the event to drop! [ 318.552535][ T273] kobject: 'rx-0' (0000000035ecaf77): auto cleanup kobject_del [ 318.560415][ T273] kobject: 'rx-0' (0000000035ecaf77): calling ktype release [ 318.567757][ T273] kobject: 'rx-0': free name [ 318.572410][ T273] kobject: 'tx-0' (00000000395cb2d6): kobject_cleanup, parent 000000007c73bc87 [ 318.581974][ T273] kobject: 'tx-0' (00000000395cb2d6): auto cleanup 'remove' event [ 318.589944][ T273] kobject: 'tx-0' (00000000395cb2d6): kobject_uevent_env [ 318.597015][ T273] kobject: 'tx-0' (00000000395cb2d6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 318.608133][ T273] kobject: 'tx-0' (00000000395cb2d6): auto cleanup kobject_del [ 318.615770][ T273] kobject: 'tx-0' (00000000395cb2d6): calling ktype release [ 318.623075][ T273] kobject: 'tx-0': free name [ 318.627725][ T273] kobject: 'queues' (000000007c73bc87): kobject_cleanup, parent 0000000014180cb1 [ 318.636837][ T273] kobject: 'queues' (000000007c73bc87): calling ktype release [ 318.644329][ T273] kobject: 'queues' (000000007c73bc87): kset_release [ 318.650990][ T273] kobject: 'queues': free name [ 318.656146][ T273] kobject: 'ip6gre0' (00000000fcbae051): kobject_uevent_env [ 318.663826][ T273] kobject: 'ip6gre0' (00000000fcbae051): kobject_uevent_env: uevent_suppress caused the event to drop! [ 318.675833][ T273] kobject: 'batman_adv' (0000000075dada1b): kobject_uevent_env [ 318.683732][ T273] kobject: 'batman_adv' (0000000075dada1b): kobject_uevent_env: filter function caused the event to drop! [ 318.695087][ T273] kobject: 'batman_adv' (0000000075dada1b): kobject_cleanup, parent 0000000014180cb1 [ 318.704584][ T273] kobject: 'batman_adv' (0000000075dada1b): calling ktype release [ 318.712362][ T273] kobject: (0000000075dada1b): dynamic_kobj_release [ 318.718990][ T273] kobject: 'batman_adv': free name [ 318.724485][ T273] kobject: 'rx-0' (00000000db7be6fe): kobject_cleanup, parent 000000006f5f3b1d [ 318.733448][ T273] kobject: 'rx-0' (00000000db7be6fe): auto cleanup 'remove' event [ 318.741242][ T273] kobject: 'rx-0' (00000000db7be6fe): kobject_uevent_env [ 318.748328][ T273] kobject: 'rx-0' (00000000db7be6fe): kobject_uevent_env: uevent_suppress caused the event to drop! [ 318.759105][ T273] kobject: 'rx-0' (00000000db7be6fe): auto cleanup kobject_del [ 318.766721][ T273] kobject: 'rx-0' (00000000db7be6fe): calling ktype release [ 318.774226][ T273] kobject: 'rx-0': free name [ 318.778832][ T273] kobject: 'tx-0' (0000000029484d51): kobject_cleanup, parent 000000006f5f3b1d [ 318.787964][ T273] kobject: 'tx-0' (0000000029484d51): auto cleanup 'remove' event [ 318.795807][ T273] kobject: 'tx-0' (0000000029484d51): kobject_uevent_env [ 318.802820][ T273] kobject: 'tx-0' (0000000029484d51): kobject_uevent_env: uevent_suppress caused the event to drop! [ 318.813599][ T273] kobject: 'tx-0' (0000000029484d51): auto cleanup kobject_del [ 318.821170][ T273] kobject: 'tx-0' (0000000029484d51): calling ktype release [ 318.828457][ T273] kobject: 'tx-0': free name [ 318.833056][ T273] kobject: 'queues' (000000006f5f3b1d): kobject_cleanup, parent 0000000014180cb1 [ 318.842220][ T273] kobject: 'queues' (000000006f5f3b1d): calling ktype release [ 318.849898][ T273] kobject: 'queues' (000000006f5f3b1d): kset_release [ 318.856605][ T273] kobject: 'queues': free name [ 318.861660][ T273] kobject: 'ip6gretap0' (000000001069a2e6): kobject_uevent_env [ 318.869291][ T273] kobject: 'ip6gretap0' (000000001069a2e6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 319.093293][ T273] kobject: 'ip6gre0' (00000000fcbae051): kobject_cleanup, parent 0000000014180cb1 [ 319.102499][ T273] kobject: 'ip6gre0' (00000000fcbae051): calling ktype release [ 319.110817][ T273] kobject: 'ip6gre0': free name