[ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Started OpenBSD Secure Shell server. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.38' (ECDSA) to the list of known hosts. 2020/05/24 00:22:34 fuzzer started 2020/05/24 00:22:34 dialing manager at 10.128.0.26:38661 2020/05/24 00:22:34 syscalls: 3055 2020/05/24 00:22:34 code coverage: enabled 2020/05/24 00:22:34 comparison tracing: enabled 2020/05/24 00:22:34 extra coverage: enabled 2020/05/24 00:22:34 setuid sandbox: enabled 2020/05/24 00:22:34 namespace sandbox: enabled 2020/05/24 00:22:34 Android sandbox: /sys/fs/selinux/policy does not exist 2020/05/24 00:22:34 fault injection: enabled 2020/05/24 00:22:34 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/05/24 00:22:34 net packet injection: enabled 2020/05/24 00:22:34 net device setup: enabled 2020/05/24 00:22:34 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/05/24 00:22:34 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/05/24 00:22:34 USB emulation: enabled 00:24:42 executing program 0: syzkaller login: [ 185.264487][ T6901] IPVS: ftp: loaded support on port[0] = 21 00:24:43 executing program 1: [ 185.408489][ T6901] chnl_net:caif_netlink_parms(): no params data found [ 185.506639][ T6901] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.514292][ T6901] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.524602][ T6901] device bridge_slave_0 entered promiscuous mode [ 185.535214][ T6901] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.544706][ T6901] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.553590][ T6901] device bridge_slave_1 entered promiscuous mode [ 185.584159][ T6901] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.598908][ T6901] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.653029][ T6901] team0: Port device team_slave_0 added [ 185.656355][ T7039] IPVS: ftp: loaded support on port[0] = 21 [ 185.670484][ T6901] team0: Port device team_slave_1 added [ 185.713092][ T6901] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 185.735914][ T6901] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.767534][ T6901] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 185.796201][ T6901] batman_adv: batadv0: Adding interface: batadv_slave_1 00:24:43 executing program 2: [ 185.803164][ T6901] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 185.831663][ T6901] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 185.932422][ T6901] device hsr_slave_0 entered promiscuous mode [ 186.017465][ T6901] device hsr_slave_1 entered promiscuous mode 00:24:43 executing program 3: [ 186.110145][ T7089] IPVS: ftp: loaded support on port[0] = 21 [ 186.252604][ T7039] chnl_net:caif_netlink_parms(): no params data found [ 186.398085][ T7206] IPVS: ftp: loaded support on port[0] = 21 00:24:44 executing program 4: [ 186.610666][ T7039] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.623423][ T7039] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.633516][ T7039] device bridge_slave_0 entered promiscuous mode [ 186.647739][ T6901] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 186.722583][ T7039] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.731831][ T7039] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.741479][ T7039] device bridge_slave_1 entered promiscuous mode [ 186.755964][ T6901] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 186.820992][ T6901] netdevsim netdevsim0 netdevsim2: renamed from eth2 00:24:44 executing program 5: [ 186.884682][ T6901] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 186.970894][ T7089] chnl_net:caif_netlink_parms(): no params data found [ 186.994887][ T7359] IPVS: ftp: loaded support on port[0] = 21 [ 187.018713][ T7039] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.047587][ T7039] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.171292][ T7206] chnl_net:caif_netlink_parms(): no params data found [ 187.210125][ T7381] IPVS: ftp: loaded support on port[0] = 21 [ 187.244133][ T7039] team0: Port device team_slave_0 added [ 187.254085][ T7039] team0: Port device team_slave_1 added [ 187.350433][ T7089] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.359577][ T7089] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.371517][ T7089] device bridge_slave_0 entered promiscuous mode [ 187.382664][ T7089] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.391135][ T7089] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.399993][ T7089] device bridge_slave_1 entered promiscuous mode [ 187.410828][ T7206] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.419725][ T7206] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.429005][ T7206] device bridge_slave_0 entered promiscuous mode [ 187.437188][ T7039] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 187.444132][ T7039] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 187.470671][ T7039] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 187.501174][ T7206] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.510716][ T7206] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.520395][ T7206] device bridge_slave_1 entered promiscuous mode [ 187.575323][ T7039] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 187.583648][ T7039] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 187.612897][ T7039] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 187.632141][ T7089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.659372][ T7206] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.703864][ T7089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.717221][ T7206] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.818992][ T7039] device hsr_slave_0 entered promiscuous mode [ 187.868550][ T7039] device hsr_slave_1 entered promiscuous mode [ 187.906024][ T7039] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 187.913938][ T7039] Cannot create hsr debugfs directory [ 187.923182][ T7359] chnl_net:caif_netlink_parms(): no params data found [ 187.968331][ T7089] team0: Port device team_slave_0 added [ 187.993578][ T7206] team0: Port device team_slave_0 added [ 188.034936][ T7089] team0: Port device team_slave_1 added [ 188.051960][ T7206] team0: Port device team_slave_1 added [ 188.139783][ T6901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 188.153828][ T7089] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 188.162112][ T7089] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.193538][ T7089] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 188.205545][ T7206] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 188.216535][ T7206] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.244862][ T7206] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 188.294401][ T7089] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 188.303198][ T7089] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.332876][ T7089] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 188.351497][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 188.360052][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.370822][ T7206] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 188.378802][ T7206] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.405380][ T7206] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 188.417005][ T7359] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.424071][ T7359] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.432492][ T7359] device bridge_slave_0 entered promiscuous mode [ 188.441899][ T6901] 8021q: adding VLAN 0 to HW filter on device team0 [ 188.460305][ T7381] chnl_net:caif_netlink_parms(): no params data found [ 188.471713][ T7359] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.480304][ T7359] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.491703][ T7359] device bridge_slave_1 entered promiscuous mode [ 188.598350][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.612850][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.622328][ T2928] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.629604][ T2928] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.679700][ T7089] device hsr_slave_0 entered promiscuous mode [ 188.736527][ T7089] device hsr_slave_1 entered promiscuous mode [ 188.775976][ T7089] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 188.783589][ T7089] Cannot create hsr debugfs directory [ 188.792383][ T7359] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.868166][ T7206] device hsr_slave_0 entered promiscuous mode [ 188.917465][ T7206] device hsr_slave_1 entered promiscuous mode [ 188.956086][ T7206] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 188.963703][ T7206] Cannot create hsr debugfs directory [ 188.970457][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.979875][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.988844][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.998171][ T2927] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.005226][ T2927] bridge0: port 2(bridge_slave_1) entered forwarding state [ 189.024550][ T7359] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.073943][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 189.130088][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 189.139902][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 189.149601][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.199404][ T7039] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 189.239275][ T7039] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 189.289117][ T7039] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 189.358373][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.381277][ T7359] team0: Port device team_slave_0 added [ 189.397544][ T7359] team0: Port device team_slave_1 added [ 189.413645][ T7039] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 189.506606][ T7381] bridge0: port 1(bridge_slave_0) entered blocking state [ 189.513705][ T7381] bridge0: port 1(bridge_slave_0) entered disabled state [ 189.527181][ T7381] device bridge_slave_0 entered promiscuous mode [ 189.536714][ T7381] bridge0: port 2(bridge_slave_1) entered blocking state [ 189.543767][ T7381] bridge0: port 2(bridge_slave_1) entered disabled state [ 189.553059][ T7381] device bridge_slave_1 entered promiscuous mode [ 189.597336][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.607763][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.623241][ T6901] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 189.638684][ T6901] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 189.659204][ T7359] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 189.667105][ T7359] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 189.694721][ T7359] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 189.712072][ T7359] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 189.719812][ T7359] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 189.749867][ T7359] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 189.778287][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 189.786971][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.797390][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.805692][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.814851][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.827544][ T7381] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 189.840809][ T7381] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.990118][ T7359] device hsr_slave_0 entered promiscuous mode [ 190.048834][ T7359] device hsr_slave_1 entered promiscuous mode [ 190.085847][ T7359] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 190.093421][ T7359] Cannot create hsr debugfs directory [ 190.137612][ T7381] team0: Port device team_slave_0 added [ 190.146690][ T7381] team0: Port device team_slave_1 added [ 190.154104][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.162368][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.206043][ T6901] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.239971][ T7381] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 190.247797][ T7381] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 190.276562][ T7381] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 190.315401][ T7381] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 190.324556][ T7381] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 190.352070][ T7381] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 190.366751][ T7089] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 190.420503][ T7089] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 190.485051][ T7089] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 190.542669][ T7089] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 190.635861][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 190.644587][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 190.665550][ T7206] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 190.821567][ T7381] device hsr_slave_0 entered promiscuous mode [ 190.876211][ T7381] device hsr_slave_1 entered promiscuous mode [ 190.935907][ T7381] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 190.943640][ T7381] Cannot create hsr debugfs directory [ 190.966053][ T7206] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 191.020847][ T7206] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 191.107713][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 191.124199][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.146287][ T7206] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 191.208608][ T6901] device veth0_vlan entered promiscuous mode [ 191.233305][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.242092][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.321465][ T6901] device veth1_vlan entered promiscuous mode [ 191.351969][ T7359] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 191.433403][ T7359] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 191.487918][ T7039] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.503961][ T7089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.522488][ T7359] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 191.580830][ T7359] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 191.629830][ T6901] device veth0_macvtap entered promiscuous mode [ 191.661206][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 191.670646][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 191.690981][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 191.701107][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 191.710145][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.718802][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.732685][ T6901] device veth1_macvtap entered promiscuous mode [ 191.752361][ T7039] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.765501][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 191.775519][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 191.789551][ T7089] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.820698][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.830711][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.841401][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.852667][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.863363][ T3504] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.870474][ T3504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.881891][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.890716][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.902715][ T3504] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.909835][ T3504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.925282][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.933951][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.955574][ T7206] 8021q: adding VLAN 0 to HW filter on device bond0 [ 191.980637][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.991669][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.002082][ T3503] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.009196][ T3503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.020511][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.029519][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.038046][ T3503] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.045173][ T3503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.084363][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.106944][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.115424][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.125000][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.135170][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.143410][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.161383][ T7381] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 192.233634][ T7381] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 192.293300][ T6901] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 192.303915][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.315072][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.323350][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.332546][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.341296][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.350103][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.359106][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 192.368256][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 192.379009][ T7206] 8021q: adding VLAN 0 to HW filter on device team0 [ 192.386507][ T7381] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 192.458832][ T6901] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 192.479567][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.488279][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.498288][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 192.507855][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 192.518339][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 192.527227][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.535962][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.544334][ T2926] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.551442][ T2926] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.560448][ T7381] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 192.600882][ T7039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.629090][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.637795][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 192.648062][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 192.660021][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.669736][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.678490][ T2927] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.685530][ T2927] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.693213][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.701950][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.710566][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 192.719498][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.729916][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.771427][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 192.786488][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 192.793906][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 192.829255][ T7089] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 192.844279][ T7089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.025455][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.034498][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 00:24:50 executing program 0: 00:24:50 executing program 0: [ 193.066799][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.142193][ T7039] 8021q: adding VLAN 0 to HW filter on device batadv0 00:24:50 executing program 0: [ 193.182335][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.207473][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.217597][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.234987][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 00:24:51 executing program 0: [ 193.287021][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.304852][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.322655][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 00:24:51 executing program 0: [ 193.339041][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.357977][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 00:24:51 executing program 0: [ 193.410406][ T7206] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.457557][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 193.465026][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 00:24:51 executing program 0: [ 193.512205][ T7089] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.547633][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 193.558581][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.592252][ T7359] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.638209][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 193.647749][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 193.655442][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 193.666504][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.675385][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 193.684495][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.719409][ T7039] device veth0_vlan entered promiscuous mode [ 193.745021][ T7359] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.764207][ T7039] device veth1_vlan entered promiscuous mode [ 193.795740][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.803471][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.812723][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 193.821166][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.829283][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.858233][ T7206] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.879112][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 193.888534][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 193.897869][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.906567][ T3504] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.913631][ T3504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.925523][ T7381] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.946897][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 193.954802][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 193.964138][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.973083][ T3502] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.980288][ T3502] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.989258][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.008391][ T7089] device veth0_vlan entered promiscuous mode [ 194.022838][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 194.033307][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 194.041850][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.051745][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.082353][ T7381] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.099358][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 194.107875][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 194.115624][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 194.126741][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 194.138803][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.147472][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.157783][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.174523][ T7039] device veth0_macvtap entered promiscuous mode [ 194.186372][ T7089] device veth1_vlan entered promiscuous mode [ 194.212745][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.221989][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 194.231373][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 194.240491][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.249923][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.258866][ T3504] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.265988][ T3504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.273557][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.282519][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.291046][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.299855][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.308435][ T3504] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.315484][ T3504] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.323472][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.332126][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.340847][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 194.349139][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.359757][ T7039] device veth1_macvtap entered promiscuous mode [ 194.371316][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 194.380728][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.389986][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 194.399234][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 194.410394][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 194.422133][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 194.433925][ T7359] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 194.445532][ T7359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.482482][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.496159][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.509190][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.518582][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.531304][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.540785][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.553948][ T3502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.577374][ T7206] device veth0_vlan entered promiscuous mode [ 194.594143][ T7039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 194.609492][ T7039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.621380][ T7039] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 194.633461][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.642323][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 194.650428][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 194.658581][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.667444][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.677841][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 194.686673][ T3503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 194.703561][ T7359] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.720111][ T7039] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.734050][ T7039] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.747552][ T7039] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 194.764646][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.782211][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.793054][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 194.802681][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 194.819205][ T7381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.830065][ T7206] device veth1_vlan entered promiscuous mode [ 194.919313][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 194.927939][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 194.937315][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 194.946859][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 194.959149][ T7089] device veth0_macvtap entered promiscuous mode [ 195.034318][ T7089] device veth1_macvtap entered promiscuous mode [ 195.050104][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 195.059189][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 195.069186][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 195.077098][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 195.091501][ T7381] 8021q: adding VLAN 0 to HW filter on device batadv0 00:24:52 executing program 1: [ 195.178315][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 195.198115][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 195.216503][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 195.225358][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 195.265201][ T7089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 195.286155][ T7089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.305709][ T7089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 195.323471][ T7089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.354920][ T7089] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 195.366735][ T7206] device veth0_macvtap entered promiscuous mode [ 195.383514][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 195.393966][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 195.404304][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 195.435529][ T7206] device veth1_macvtap entered promiscuous mode [ 195.472813][ T7089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 195.484897][ T7089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.495517][ T7089] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 195.508898][ T7089] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.520855][ T7089] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 195.545922][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 195.556455][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 195.580813][ T7206] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 195.593953][ T7206] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.605041][ T7206] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 195.617927][ T7206] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.628397][ T7206] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 195.638946][ T7206] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.652460][ T7206] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 195.665342][ T7206] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 195.675932][ T7206] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.688107][ T7206] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 195.698711][ T7206] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.708878][ T7206] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 195.719870][ T7206] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.732386][ T7206] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 195.750580][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 195.760725][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 195.773451][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 195.782014][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 195.791356][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 195.800495][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 195.810998][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 195.819210][ T3504] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 195.830412][ T7359] device veth0_vlan entered promiscuous mode [ 195.858362][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 195.867753][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 196.037730][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 196.052630][ T2926] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 196.061129][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 196.070478][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 196.080725][ T7359] device veth1_vlan entered promiscuous mode [ 196.090894][ T7381] device veth0_vlan entered promiscuous mode [ 196.257290][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 196.265461][ T2927] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 00:24:54 executing program 2: [ 196.372837][ T7381] device veth1_vlan entered promiscuous mode 00:24:54 executing program 3: [ 196.463250][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 196.478533][ T3501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 196.524445][ T7359] device veth0_macvtap entered promiscuous mode [ 196.562825][ T7359] device veth1_macvtap entered promiscuous mode [ 196.594378][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 196.610319][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 196.619939][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 196.629000][ T2928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 196.660877][ T7381] device veth0_macvtap entered promiscuous mode [ 196.710376][ T7381] device veth1_macvtap entered promiscuous mode [ 196.732765][ T7359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 196.755149][ T7359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 196.765505][ T7359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 196.777660][ T7359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 196.787913][ T7359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 196.799730][ T7359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 196.810656][ T7359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 196.821161][ T7359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 196.832862][ T7359] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 196.846617][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 196.854662][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 196.863872][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 196.873376][ T2924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 196.896365][ T7359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 196.907621][ T7359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 196.917795][ T7359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 196.929243][ T7359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 196.939174][ T7359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 196.950275][ T7359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 196.960428][ T7359] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 196.979533][ T7359] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 196.991732][ T7359] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 197.004486][ T7381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 197.016109][ T7381] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.026454][ T7381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 197.036976][ T7381] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.047302][ T7381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 197.058939][ T7381] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.069003][ T7381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 197.079855][ T7381] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.089967][ T7381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 197.100495][ T7381] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.112751][ T7381] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 197.121842][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 197.131611][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 197.140600][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 197.149705][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 197.170016][ T7381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 197.182628][ T7381] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.193890][ T7381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 197.204426][ T7381] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.215106][ T7381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 197.226894][ T7381] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.236793][ T7381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 197.247280][ T7381] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.257410][ T7381] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 197.267927][ T7381] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 197.280944][ T7381] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 197.300734][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 197.309418][ T2925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 00:24:55 executing program 4: 00:24:55 executing program 5: 00:24:55 executing program 0: 00:24:55 executing program 1: 00:24:55 executing program 2: 00:24:55 executing program 3: 00:24:55 executing program 0: 00:24:55 executing program 2: 00:24:55 executing program 1: 00:24:55 executing program 3: 00:24:55 executing program 4: 00:24:55 executing program 5: 00:24:55 executing program 0: 00:24:55 executing program 2: 00:24:55 executing program 3: 00:24:55 executing program 1: 00:24:55 executing program 5: 00:24:55 executing program 4: 00:24:55 executing program 2: 00:24:55 executing program 0: 00:24:55 executing program 3: 00:24:56 executing program 5: 00:24:56 executing program 1: 00:24:56 executing program 4: 00:24:56 executing program 2: 00:24:56 executing program 3: 00:24:56 executing program 0: 00:24:56 executing program 5: 00:24:56 executing program 4: 00:24:56 executing program 1: 00:24:56 executing program 3: 00:24:56 executing program 5: 00:24:56 executing program 2: 00:24:56 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000000)) 00:24:56 executing program 4: mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}]}) 00:24:56 executing program 1: 00:24:56 executing program 3: 00:24:56 executing program 2: 00:24:56 executing program 5: [ 198.639094][ T8241] overlayfs: option "workdir=./file1" is useless in a non-upper mount, ignore 00:24:56 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4, 0x7}, {0x0, [0x0, 0x0, 0x0, 0x10, 0x61], 0x2}}, &(0x7f00000003c0)=""/225, 0x1f, 0xe1, 0x8}, 0x20) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) 00:24:56 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) rmdir(&(0x7f0000000300)='./bus/file0\x00') ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, 0x0) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f0000000340)) socketpair$unix(0x1, 0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) [ 198.687580][ T8241] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 00:24:56 executing program 5: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x400812fa, &(0x7f0000000200)={0x10001b}) 00:24:56 executing program 3: clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9f5301001800000000000000000000c6"], &(0x7f00000003c0)=""/225, 0x1f, 0xe1, 0x8}, 0x20) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x315, 0x800000) 00:24:56 executing program 2: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x6612, 0x0) [ 198.738428][ T8241] overlayfs: option "workdir=./file1" is useless in a non-upper mount, ignore [ 198.767291][ T8241] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 198.819783][ C0] hrtimer: interrupt took 55886 ns [ 198.832276][ T8248] BPF:Unsupported section found [ 198.840394][ T8247] overlayfs: overlapping upperdir path 00:24:56 executing program 4: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x801012f0, 0x0) 00:24:56 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000300)='./bus/file0\x00') openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) 00:24:56 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000500)) [ 198.911493][ T8258] BPF:Invalid magic [ 198.924498][ T8262] BPF:Invalid magic [ 198.951267][ T8254] overlayfs: overlapping upperdir path 00:24:56 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x900) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') r0 = openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f00000002c0)={0x3, 0x1, 0x16, 0x18, 0x9, &(0x7f00000003c0)}) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0xa6, 0x2, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:24:56 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x900) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') r0 = openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f00000002c0)={0x3, 0x0, 0x0, 0x18, 0x0, &(0x7f00000003c0)}) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0xa6, 0x0, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:24:56 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x801012f0, &(0x7f0000000200)={0x10001b}) 00:24:56 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74"], 0x66) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000240)={'L+', 0x3f}, 0x16, 0x0) close(r1) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 00:24:56 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x900) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) rmdir(&(0x7f0000000300)='./bus/file0\x00') openat$ptmx(0xffffff9c, 0x0, 0x24800, 0x0) ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f00000002c0)={0x3, 0x0, 0x16, 0x18, 0x0, &(0x7f00000003c0)}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000007c0)={0x4, 0x0, 0xa6, 0x2, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) [ 199.102986][ T8270] overlayfs: overlapping upperdir path [ 199.168195][ T8275] overlayfs: overlapping upperdir path [ 199.182241][ T8274] overlayfs: overlapping upperdir path 00:24:57 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x12fb, 0x0) [ 199.322081][ T8270] overlayfs: overlapping upperdir path [ 199.342311][ T8274] overlayfs: overlapping upperdir path 00:24:57 executing program 1: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x801012ee, 0x0) 00:24:57 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000300)='./bus/file0\x00') openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) [ 199.423049][ T8286] ptrace attach of "/root/syz-executor.1"[8282] was attempted by "/root/syz-executor.1"[8286] [ 199.438599][ T8287] overlayfs: overlapping upperdir path 00:24:57 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/207, 0xcf}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 00:24:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c0000001400210200000100000000000a000000", @ANYRES32, @ANYBLOB="140002000000000000000010"], 0x2c}}, 0x0) 00:24:57 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@in={0x2, 0x0, @initdev}, &(0x7f0000000080)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) pipe(&(0x7f0000000200)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) 00:24:57 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0xa6, 0x2, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) [ 199.540727][ T8287] overlayfs: overlapping upperdir path 00:24:57 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x900) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') r1 = openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) ioctl$KDFONTOP_COPY(r1, 0x4b72, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000340)) socketpair$unix(0x1, 0x2, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TCSETSW(r2, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0xa6, 0x2, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) [ 199.703052][ T8307] overlayfs: overlapping upperdir path 00:24:57 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x900) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) rmdir(&(0x7f0000000300)='./bus/file0\x00') ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000007c0)={0x4, 0x0, 0xa6, 0x0, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:24:57 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f00000002c0)={0x3, 0x1, 0x16, 0x18, 0x0, 0x0}) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f0000000340)) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) [ 199.776902][ T8313] overlayfs: overlapping upperdir path [ 199.897708][ T8319] overlayfs: overlapping upperdir path [ 199.929005][ T8320] overlayfs: overlapping upperdir path [ 199.931944][ T8313] overlayfs: overlapping upperdir path 00:24:57 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x900) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') r1 = openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f00000002c0)={0x3, 0x1, 0x16, 0x18, 0x0, &(0x7f00000003c0)}) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0xa6, 0x2, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:24:57 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) r1 = creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) sendfile(r1, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x8000fffffffe) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x12fb, 0x0) [ 200.041427][ T8320] overlayfs: overlapping upperdir path [ 200.049120][ T8325] overlayfs: overlapping upperdir path [ 200.052870][ T8319] overlayfs: overlapping upperdir path 00:24:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x208200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 200.117740][ T8326] overlayfs: overlapping upperdir path 00:24:57 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x4000c014}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 00:24:58 executing program 5: creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000580)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x10000}) [ 200.263291][ T8334] overlayfs: overlapping upperdir path 00:24:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x10, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@in={0x2, 0x0, @initdev}, &(0x7f0000000080)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) ftruncate(r2, 0x8200) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x68) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d900f) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), 0x0) 00:24:58 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000002cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/207, 0xcf}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 200.409901][ T8334] overlayfs: overlapping upperdir path [ 200.511769][ T28] audit: type=1804 audit(1590279898.279:2): pid=8348 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir144557177/syzkaller.w5F3xK/12/bus" dev="sda1" ino=15788 res=1 [ 200.549176][ T8353] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 200.676537][ T28] audit: type=1804 audit(1590279898.289:3): pid=8354 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir144557177/syzkaller.w5F3xK/12/bus" dev="sda1" ino=15788 res=1 [ 200.796745][ T28] audit: type=1800 audit(1590279898.349:4): pid=8308 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=15799 res=0 [ 200.830628][ T28] audit: type=1800 audit(1590279898.349:5): pid=8346 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=15799 res=0 00:24:58 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2a0, 0x0, 0x7}, {0x0, [0x0, 0x0, 0x0, 0x10, 0x61], 0x2}}, &(0x7f00000003c0)=""/225, 0x1f, 0xe1, 0x8}, 0x20) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/arp\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) 00:24:58 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) syz_open_procfs(0x0, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f00000002c0)={0x3, 0x0, 0x16, 0x18, 0x0, &(0x7f00000003c0)}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0x0, 0x0, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:24:58 executing program 3: creat(&(0x7f0000000040)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000580)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0xc020660b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x10000}) 00:24:58 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1c62356a8aa133b0529799d9f8f0a5376eda6ecf5d7c01faccbe10c"], 0x66) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', 0x0, &(0x7f0000000240)={'L+', 0x3f}, 0x16, 0x0) close(r1) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) epoll_create1(0x0) fanotify_mark(0xffffffffffffffff, 0x1d, 0x38, 0xffffffffffffffff, 0x0) 00:24:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)={0x1, "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"}) [ 201.001478][ T8373] ptrace attach of "/root/syz-executor.4"[8370] was attempted by "/root/syz-executor.4"[8373] [ 201.018317][ T8368] overlayfs: overlapping upperdir path [ 201.038740][ T28] audit: type=1804 audit(1590279898.819:6): pid=8372 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir958622702/syzkaller.foX3bU/13/bus" dev="sda1" ino=15820 res=1 [ 201.043225][ T8375] BPF:Section overlap found 00:24:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000200)={0x10201, 0x0, &(0x7f0000039000/0x2000)=nil}) [ 201.095081][ T8380] BPF:Section overlap found [ 201.107510][ T8381] overlayfs: overlapping upperdir path 00:24:58 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)={0xff, "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"}) 00:24:59 executing program 5: pipe(0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1c62356a8aa133b0529799d9f8f0a5376eda6ecf5d7c01faccbe10cc4978b002995350329f1"], 0x66) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x3f}, 0x16, 0x0) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x0, 0xffffffc1}]}, 0x14, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x40084) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) prctl$PR_GET_SECCOMP(0x15) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = epoll_create1(0x0) r3 = fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)={0x268, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x4}}, @NL80211_ATTR_PROBE_RESP={0x236, 0x91, "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"}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x6}]}, 0x268}, 0x1, 0x0, 0x0, 0x8004}, 0x40) fanotify_mark(0xffffffffffffffff, 0x1d, 0x38, r3, 0x0) [ 201.175038][ T28] audit: type=1804 audit(1590279898.869:7): pid=8377 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir958622702/syzkaller.foX3bU/13/bus" dev="sda1" ino=15820 res=1 00:24:59 executing program 4: mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 00:24:59 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x900) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000300)='./bus/file0\x00') r1 = openat$ptmx(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KDFONTOP_COPY(r1, 0x4b72, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000340)) socketpair$unix(0x1, 0x2, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0x0, 0x0, 0x0, "b2729dba233715923de0d22914ffdb0d750cd7"}) [ 201.351672][ T28] audit: type=1800 audit(1590279898.989:8): pid=8370 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=15796 res=0 [ 201.481771][ T8405] overlayfs: overlapping upperdir path [ 201.494415][ T28] audit: type=1800 audit(1590279899.259:9): pid=8357 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=15787 res=0 [ 201.544356][ T8406] ptrace attach of "/root/syz-executor.5"[8403] was attempted by "/root/syz-executor.5"[8406] [ 201.582389][ T28] audit: type=1800 audit(1590279899.259:10): pid=8398 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=15787 res=0 00:24:59 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x900) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f00000002c0)={0x3, 0x0, 0x16, 0x18, 0x0, &(0x7f00000003c0)}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000007c0)={0x0, 0x40, 0xa6, 0x0, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:24:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)={0xff, "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"}) 00:24:59 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x900) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0x0, 0x2, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:24:59 executing program 5: pipe(0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1c62356a8aa133b0529799d9f8f0a5376eda6ecf5d7c01faccbe10cc4978b002995350329f1"], 0x66) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x3f}, 0x16, 0x0) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x0, 0xffffffc1}]}, 0x14, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x40084) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) prctl$PR_GET_SECCOMP(0x15) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = epoll_create1(0x0) r3 = fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)={0x268, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x4}}, @NL80211_ATTR_PROBE_RESP={0x236, 0x91, "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"}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x6}]}, 0x268}, 0x1, 0x0, 0x0, 0x8004}, 0x40) fanotify_mark(0xffffffffffffffff, 0x1d, 0x38, r3, 0x0) 00:24:59 executing program 3: pipe(0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2321202e2f66696c653020f014d336b04b030400000000000092290a7e4555a763c15ceda085e276ed3ae7a290ab0e74467713328b5e4577124d1a2e21da765cd1c62356a8aa133b0529799d9f8f0a5376eda6ecf5d7c01faccbe10cc4978b002995350329f1"], 0x66) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x3f}, 0x16, 0x0) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x0, 0xffffffc1}]}, 0x14, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) prctl$PR_GET_SECCOMP(0x15) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = epoll_create1(0x0) r3 = fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)={0x268, 0x0, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0xfffffff9}, @NL80211_ATTR_WDEV={0xc}, @NL80211_ATTR_PROBE_RESP={0x236, 0x91, "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"}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x6}]}, 0x268}, 0x1, 0x0, 0x0, 0x8004}, 0x40) fanotify_mark(0xffffffffffffffff, 0x1d, 0x38, r3, 0x0) 00:24:59 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000300)='./bus/file0\x00') r1 = openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f00000002c0)={0x3, 0x1, 0x16, 0x0, 0x9, &(0x7f00000003c0)}) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') r2 = creat(0x0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0x0, 0x0, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) [ 201.814368][ T8421] overlayfs: overlapping upperdir path 00:24:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)={0xff, "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"}) [ 201.868225][ T8422] overlayfs: overlapping upperdir path 00:24:59 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x900) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') r0 = openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f00000002c0)={0x3, 0x1, 0x16, 0x18, 0x0, &(0x7f00000003c0)}) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0xa6, 0x2, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:24:59 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x83013, r0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) [ 201.957066][ T8427] ptrace attach of "/root/syz-executor.5"[8423] was attempted by "/root/syz-executor.5"[8427] [ 201.972709][ T8429] ptrace attach of "/root/syz-executor.3"[8424] was attempted by "/root/syz-executor.3"[8429] [ 202.013518][ T8431] overlayfs: overlapping upperdir path [ 202.054001][ T8421] overlayfs: overlapping upperdir path [ 202.068358][ T8430] overlayfs: overlapping upperdir path 00:24:59 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000300)='./bus/file0\x00') 00:24:59 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)={0xff, "f596ec085de281047d5e16eeb5b731ad67afc2c4436a639ac085f220c3a400fd04c41f73b6592fd727d66f988e1161191bd43bc7d31b5fb278207e64b5cc16d390866fb98f691552ffb7541eb70cd398ac70733416184743434d197e7161e6f4bba0398ba8ffec27aeaa412957316cad4666cc391f664ef7712b88fe985be7e27141a3edb98a54cfc87272abe59596c18fdd1e7131d25cb43532f91ab13ba8d94999237026dbf5a0aab11c919725c76fef8325e0b8723740969843bce4f61ffc650a8e09be0b0c1647c6689ac12ed97a343afebe3cf732690e5c883681550e0075b1a293747975e4ab0d86ee61abf7c176730d84612dffc02464ced3f10873f43f723841f0972fd72db440d029949513a97be611df47044f0b29baa505aeee9c937792d1370ee6388f5bbf158737f12c780de909b3b30d126a5603854026ed3de00d2cb6c6906036c97c3a1843cc04fe3c8b63e5e10265a8712388d9bf83e7a845d6975860aa6650e87b457be35e5b973be12f3ec900ef2cb81092d9346a3617cd8df38b867679471e35c466277e14cb1f15eaa7d4d760949e72bf1c020df887dac96fa76a0c3532efdb401332e96c414d9e6edb16f1d6a102fc6537af9a293b6edb4f09fb73f415c8915a03a8418811127f4c217abbba5e1c0f31b9aa20e02d7c1a9dceffdcbf554f2e7cdb98b9da274b09a14c21d47bf62a87c3d9a86e51e5"}) 00:24:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000000c0)) [ 202.177172][ T8444] overlayfs: overlapping upperdir path 00:25:00 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000300)='./bus/file0\x00') r1 = openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f00000002c0)={0x3, 0x1, 0x16, 0x0, 0x9, &(0x7f00000003c0)}) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') r2 = creat(0x0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0x0, 0x0, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:25:00 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}, 0x1, 0x0, 0x0, 0x4000c014}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 00:25:00 executing program 1: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000200)={0xff, "f596ec085de281047d5e16eeb5b731ad67afc2c4436a639ac085f220c3a400fd04c41f73b6592fd727d66f988e1161191bd43bc7d31b5fb278207e64b5cc16d390866fb98f691552ffb7541eb70cd398ac70733416184743434d197e7161e6f4bba0398ba8ffec27aeaa412957316cad4666cc391f664ef7712b88fe985be7e27141a3edb98a54cfc87272abe59596c18fdd1e7131d25cb43532f91ab13ba8d94999237026dbf5a0aab11c919725c76fef8325e0b8723740969843bce4f61ffc650a8e09be0b0c1647c6689ac12ed97a343afebe3cf732690e5c883681550e0075b1a293747975e4ab0d86ee61abf7c176730d84612dffc02464ced3f10873f43f723841f0972fd72db440d029949513a97be611df47044f0b29baa505aeee9c937792d1370ee6388f5bbf158737f12c780de909b3b30d126a5603854026ed3de00d2cb6c6906036c97c3a1843cc04fe3c8b63e5e10265a8712388d9bf83e7a845d6975860aa6650e87b457be35e5b973be12f3ec900ef2cb81092d9346a3617cd8df38b867679471e35c466277e14cb1f15eaa7d4d760949e72bf1c020df887dac96fa76a0c3532efdb401332e96c414d9e6edb16f1d6a102fc6537af9a293b6edb4f09fb73f415c8915a03a8418811127f4c217abbba5e1c0f31b9aa20e02d7c1a9dceffdcbf554f2e7cdb98b9da274b09a14c21d47bf62a87c3d9a86e51e5"}) [ 202.308664][ T8447] overlayfs: overlapping upperdir path 00:25:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x5605, 0x0) [ 202.379884][ T8452] overlayfs: overlapping upperdir path 00:25:00 executing program 1: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000200)={0xff, "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"}) [ 202.492002][ T8458] overlayfs: overlapping upperdir path [ 202.499609][ T8457] overlayfs: overlapping upperdir path 00:25:00 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000300)='./bus/file0\x00') r1 = openat$ptmx(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KDFONTOP_COPY(r1, 0x4b72, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000340)) socketpair$unix(0x1, 0x2, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, 0x0) 00:25:00 executing program 0: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x12fb, 0x0) 00:25:00 executing program 1: ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000200)={0xff, "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"}) 00:25:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="3c0000001000a70d000000000007000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012000c0001006d616376746170000400020008000500", @ANYRES32], 0x3c}}, 0x0) [ 202.809017][ T8477] overlayfs: overlapping upperdir path 00:25:00 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)={0xff, "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"}) 00:25:00 executing program 5: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x407012ef, &(0x7f0000000200)={0x10001b}) 00:25:00 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x900) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0xa6, 0x0, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:25:00 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x900) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000300)='./bus/file0\x00') r1 = openat$ptmx(0xffffff9c, 0x0, 0x0, 0x0) ioctl$KDFONTOP_COPY(r1, 0x4b72, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000340)) socketpair$unix(0x1, 0x2, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0x0, 0x0, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:25:01 executing program 3: r0 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x402812f6, &(0x7f0000000200)={0x10001b}) 00:25:01 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000300)='./bus/file0\x00') r1 = openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f00000002c0)={0x3, 0x1, 0x16, 0x0, 0x9, &(0x7f00000003c0)}) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') r2 = creat(0x0, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0x0, 0x0, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:25:01 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000200)={0xff, "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"}) 00:25:01 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') preadv(0xffffffffffffffff, 0x0, 0x0, 0x900) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') r1 = openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f00000002c0)={0x3, 0x1, 0x16, 0x18, 0x9, &(0x7f00000003c0)}) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000340)) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r2, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) ioctl$TCSETSW(r2, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0xa6, 0x2, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) [ 203.278433][ T8497] overlayfs: overlapping upperdir path [ 203.294106][ T8500] overlayfs: overlapping upperdir path [ 203.310161][ T8499] overlayfs: overlapping upperdir path 00:25:01 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000200)={0xff, "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"}) [ 203.372883][ T8502] overlayfs: overlapping upperdir path [ 203.387087][ T8508] overlayfs: overlapping upperdir path 00:25:01 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0xa6, 0x2, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:25:01 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000000)=@v3, 0x18, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') r0 = openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x24800, 0x0) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f00000002c0)={0x3, 0x0, 0x16, 0x18, 0x0, &(0x7f00000003c0)}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000007c0)={0x0, 0x40, 0xa6, 0x0, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:25:01 executing program 0: pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x3c}}, 0x0) 00:25:01 executing program 4: syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f0000000340)={[{@shortname_mixed='shortname=mixed'}], [{@subj_user={'subj_user', 0x3d, '^.ppp0\xaa\\)cpusetppp0security^&vboxnet1wlan1(selinuxbdev%nodevvmnet0\x00'}}]}) [ 203.563836][ T8511] overlayfs: overlapping upperdir path 00:25:01 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000200)={0xff, "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"}) [ 203.624111][ T8516] overlayfs: overlapping upperdir path 00:25:01 executing program 5: openat$nvram(0xffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') [ 203.734514][ T8523] overlayfs: overlapping upperdir path 00:25:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, 0x0) [ 203.837297][ T8518] overlayfs: overlapping upperdir path [ 203.850241][ T8537] overlayfs: overlapping upperdir path 00:25:01 executing program 0: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(0x0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) close(r1) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x0, 0xffffffc1}]}, 0x14, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x40084) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x24}, 0x24}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)={0x280, r3, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_PROBE_RESP={0x25a, 0x91, "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"}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x6}]}, 0x280}, 0x1, 0x0, 0x0, 0x8004}, 0x40) fanotify_mark(0xffffffffffffffff, 0x1d, 0x38, r2, 0x0) 00:25:01 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x3}, 0x3c) syz_open_procfs(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x212, 0x10, &(0x7f0000000000), 0xfffffffffffffea8}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r1, 0x123, 0xe, 0x10, &(0x7f0000000000)="7c16eb8c75c193cc4d00ed1259e7", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 00:25:01 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x900) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') rmdir(&(0x7f0000000300)='./bus/file0\x00') r0 = openat$ptmx(0xffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f00000002c0)={0x3, 0x0, 0x16, 0x18, 0x9, 0x0}) syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, 0x0, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000007c0)={0x4, 0x40, 0xa6, 0x2, 0x5, "b2729dba233715923de0d22914ffdb0d750cd7"}) 00:25:01 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@index_on='index=on'}, {@nfs_export_on='nfs_export=on'}]}) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)='security.capability\x00', 0x0, 0x0, 0x0) rmdir(&(0x7f0000000300)='./bus/file0\x00') openat$ptmx(0xffffff9c, 0x0, 0x0, 0x0) 00:25:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) 00:25:01 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, 0x0) [ 204.087937][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 204.219342][ T8555] overlayfs: overlapping upperdir path 00:25:02 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d000000000000000008010000", @ANYRES32], 0x3}}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 00:25:02 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, 0x0) 00:25:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="645307000005b4aef836b2f91956b7df615de0e5f2ba2981063b00000000000000f68912a1739d5e3385bbec4985da8f549852559767d64a41db891c4fe247aa91", 0x41}], 0x4, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x28) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) [ 204.264113][ T8558] ptrace attach of "/root/syz-executor.0"[8549] was attempted by "/root/syz-executor.0"[8558] [ 204.283537][ T8556] overlayfs: overlapping upperdir path [ 204.292541][ T8555] overlayfs: overlapping upperdir path 00:25:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='timerslack_ns\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r0, 0x0, 0x400000006, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_elf64(r4, &(0x7f0000000140)=ANY=[@ANYRESOCT=r5], 0x17) [ 204.355359][ T8566] overlayfs: overlapping upperdir path 00:25:02 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @multicast2}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa8100000086dd60163dac01002b00fe8000000000000000000000000000aaff020000000000000000000000000001"], 0x3a) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x18100, 0x0) [ 204.413060][ T8570] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 00:25:02 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)={0x0, "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"}) [ 204.496672][ T8579] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. 00:25:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100}}, 0x0, 0xfffffffb, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) prctl$PR_SVE_SET_VL(0x32, 0x1b08a) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000100), &(0x7f0000000140)=0x8) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x10, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0xa) pwritev(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)="ada74d563ac8affe5c55", 0xa}, {&(0x7f0000000200)="3ea295c2338257183e9657a9bc2ced2cb26a77818173b07ab2ac3b6872ce2c79592bf06732f02dc7a929d7ba860e38d506acd73df479f4012bde6895cca2f5ffea07da93dd18173dbd9d307df2532e5fe6fe897daa475a991d6dfd9e2ce7f34a1574a430973abeeae57c7b87ae1a4943b2e1545f548f82a4125eeb4cdd80be2b60c5d3785c2ecb2b1612f27782c8aeb99e859b850711727416794ac1112bdefe5d07b647fb21f09f2423a695006deb5631f4324ebc44cb9bc7526ce7b7629c89ff8e4e970cb6f4d7620f84357f88f6ea", 0xd0}, {&(0x7f0000000300)="39c017518c9630257e65414e5dce535c2976f856e8e83f49a1322bd5df8e0adbc0d44f95e6d6648dbe1d33e8cea4e847d6e70fa3d4e11f412da2c9ecdca5327c9e58f8bb79376429df6ded6eeeb03053005e121d77a689ac7dbfbefbdc95c4470e4e", 0x62}], 0x3, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() keyctl$join(0x1, &(0x7f0000000080)={'syz', 0x0}) clone(0x68002100, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) lseek(r3, 0x0, 0x3) ioctl$NS_GET_PARENT(r3, 0xb702, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000001240)=ANY=[@ANYBLOB="aaaaaaaaaaaa02000400000008e900ff070006040001bbbbbbbbbbbb0a01019aca6fdaffffffffffffff"], 0x0) ptrace(0x10, r2) 00:25:02 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)={0x0, "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"}) 00:25:02 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)={0x0, "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"}) 00:25:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getrandom(&(0x7f0000000080)=""/32, 0x20, 0x3) [ 204.775367][ T8600] IPVS: ftp: loaded support on port[0] = 21 [ 204.882192][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:02 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) 00:25:02 executing program 1: r0 = open(&(0x7f00000000c0)='./file1\x00', 0x141042, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0xffffffff000) 00:25:02 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@multicast, @broadcast, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @broadcast}}}}}, 0x0) 00:25:02 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r2 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r2, &(0x7f0000000300), 0x20000938, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x28, &(0x7f0000000040)=0x240, 0x4) splice(r0, 0x0, r1, 0x0, 0x100000, 0x0) [ 205.108535][ T8604] IPVS: ftp: loaded support on port[0] = 21 [ 205.196042][ T235] tipc: TX() has been purged, node left! 00:25:05 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x101002) write(r0, 0x0, 0x0) 00:25:05 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f0000002200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001a00)=@generic={0x0, "02bc44220ac5a1aef5f4695ad0a8f84cf17bc14a509b992197c2f447df28eda7099b3713e3972b555d89f0c2cdeb4a4b6e5f63fe10b5c0ef908a4706e838a35ac382a892f8d47ced28c1d8f7ceb4f49feb0a1c38a8f5188b11b4df738611f9f92142a756417f864abecbf363bdd8aaa9b00b60e136caf8a40a01bd6ca4e6"}, 0x80, 0x0}}], 0x2, 0x0) 00:25:05 executing program 2: shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 00:25:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653070000053c27bc3376003639d805405cb4aed12f0000001500ae47a8bcd2ab4e271fe74005d4429fe75984c78c92a6747d4f86aeb65e96461b958a750600000000000000c2dcda42fdaf6f311d109ddc5b59de93bdb91e033abfe3d015", 0x5f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x29) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 207.487667][ T8689] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:25:05 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000540)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb86dd6012040100302c00fe80000000000000000000cfff0000aaff02"], 0x0) 00:25:05 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r0, &(0x7f0000002200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001a00)=@generic={0xf, "02bc44220ac5a1aef5f4695ad0a8f84cf17bc14a509b992197c2f447df28eda7099b3713e3972b555d89f0c2cdeb4a4b6e5f63fe10b5c0ef908a4706e838a35ac382a892f8d47ced28c1d8f7ceb4f49feb0a1c38a8f5188b11b4df738611f9f92142a756417f864abecbf363bdd8aaa9b00b60e136caf8a40a01bd6ca4e6"}, 0x80, 0x0}}], 0x2, 0x0) 00:25:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0x208}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000001c80)=[{&(0x7f0000001780)="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", 0x1d8}, {&(0x7f0000000040)="12c71968000337b1b2f259279cf3cbae68b4a79f199aa96eeb040a55e0754425be97eaef95fe75f97589b483f78770fe88fd5875ae78d18112fe98", 0x3b}, {&(0x7f00000004c0)="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", 0x1c6}, {&(0x7f0000000300)="0ebbb218be8d3954e135df5f396071992eaf48c6be4575b2", 0x18}], 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xfff, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x5a8, 0x11, 0x0, 0x27) 00:25:05 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) lseek(r0, 0x4200, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, {"00db00"}}, 0x10a9) sendfile(r1, r1, &(0x7f00000000c0), 0x8080fffffffe) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000000980)={0x8, {"00db00"}}, 0x10a9) sendfile(r2, r2, &(0x7f00000000c0), 0x8080fffffffe) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffb) 00:25:05 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='sysfs\x00', 0x1, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0) [ 208.184714][ T8705] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:25:06 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_int(r0, 0x0, 0xc, 0x0, &(0x7f0000000000)) 00:25:06 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x4}, 0x6) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) io_setup(0x29, &(0x7f0000000240)=0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) io_submit(r3, 0x2, &(0x7f0000000480)=[&(0x7f0000000100)={0x0, 0x4, 0x0, 0x1, 0x0, r0, &(0x7f0000000000)="0200ff8efe47f8b46e", 0x9}, 0x0]) 00:25:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4, r4}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 00:25:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x32}}, 0x3d) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) r5 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r5, &(0x7f0000000300), 0x20000938, 0x0, 0x0) splice(r2, 0x0, r4, 0x0, 0x100000, 0x0) [ 208.392968][ T28] audit: type=1804 audit(1590279906.169:11): pid=8715 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir165731439/syzkaller.RdPiOl/20/bus" dev="sda1" ino=15879 res=1 [ 208.578576][ T8724] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 00:25:06 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008f80)=[{{0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='syscall\x00') preadv(r4, &(0x7f0000000500), 0x37d, 0x0) [ 208.670767][ T8724] IPv6: ADDRCONF(NETDEV_CHANGE): tunl0: link becomes ready [ 208.719684][ T8724] IPv6: ADDRCONF(NETDEV_CHANGE): gre0: link becomes ready [ 208.813437][ T8724] IPv6: ADDRCONF(NETDEV_CHANGE): gretap0: link becomes ready [ 208.895791][ T8724] IPv6: ADDRCONF(NETDEV_CHANGE): erspan0: link becomes ready [ 208.949818][ T8724] IPv6: ADDRCONF(NETDEV_CHANGE): ip_vti0: link becomes ready [ 209.009173][ T8724] IPv6: ADDRCONF(NETDEV_CHANGE): ip6_vti0: link becomes ready [ 209.037706][ T28] audit: type=1804 audit(1590279906.819:12): pid=8708 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir165731439/syzkaller.RdPiOl/20/bus" dev="sda1" ino=15879 res=1 00:25:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r1, &(0x7f0000005240)=[{{0x0, 0xe0ff, 0x0}}], 0x300, 0x401eb94) 00:25:08 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:25:08 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$int_in(r0, 0x4b66, &(0x7f0000000040)) 00:25:08 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="1b00000019001f", 0x7, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040), 0x10) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000013", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='\x00', 0x10a73, 0x800, 0x0, 0xffffffffffffff9a) 00:25:08 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000340)=""/142, 0x1000000, 0x8e, 0x8}, 0x20) 00:25:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x7b) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x2000000002001100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000000000), 0xd4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x2f) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 00:25:08 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) linkat(r1, &(0x7f00000001c0)='./file0\x00', r1, &(0x7f0000000080)='./file1\x00', 0x0) [ 210.534131][ T8766] netlink: 44224 bytes leftover after parsing attributes in process `syz-executor.2'. 00:25:08 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 00:25:08 executing program 1: syslog(0x3, &(0x7f00000003c0)=""/111, 0x6f) 00:25:08 executing program 3: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@broadcast, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback=0xac14140a}}}}}}, 0x0) [ 210.624869][ T8766] netlink: 44224 bytes leftover after parsing attributes in process `syz-executor.2'. 00:25:08 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) 00:25:08 executing program 2: prlimit64(0x0, 0x0, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008f80), 0x0, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:25:08 executing program 3: unshare(0x2a000400) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='cgroup2\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpu.stat\x00', 0x275a, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/168, 0xa8}], 0x1) 00:25:08 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000040)={@broadcast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "641110", 0x30, 0x3a, 0x0, @local, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2}}}}}}}, 0x0) 00:25:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0xf6) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000000a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4010) 00:25:08 executing program 0: msgrcv(0x0, 0x0, 0x106e, 0x3, 0x0) msgsnd(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="01"], 0xc6, 0x0) 00:25:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket(0x840000000002, 0x3, 0xff) connect$inet(r3, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r4, &(0x7f0000005240)=[{{0x0, 0xe0ff, 0x0}}], 0x300, 0x401eb94) 00:25:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000240)={@local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c300e2}) 00:25:09 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000080)="b7e0f7", 0x3}, {&(0x7f00000001c0)="9322d8b10c52a41207493f3648cd6ddf386b0108069a602211ed94bf7e9b85c88b0b2db6f7a573647f02c2752ffc8613a0f1a57534aa7f5584f3cf5666aa17d3091af1d5636cc122b4537769b0c7e2230ca0c70d5da37d0664f0c67cce84cbd8ac49c3", 0x63}, {&(0x7f0000000240)="526d6a4954b8ee495d4fa98461326530ffb719de3012358dfacebbb720c79cf09e6cd54affe038c447933820916e294b4a93b43c74199c4a965ebe6be17fa43609983444834b60a726dbe2fae2e6d66a73b49c6075e7cfb029519e22e4b94bd8fbb7f4e4fd0d7faab69069fb49452cedb1ebea38c0c3856e05f6b861a69a5f64689c11af856b51cbc1db516370c3529554f9feacf8262951b1717bf313a7a0a120d74a", 0xa3}, {&(0x7f0000000300)="0e69f5ab2b7f128afe59884ad35763a0e2ad5ffd52558216dd894c9b300960374e396a60a5923b558a229a691705424ffdeb0a09438f9635fa6c39391664569c98194c9711394898387f6731985208c66af0215372143def4e58ca7e5a22d0147d8a7e4c88e147a2a18d809d7f9494a9dd6d85e10741559c42d8caa05c502add6c74d7effff81665cdc56300b54a68c9085131df073368e39731c9e5055d73326af3b2e02e2efa2c2aca17f239cef69466054cc58e123acc82c00e839c1b7555c76e95b4625741d36f1a7d8398aa8eceff72c6ea3b03171f1e0a163d711b3429a7", 0xe1}, {&(0x7f00000004c0)="77f25e841d4fa48220ab1fabaae4a49627276b4e98bba646064b6610d976caac91419dc5afd2421c0cfed471982807167503befdf340709253ef7b4dad1b47ca063b4c8296fe5a90fa9bd24d5f51ebc521091ab3f2f0be28cd622122bfe40cb719892f060e911d453cce444dfa587ddfbaeaea54eadc926f7bd8885094d8d059be741d", 0x83}, {&(0x7f0000000640)="7adc6beee14eb003530957b5973f4714f1009f410ac3a6638025d3adb78a47c12d4e932ba791878448e109f1cd79d18ee717542cb31990ea743d7fcf41c68714382dd6cbd941b735cb5e29f2ddaacf7d38813c8d86e5ddc455f649ef449ffd82772761cd2dabe2c23c506c821eddc40e8653cd978ac7934705fe0bcc71406b689eca79e635d0733d", 0x88}], 0x6}}, {{0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000009c0)="8934a7a9209692a7c44ddc31a7aeb10716cf228e45fddcde12f47278c2424412b27eb21720aa7c4933c249eeb29cd214a3b9ee53e70af16e1ad25caa7bccfcba3de66ccd1f894412caa7617eaabe18db6b14fa11be1132569c8a2a428e34973be4eca0205443ebc8a0c85fc8063ac3b60eb61df6f23b0ba9bf5c6e58a2bc7554639c045888b03eb2cb5058fc0557e4c5b86035cca535bd6a26e791f678c736cf80cb64e39b354e677b8426e86f6f1bef", 0xb0}, {&(0x7f0000000ac0)="1fb265fca63035adb84e01db567e726cd228a340175dfdb6eff2efcfcc62908e0f203976bb27a334a152a806effee5ee5f02179bf6344a7dd2eee418e95734b6df290e5ba55e54016c1fe2a1a20bc4adb7157f316d211870ed8546b046f9e1f039a85bb6000767f486cd8bcae32de2f289431a92b1120d31c85c9e7da1db16fef6bae51f54dde3351a7bfebfd88af8f1ba1108bcb42a00819a77659b6ce36533adb9d0c563e543f2b6afc0e4c0e0b21c4530ee9d683cc8f5f5eeb68cbac559c9004141bea99fad89b2eb4e8799b645510b2c4806a54d451a75eb", 0xda}], 0x2}}], 0x2, 0x0) 00:25:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket(0xf, 0x0, 0x0) 00:25:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:09 executing program 4: r0 = socket(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000006500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000006780)) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0xffffffffffffff4a, &(0x7f0000000200)={&(0x7f0000000080)={0x18, 0x16, 0xa01, 0x0, 0x0, {0x0, 0x28}}, 0x78}}, 0x0) 00:25:09 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/ttyS3\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000900)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 00:25:09 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x33}, 0x0, @in=@broadcast}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 00:25:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:09 executing program 0: 00:25:09 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x0) 00:25:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={'bridge0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="0e0000000000000000dd"]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) 00:25:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 00:25:09 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000400)={0x15c}) 00:25:09 executing program 3: 00:25:09 executing program 4: 00:25:09 executing program 1: 00:25:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:09 executing program 0: 00:25:09 executing program 3: 00:25:09 executing program 2: 00:25:09 executing program 4: 00:25:09 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:10 executing program 1: 00:25:10 executing program 3: 00:25:10 executing program 0: 00:25:10 executing program 4: 00:25:10 executing program 2: 00:25:10 executing program 1: 00:25:10 executing program 3: 00:25:10 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:10 executing program 0: 00:25:10 executing program 4: 00:25:10 executing program 2: 00:25:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:10 executing program 1: 00:25:10 executing program 3: 00:25:10 executing program 2: 00:25:10 executing program 4: 00:25:10 executing program 0: 00:25:10 executing program 1: 00:25:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:10 executing program 3: 00:25:10 executing program 2: 00:25:10 executing program 0: 00:25:10 executing program 1: 00:25:10 executing program 4: 00:25:10 executing program 2: 00:25:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:10 executing program 3: 00:25:10 executing program 0: 00:25:10 executing program 1: 00:25:10 executing program 4: 00:25:10 executing program 2: 00:25:10 executing program 0: 00:25:10 executing program 3: 00:25:10 executing program 1: 00:25:10 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:10 executing program 4: 00:25:10 executing program 2: 00:25:11 executing program 3: 00:25:11 executing program 0: 00:25:11 executing program 4: 00:25:11 executing program 1: 00:25:11 executing program 2: 00:25:11 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:11 executing program 3: 00:25:11 executing program 0: 00:25:11 executing program 4: 00:25:11 executing program 1: 00:25:11 executing program 2: 00:25:11 executing program 3: 00:25:11 executing program 0: 00:25:11 executing program 4: 00:25:11 executing program 1: 00:25:11 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:11 executing program 2: 00:25:11 executing program 3: 00:25:11 executing program 0: 00:25:11 executing program 4: 00:25:11 executing program 1: 00:25:11 executing program 2: 00:25:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:11 executing program 3: 00:25:11 executing program 0: 00:25:11 executing program 4: 00:25:11 executing program 1: 00:25:11 executing program 2: 00:25:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:11 executing program 3: 00:25:11 executing program 0: 00:25:11 executing program 4: 00:25:11 executing program 1: 00:25:11 executing program 2: 00:25:11 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:11 executing program 3: 00:25:11 executing program 0: 00:25:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 00:25:12 executing program 4: 00:25:12 executing program 2: 00:25:12 executing program 1: 00:25:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 00:25:12 executing program 3: 00:25:12 executing program 0: 00:25:12 executing program 2: 00:25:12 executing program 4: 00:25:12 executing program 1: 00:25:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 00:25:12 executing program 0: 00:25:12 executing program 3: 00:25:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0xd8, 0x148, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 00:25:12 executing program 2: 00:25:12 executing program 4: 00:25:12 executing program 1: 00:25:12 executing program 0: 00:25:12 executing program 3: 00:25:12 executing program 1: 00:25:12 executing program 0: 00:25:12 executing program 4: 00:25:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0xd8, 0x148, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 00:25:12 executing program 2: 00:25:12 executing program 3: 00:25:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0xd8, 0x148, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 00:25:12 executing program 2: 00:25:12 executing program 1: 00:25:12 executing program 0: 00:25:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:12 executing program 4: 00:25:12 executing program 3: 00:25:12 executing program 1: 00:25:12 executing program 2: 00:25:12 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) [ 215.080460][ T9017] xt_hashlimit: overflow, try lower: 0/0 00:25:12 executing program 0: 00:25:12 executing program 4: 00:25:13 executing program 3: 00:25:13 executing program 1: 00:25:13 executing program 4: 00:25:13 executing program 2: [ 215.254194][ T9026] xt_hashlimit: overflow, try lower: 0/0 00:25:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:13 executing program 1: 00:25:13 executing program 0: 00:25:13 executing program 4: 00:25:13 executing program 3: 00:25:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:13 executing program 2: [ 215.417807][ T9037] xt_hashlimit: overflow, try lower: 0/0 00:25:13 executing program 1: 00:25:13 executing program 0: 00:25:13 executing program 3: 00:25:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:13 executing program 4: 00:25:13 executing program 2: 00:25:13 executing program 1: 00:25:13 executing program 0: 00:25:13 executing program 3: 00:25:13 executing program 4: 00:25:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:13 executing program 2: 00:25:13 executing program 1: 00:25:13 executing program 4: 00:25:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:13 executing program 0: 00:25:13 executing program 3: 00:25:13 executing program 2: 00:25:13 executing program 0: 00:25:13 executing program 4: 00:25:13 executing program 2: 00:25:13 executing program 1: 00:25:13 executing program 3: 00:25:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:13 executing program 4: 00:25:13 executing program 0: 00:25:13 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:13 executing program 2: 00:25:13 executing program 1: 00:25:14 executing program 4: 00:25:14 executing program 3: 00:25:14 executing program 0: 00:25:14 executing program 2: 00:25:14 executing program 1: 00:25:14 executing program 3: 00:25:14 executing program 4: 00:25:14 executing program 0: 00:25:14 executing program 1: 00:25:14 executing program 2: 00:25:14 executing program 4: 00:25:14 executing program 3: 00:25:14 executing program 1: 00:25:14 executing program 0: 00:25:14 executing program 3: 00:25:14 executing program 1: 00:25:14 executing program 2: 00:25:14 executing program 4: 00:25:14 executing program 3: 00:25:14 executing program 0: 00:25:14 executing program 1: 00:25:14 executing program 2: 00:25:14 executing program 4: 00:25:14 executing program 3: 00:25:14 executing program 1: 00:25:14 executing program 0: 00:25:14 executing program 2: 00:25:14 executing program 4: 00:25:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x330, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x100, 0x170, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x390) 00:25:14 executing program 1: 00:25:14 executing program 0: 00:25:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x330, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x100, 0x170, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x390) 00:25:14 executing program 3: 00:25:14 executing program 2: 00:25:14 executing program 4: 00:25:14 executing program 1: 00:25:14 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x330, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x100, 0x170, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x4, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x390) 00:25:14 executing program 0: 00:25:14 executing program 2: 00:25:14 executing program 3: 00:25:14 executing program 4: 00:25:15 executing program 1: 00:25:15 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:15 executing program 2: 00:25:15 executing program 0: 00:25:15 executing program 3: 00:25:15 executing program 4: 00:25:15 executing program 1: 00:25:15 executing program 2: [ 217.381589][ T9143] xt_CT: You must specify a L4 protocol and not use inversions on it 00:25:15 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:15 executing program 0: 00:25:15 executing program 4: 00:25:15 executing program 1: 00:25:15 executing program 3: 00:25:15 executing program 2: 00:25:15 executing program 0: [ 217.600296][ T9154] xt_CT: You must specify a L4 protocol and not use inversions on it 00:25:15 executing program 4: 00:25:15 executing program 1: 00:25:15 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x360, 0x0, 0xffffff80, 0x178, 0x0, 0xc7, 0x290, 0x258, 0x258, 0x290, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'lo\x00', 'netpci0\x00'}, 0x0, 0x130, 0x1a0, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'syzkaller1\x00', {0x0, 0x0, 0x4, 0x0, 0x0, 0x9, 0x401}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "42c2f7ce28ef401335ddf6fb395bf4a4d216cfa5e921b6e919ef8a0d6093c6bcee49d7b46af988d8931f15a247cd97ebe28f918333489d8bc10f975c5989ee00"}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c0) 00:25:15 executing program 3: 00:25:15 executing program 2: 00:25:15 executing program 3: 00:25:15 executing program 2: [ 217.773607][ T9165] xt_CT: You must specify a L4 protocol and not use inversions on it 00:25:15 executing program 0: 00:25:15 executing program 1: 00:25:15 executing program 4: 00:25:15 executing program 2: 00:25:15 executing program 1: 00:25:15 executing program 3: 00:25:15 executing program 0: 00:25:15 executing program 4: 00:25:15 executing program 2: 00:25:15 executing program 1: 00:25:15 executing program 0: 00:25:15 executing program 3: 00:25:15 executing program 4: 00:25:15 executing program 2 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)={0xff, "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"}) [ 218.247098][ T9184] FAULT_INJECTION: forcing a failure. [ 218.247098][ T9184] name failslab, interval 1, probability 0, space 0, times 1 [ 218.295964][ T9184] CPU: 0 PID: 9184 Comm: syz-executor.2 Not tainted 5.7.0-rc6-next-20200522-syzkaller #0 [ 218.305803][ T9184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.315863][ T9184] Call Trace: [ 218.319165][ T9184] dump_stack+0x18f/0x20d [ 218.323515][ T9184] should_fail.cold+0x5/0x14 [ 218.328117][ T9184] ? setup_fault_attr+0x1e0/0x1e0 [ 218.333160][ T9184] should_failslab+0x5/0xf [ 218.337583][ T9184] __kmalloc+0x2d9/0x7a0 [ 218.341831][ T9184] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 218.347812][ T9184] ? tomoyo_realpath_from_path+0xc2/0x620 [ 218.353539][ T9184] ? lock_release+0x800/0x800 [ 218.358308][ T9184] ? __lock_acquire+0xc6c/0x48a0 [ 218.363269][ T9184] tomoyo_realpath_from_path+0xc2/0x620 [ 218.368854][ T9184] ? tomoyo_profile+0x42/0x50 [ 218.373554][ T9184] tomoyo_path_number_perm+0x1c2/0x4d0 [ 218.379014][ T9184] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 218.384655][ T9184] ? tomoyo_execute_permission+0x470/0x470 [ 218.390477][ T9184] ? __fget_files+0x30d/0x500 [ 218.395178][ T9184] ? __fget_files+0x32f/0x500 [ 218.399858][ T9184] ? do_dup2+0x520/0x520 [ 218.404105][ T9184] ? __sb_end_write+0x101/0x1d0 [ 218.408970][ T9184] ? vfs_write+0x161/0x5d0 [ 218.413399][ T9184] security_file_ioctl+0x6c/0xb0 [ 218.418356][ T9184] ksys_ioctl+0x50/0x180 [ 218.422608][ T9184] __x64_sys_ioctl+0x6f/0xb0 [ 218.427229][ T9184] do_syscall_64+0xf6/0x7d0 [ 218.431743][ T9184] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 218.437635][ T9184] RIP: 0033:0x45ca29 [ 218.441532][ T9184] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 218.461138][ T9184] RSP: 002b:00007fdcb1dd0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 218.469556][ T9184] RAX: ffffffffffffffda RBX: 00000000004e7080 RCX: 000000000045ca29 [ 218.477560][ T9184] RDX: 0000000020000200 RSI: 0000000000004b49 RDI: 0000000000000003 [ 218.485538][ T9184] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 218.493508][ T9184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 218.501593][ T9184] R13: 0000000000000389 R14: 00000000004c61b8 R15: 00007fdcb1dd16d4 00:25:16 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) socket(0x6, 0x3, 0x1) getsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000002c0)={'\x00', 0x6}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000000)={0x3, 0x0, 0x0, &(0x7f0000000180)=""/256, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x0, r1}) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 00:25:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6c7381000002383835392d362c00"]) [ 218.538300][ T9184] ERROR: Out of memory at tomoyo_realpath_from_path. 00:25:16 executing program 2 (fault-call:1 fault-nth:1): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)={0xff, "f596ec085de281047d5e16eeb5b731ad67afc2c4436a639ac085f220c3a400fd04c41f73b6592fd727d66f988e1161191bd43bc7d31b5fb278207e64b5cc16d390866fb98f691552ffb7541eb70cd398ac70733416184743434d197e7161e6f4bba0398ba8ffec27aeaa412957316cad4666cc391f664ef7712b88fe985be7e27141a3edb98a54cfc87272abe59596c18fdd1e7131d25cb43532f91ab13ba8d94999237026dbf5a0aab11c919725c76fef8325e0b8723740969843bce4f61ffc650a8e09be0b0c1647c6689ac12ed97a343afebe3cf732690e5c883681550e0075b1a293747975e4ab0d86ee61abf7c176730d84612dffc02464ced3f10873f43f723841f0972fd72db440d029949513a97be611df47044f0b29baa505aeee9c937792d1370ee6388f5bbf158737f12c780de909b3b30d126a5603854026ed3de00d2cb6c6906036c97c3a1843cc04fe3c8b63e5e10265a8712388d9bf83e7a845d6975860aa6650e87b457be35e5b973be12f3ec900ef2cb81092d9346a3617cd8df38b867679471e35c466277e14cb1f15eaa7d4d760949e72bf1c020df887dac96fa76a0c3532efdb401332e96c414d9e6edb16f1d6a102fc6537af9a293b6edb4f09fb73f415c8915a03a8418811127f4c217abbba5e1c0f31b9aa20e02d7c1a9dceffdcbf554f2e7cdb98b9da274b09a14c21d47bf62a87c3d9a86e51e5"}) 00:25:16 executing program 5: 00:25:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000000000)=0x100000001, 0x4) finit_module(r1, &(0x7f0000000100)='ppp1vmnet0e:(em0\x00', 0x1) bind$inet(r1, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@sack_perm], 0x1) sendto$inet(0xffffffffffffffff, &(0x7f0000000200)="007afb11bbdb1c2e76189583dd8df8161e69f6a5608c2542535e5326f4464c716ff7257b08a131eda07be9f6fb17172e0b3d9250dc908888974ae71f1c4bdb87b9adcc3797d03dcd62e6dc2c701b7db2e2c7727edfaa117b5b82abc273dfa81a95ee7f03a65cb55a10d1e5f42729f65367fe5c8ee528be7e213b2d3d1fd5f36ace2448ccb7841edbe7e7cb62c06024a4424f382e80dc6a6fc27290618d1056be7317", 0xa2, 0x400c084, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x0, 0x9, 0x80ffffffff}, 0x14) shutdown(r1, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x14, &(0x7f0000000000)=0x100000001, 0x4) r3 = fcntl$dupfd(r2, 0x0, r0) fallocate(r3, 0x32, 0xd991, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000080)={0x10004, 0x0, &(0x7f0000000000/0x1000)=nil}) r4 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_STD(r4, 0x40085618, &(0x7f0000000040)=0x3000) 00:25:16 executing program 4: shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'netdevsim0\x00', 0x800}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x44001, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x1}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x9905) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/dev\x00') preadv(r2, &(0x7f0000000700)=[{&(0x7f0000000140)=""/188, 0xbc}], 0x1, 0xffffffd) r3 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[], 0x2}}, 0x0) sendmsg$NLBL_MGMT_C_ADDDEF(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20e000ddd7cb9b1a}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r3, 0x400, 0x0, 0x25dfdbfe, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x10}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x40880}, 0x8800) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x84003ff) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x101000, 0x1) getsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000300)=0x7f, &(0x7f0000000340)=0x4) [ 218.609517][ T9193] hfsplus: unable to parse mount options [ 218.710010][ T9208] FAULT_INJECTION: forcing a failure. [ 218.710010][ T9208] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 218.723251][ T9208] CPU: 1 PID: 9208 Comm: syz-executor.2 Not tainted 5.7.0-rc6-next-20200522-syzkaller #0 [ 218.733140][ T9208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.743206][ T9208] Call Trace: [ 218.746505][ T9208] dump_stack+0x18f/0x20d [ 218.750848][ T9208] should_fail.cold+0x5/0x14 [ 218.755450][ T9208] ? setup_fault_attr+0x1e0/0x1e0 [ 218.760480][ T9208] ? print_usage_bug+0x240/0x240 [ 218.765435][ T9208] __alloc_pages_nodemask+0x17a/0x810 [ 218.770815][ T9208] ? __alloc_pages_slowpath.constprop.0+0x2640/0x2640 [ 218.777599][ T9208] ? lockdep_hardirqs_on_prepare+0x590/0x590 [ 218.783615][ T9208] ? print_usage_bug+0x240/0x240 [ 218.788569][ T9208] cache_grow_begin+0x8c/0xc10 [ 218.793338][ T9208] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 218.798804][ T9208] __kmalloc+0x6dc/0x7a0 [ 218.803050][ T9208] ? tomoyo_realpath_from_path+0xc2/0x620 [ 218.808796][ T9208] ? lock_release+0x800/0x800 [ 218.813480][ T9208] ? __lock_acquire+0xc6c/0x48a0 [ 218.818432][ T9208] tomoyo_realpath_from_path+0xc2/0x620 [ 218.824009][ T9208] ? tomoyo_profile+0x42/0x50 [ 218.828699][ T9208] tomoyo_path_number_perm+0x1c2/0x4d0 [ 218.834157][ T9208] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 218.839795][ T9208] ? tomoyo_execute_permission+0x470/0x470 [ 218.845611][ T9208] ? __fget_files+0x30d/0x500 [ 218.850305][ T9208] ? __fget_files+0x32f/0x500 [ 218.854984][ T9208] ? do_dup2+0x520/0x520 [ 218.859222][ T9208] ? __sb_end_write+0x101/0x1d0 [ 218.864071][ T9208] ? vfs_write+0x161/0x5d0 [ 218.868492][ T9208] security_file_ioctl+0x6c/0xb0 [ 218.873435][ T9208] ksys_ioctl+0x50/0x180 [ 218.877680][ T9208] __x64_sys_ioctl+0x6f/0xb0 [ 218.882280][ T9208] do_syscall_64+0xf6/0x7d0 [ 218.886787][ T9208] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 218.892673][ T9208] RIP: 0033:0x45ca29 [ 218.896566][ T9208] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 218.916168][ T9208] RSP: 002b:00007fdcb1dd0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 218.924580][ T9208] RAX: ffffffffffffffda RBX: 00000000004e7080 RCX: 000000000045ca29 [ 218.932575][ T9208] RDX: 0000000020000200 RSI: 0000000000004b49 RDI: 0000000000000003 [ 218.940549][ T9208] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 218.948521][ T9208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 00:25:16 executing program 5: 00:25:16 executing program 0: [ 218.956492][ T9208] R13: 0000000000000389 R14: 00000000004c61b8 R15: 00007fdcb1dd16d4 [ 218.966024][ T28] audit: type=1804 audit(1590279916.490:13): pid=9207 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir165731439/syzkaller.RdPiOl/66/file0" dev="sda1" ino=15959 res=1 00:25:16 executing program 3: 00:25:16 executing program 5: 00:25:16 executing program 0: 00:25:17 executing program 3: 00:25:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) set_robust_list(&(0x7f00000000c0), 0x18) 00:25:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f0000003140)=[{{&(0x7f0000000100)=@nfc, 0x80, 0x0}}], 0x1, 0x0) 00:25:17 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000200)={0xff, "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"}) 00:25:17 executing program 5: ioperm(0x0, 0xb31, 0x1) 00:25:17 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000040)) 00:25:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioperm(0x0, 0x2, 0x0) 00:25:19 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x7f) 00:25:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syslog(0xa, 0x0, 0x0) 00:25:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getpriority(0x1, 0x0) 00:25:19 executing program 3: timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}, 0x0) 00:25:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x2, &(0x7f0000000200)={0xff, "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"}) [ 221.372407][ T28] audit: type=1804 audit(1590279919.150:14): pid=9211 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir165731439/syzkaller.RdPiOl/66/file0" dev="sda1" ino=15959 res=1 00:25:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsync(0xffffffffffffffff) 00:25:19 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x10038) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) 00:25:19 executing program 5: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r2, 0x0) fchown(r0, 0x0, 0x0) 00:25:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x10, &(0x7f0000000200)={0xff, "f596ec085de281047d5e16eeb5b731ad67afc2c4436a639ac085f220c3a400fd04c41f73b6592fd727d66f988e1161191bd43bc7d31b5fb278207e64b5cc16d390866fb98f691552ffb7541eb70cd398ac70733416184743434d197e7161e6f4bba0398ba8ffec27aeaa412957316cad4666cc391f664ef7712b88fe985be7e27141a3edb98a54cfc87272abe59596c18fdd1e7131d25cb43532f91ab13ba8d94999237026dbf5a0aab11c919725c76fef8325e0b8723740969843bce4f61ffc650a8e09be0b0c1647c6689ac12ed97a343afebe3cf732690e5c883681550e0075b1a293747975e4ab0d86ee61abf7c176730d84612dffc02464ced3f10873f43f723841f0972fd72db440d029949513a97be611df47044f0b29baa505aeee9c937792d1370ee6388f5bbf158737f12c780de909b3b30d126a5603854026ed3de00d2cb6c6906036c97c3a1843cc04fe3c8b63e5e10265a8712388d9bf83e7a845d6975860aa6650e87b457be35e5b973be12f3ec900ef2cb81092d9346a3617cd8df38b867679471e35c466277e14cb1f15eaa7d4d760949e72bf1c020df887dac96fa76a0c3532efdb401332e96c414d9e6edb16f1d6a102fc6537af9a293b6edb4f09fb73f415c8915a03a8418811127f4c217abbba5e1c0f31b9aa20e02d7c1a9dceffdcbf554f2e7cdb98b9da274b09a14c21d47bf62a87c3d9a86e51e5"}) 00:25:19 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r0, 0x0) 00:25:19 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x16001, 0x0) 00:25:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PDEATHSIG(0x1, 0x0) 00:25:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b2f, &(0x7f0000000200)={0xff, "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"}) 00:25:19 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) set_robust_list(&(0x7f0000000000), 0x18) 00:25:19 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_GET_THP_DISABLE(0x2a) 00:25:19 executing program 3: syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) 00:25:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b30, &(0x7f0000000200)={0xff, "f596ec085de281047d5e16eeb5b731ad67afc2c4436a639ac085f220c3a400fd04c41f73b6592fd727d66f988e1161191bd43bc7d31b5fb278207e64b5cc16d390866fb98f691552ffb7541eb70cd398ac70733416184743434d197e7161e6f4bba0398ba8ffec27aeaa412957316cad4666cc391f664ef7712b88fe985be7e27141a3edb98a54cfc87272abe59596c18fdd1e7131d25cb43532f91ab13ba8d94999237026dbf5a0aab11c919725c76fef8325e0b8723740969843bce4f61ffc650a8e09be0b0c1647c6689ac12ed97a343afebe3cf732690e5c883681550e0075b1a293747975e4ab0d86ee61abf7c176730d84612dffc02464ced3f10873f43f723841f0972fd72db440d029949513a97be611df47044f0b29baa505aeee9c937792d1370ee6388f5bbf158737f12c780de909b3b30d126a5603854026ed3de00d2cb6c6906036c97c3a1843cc04fe3c8b63e5e10265a8712388d9bf83e7a845d6975860aa6650e87b457be35e5b973be12f3ec900ef2cb81092d9346a3617cd8df38b867679471e35c466277e14cb1f15eaa7d4d760949e72bf1c020df887dac96fa76a0c3532efdb401332e96c414d9e6edb16f1d6a102fc6537af9a293b6edb4f09fb73f415c8915a03a8418811127f4c217abbba5e1c0f31b9aa20e02d7c1a9dceffdcbf554f2e7cdb98b9da274b09a14c21d47bf62a87c3d9a86e51e5"}) 00:25:19 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x8002}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x12400, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x0, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) io_submit(0x0, 0x1, &(0x7f00000006c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x1}]) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = socket$inet(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r4, 0x81e6c000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@multicast1, 0x4e20, 0x0, 0x4e20, 0x0, 0x0, 0x0, 0x0, 0x2c}, {0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x33, 0x0, 0x3, 0x1}, {0xffffffff, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x2, 0x80000000000001, 0x1, 0x0, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0xff}, 0x2, @in=@loopback, 0x100000, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0xff00) r6 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r6, 0x0, 0x0) 00:25:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{}]}) 00:25:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) 00:25:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b31, &(0x7f0000000200)={0xff, "f596ec085de281047d5e16eeb5b731ad67afc2c4436a639ac085f220c3a400fd04c41f73b6592fd727d66f988e1161191bd43bc7d31b5fb278207e64b5cc16d390866fb98f691552ffb7541eb70cd398ac70733416184743434d197e7161e6f4bba0398ba8ffec27aeaa412957316cad4666cc391f664ef7712b88fe985be7e27141a3edb98a54cfc87272abe59596c18fdd1e7131d25cb43532f91ab13ba8d94999237026dbf5a0aab11c919725c76fef8325e0b8723740969843bce4f61ffc650a8e09be0b0c1647c6689ac12ed97a343afebe3cf732690e5c883681550e0075b1a293747975e4ab0d86ee61abf7c176730d84612dffc02464ced3f10873f43f723841f0972fd72db440d029949513a97be611df47044f0b29baa505aeee9c937792d1370ee6388f5bbf158737f12c780de909b3b30d126a5603854026ed3de00d2cb6c6906036c97c3a1843cc04fe3c8b63e5e10265a8712388d9bf83e7a845d6975860aa6650e87b457be35e5b973be12f3ec900ef2cb81092d9346a3617cd8df38b867679471e35c466277e14cb1f15eaa7d4d760949e72bf1c020df887dac96fa76a0c3532efdb401332e96c414d9e6edb16f1d6a102fc6537af9a293b6edb4f09fb73f415c8915a03a8418811127f4c217abbba5e1c0f31b9aa20e02d7c1a9dceffdcbf554f2e7cdb98b9da274b09a14c21d47bf62a87c3d9a86e51e5"}) 00:25:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) time(0x0) 00:25:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b32, &(0x7f0000000200)={0xff, "f596ec085de281047d5e16eeb5b731ad67afc2c4436a639ac085f220c3a400fd04c41f73b6592fd727d66f988e1161191bd43bc7d31b5fb278207e64b5cc16d390866fb98f691552ffb7541eb70cd398ac70733416184743434d197e7161e6f4bba0398ba8ffec27aeaa412957316cad4666cc391f664ef7712b88fe985be7e27141a3edb98a54cfc87272abe59596c18fdd1e7131d25cb43532f91ab13ba8d94999237026dbf5a0aab11c919725c76fef8325e0b8723740969843bce4f61ffc650a8e09be0b0c1647c6689ac12ed97a343afebe3cf732690e5c883681550e0075b1a293747975e4ab0d86ee61abf7c176730d84612dffc02464ced3f10873f43f723841f0972fd72db440d029949513a97be611df47044f0b29baa505aeee9c937792d1370ee6388f5bbf158737f12c780de909b3b30d126a5603854026ed3de00d2cb6c6906036c97c3a1843cc04fe3c8b63e5e10265a8712388d9bf83e7a845d6975860aa6650e87b457be35e5b973be12f3ec900ef2cb81092d9346a3617cd8df38b867679471e35c466277e14cb1f15eaa7d4d760949e72bf1c020df887dac96fa76a0c3532efdb401332e96c414d9e6edb16f1d6a102fc6537af9a293b6edb4f09fb73f415c8915a03a8418811127f4c217abbba5e1c0f31b9aa20e02d7c1a9dceffdcbf554f2e7cdb98b9da274b09a14c21d47bf62a87c3d9a86e51e5"}) 00:25:19 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_int(r1, 0x0, 0x4, &(0x7f0000000080), 0x4) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000040)=0x9, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 00:25:19 executing program 1: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000580)={{0x0}}) msgsnd(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000010"], 0x2c, 0x800) 00:25:19 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000000)) [ 222.108423][ T9319] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:25:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f00000002c0)='./bus\x00', 0x0) listxattr(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 00:25:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b33, &(0x7f0000000200)={0xff, "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"}) 00:25:20 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = creat(&(0x7f00000002c0)='./file1\x00', 0x0) write$eventfd(r2, &(0x7f0000000080), 0xfffffe5e) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000640)=""/246) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0x4004743d, &(0x7f0000001080)=""/246) [ 222.256889][ T9330] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! 00:25:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) 00:25:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 00:25:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b34, &(0x7f0000000200)={0xff, "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"}) 00:25:20 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_int(r1, 0x0, 0x4, &(0x7f0000000080), 0x4) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000040)=0x9, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 00:25:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getitimer(0x3, 0x0) 00:25:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b35, &(0x7f0000000200)={0xff, "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"}) 00:25:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SETVAL(0x0, 0x0, 0x10, 0x0) 00:25:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@shortname_lower='shortname=lower'}]}) 00:25:20 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_int(r1, 0x0, 0x4, &(0x7f0000000080), 0x4) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000040)=0x9, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 00:25:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f0000000400)}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002640)=[{0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1, 0x0, 0x7c, 0x10}], 0x1, 0x24044010) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xf}, 0x0, 0x8000000000, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x4}, 0x0, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200036150, 0x800007b, 0x0, 0x0, 0x0, 0x6a4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREAD(r3, 0x0, 0x40) fchdir(0xffffffffffffffff) execveat(0xffffffffffffffff, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000380), 0x0, 0x400) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x810, 0xffffffffffffffff, 0x39ee3000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x1000002, &(0x7f000000a000)) 00:25:20 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b36, &(0x7f0000000200)={0xff, "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"}) [ 223.162580][ T9390] FAT-fs (loop4): bogus number of reserved sectors [ 223.169757][ T9390] FAT-fs (loop4): Can't find a valid FAT filesystem [ 223.230406][ T9390] FAT-fs (loop4): bogus number of reserved sectors [ 223.241649][ T9390] FAT-fs (loop4): Can't find a valid FAT filesystem 00:25:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_GET_DUMPABLE(0x3) 00:25:21 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_int(r1, 0x0, 0x4, &(0x7f0000000080), 0x4) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000040)=0x9, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 00:25:21 executing program 3: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0x12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) 00:25:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b37, &(0x7f0000000200)={0xff, "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"}) 00:25:21 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_matches\x00') readv(r0, &(0x7f0000002340)=[{&(0x7f00000001c0)=""/4096, 0x141b}], 0x1) 00:25:21 executing program 4: r0 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f0000000080)=0x8000000, 0x4) 00:25:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b3a, &(0x7f0000000200)={0xff, "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"}) 00:25:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) syslog(0x0, 0x0, 0x0) 00:25:21 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_int(r1, 0x0, 0x4, &(0x7f0000000080), 0x4) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 00:25:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@numtail='nonumtail=0'}]}) 00:25:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = getpid() getpriority(0x2, r1) 00:25:21 executing program 3: ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0x12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) 00:25:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b3b, &(0x7f0000000200)={0xff, "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"}) [ 223.680343][ T9429] FAT-fs (loop4): bogus number of reserved sectors 00:25:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semctl$SETVAL(0x0, 0x0, 0x10, &(0x7f0000000000)) [ 223.741182][ T9429] FAT-fs (loop4): Can't find a valid FAT filesystem 00:25:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b3c, &(0x7f0000000200)={0xff, "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"}) 00:25:21 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_int(r1, 0x0, 0x4, &(0x7f0000000080), 0x4) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 00:25:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) 00:25:21 executing program 1: 00:25:21 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @rand_addr, 0x0, 0x0, 'sh\x00', 0x0, 0x3ff}, {@empty, 0x0, 0x0, 0x0, 0x0, 0xffe}}, 0x44) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x186}], 0x0, 0x0) [ 223.914537][ T9429] FAT-fs (loop4): bogus number of reserved sectors [ 223.927170][ T9429] FAT-fs (loop4): Can't find a valid FAT filesystem 00:25:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') 00:25:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, 0x0, 0x20048001) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shmctl$SHM_STAT(0x0, 0xd, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="6f68685084ff00106f184500006b40295800009a9f4eedf8b1c4fee8f38100029e4b4c39f960d5a86957c5aa3d9d48a04e7d2e5d"], 0x50) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$SHM_LOCK(r1, 0xb) socket(0x0, 0x0, 0x0) 00:25:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) [ 224.103559][ T9457] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:25:21 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_int(r1, 0x0, 0x4, &(0x7f0000000080), 0x4) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) [ 224.146300][ T9457] FAT-fs (loop3): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. 00:25:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b3d, &(0x7f0000000200)={0xff, "f596ec085de281047d5e16eeb5b731ad67afc2c4436a639ac085f220c3a400fd04c41f73b6592fd727d66f988e1161191bd43bc7d31b5fb278207e64b5cc16d390866fb98f691552ffb7541eb70cd398ac70733416184743434d197e7161e6f4bba0398ba8ffec27aeaa412957316cad4666cc391f664ef7712b88fe985be7e27141a3edb98a54cfc87272abe59596c18fdd1e7131d25cb43532f91ab13ba8d94999237026dbf5a0aab11c919725c76fef8325e0b8723740969843bce4f61ffc650a8e09be0b0c1647c6689ac12ed97a343afebe3cf732690e5c883681550e0075b1a293747975e4ab0d86ee61abf7c176730d84612dffc02464ced3f10873f43f723841f0972fd72db440d029949513a97be611df47044f0b29baa505aeee9c937792d1370ee6388f5bbf158737f12c780de909b3b30d126a5603854026ed3de00d2cb6c6906036c97c3a1843cc04fe3c8b63e5e10265a8712388d9bf83e7a845d6975860aa6650e87b457be35e5b973be12f3ec900ef2cb81092d9346a3617cd8df38b867679471e35c466277e14cb1f15eaa7d4d760949e72bf1c020df887dac96fa76a0c3532efdb401332e96c414d9e6edb16f1d6a102fc6537af9a293b6edb4f09fb73f415c8915a03a8418811127f4c217abbba5e1c0f31b9aa20e02d7c1a9dceffdcbf554f2e7cdb98b9da274b09a14c21d47bf62a87c3d9a86e51e5"}) 00:25:22 executing program 3: timerfd_create(0x0, 0x40000) 00:25:22 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sched_getattr(0x0, &(0x7f0000000240)={0x38}, 0x38, 0x0) 00:25:22 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_int(r1, 0x0, 0x4, &(0x7f0000000080), 0x4) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000040)=0x9, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 00:25:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b40, &(0x7f0000000200)={0xff, "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"}) 00:25:22 executing program 4: shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000480)=""/132) 00:25:22 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sync_file_range(r0, 0x0, 0x6, 0x0) 00:25:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x1, 0x0) semctl$SETVAL(r1, 0x1, 0x10, 0x0) 00:25:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b41, &(0x7f0000000200)={0xff, "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"}) 00:25:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r1, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) 00:25:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchmodat(0xffffffffffffffff, 0x0, 0x0) 00:25:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, &(0x7f0000000280)=""/89, &(0x7f0000000300)=0x59) 00:25:22 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="d4000000010801"], 0xd4}}, 0x0) 00:25:22 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b44, &(0x7f0000000200)={0xff, "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"}) 00:25:22 executing program 5: r0 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) readv(r0, 0x0, 0x0) [ 224.812258][ T9505] netlink: 192 bytes leftover after parsing attributes in process `syz-executor.3'. [ 224.881127][ T9509] netlink: 192 bytes leftover after parsing attributes in process `syz-executor.3'. 00:25:23 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_int(r1, 0x0, 0x4, &(0x7f0000000080), 0x4) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000040)=0x9, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 00:25:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_settime(0x0, 0x0) 00:25:23 executing program 5: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10a22}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000000)) semget$private(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x458, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x24, [0xfffffff7, 0xecc, 0x0, 0xb05f, 0x0, 0x0, 0x0, 0x7, 0xffff, 0x0, 0x0, 0x200081, 0x3ee, 0x0, 0x0, 0x7, 0x7, 0x0, 0x8, 0x0, 0x0, 0x92, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x5, 0x9, 0x5, 0xaa94, 0x8e04, 0x0, 0x9, 0x0, 0x0, 0x18000000, 0x6, 0x10001, 0x9, 0x0, 0xfda7, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5e, 0x200, 0x7fffffff, 0x7fff, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x5], [0x0, 0x4, 0x0, 0x0, 0xd8600, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x9, 0x4, 0x1, 0x1ff, 0x0, 0xa7, 0x7, 0x1, 0xffff, 0x5, 0x6880, 0x9f1, 0x401, 0x0, 0x800, 0x0, 0xfbfe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x8, 0x0, 0x0, 0x0, 0xc000, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, 0x7f, 0xffffffff, 0x4, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x9], [0xfffff331, 0x8, 0x8000, 0x2, 0x0, 0x0, 0x1000, 0x81, 0x6, 0x7, 0x6, 0x0, 0x0, 0xb84, 0x6, 0xd4, 0x0, 0x0, 0x9, 0x5, 0x837, 0x6, 0x0, 0x81, 0x0, 0x5f, 0xfff, 0x68f1, 0x80, 0x7, 0x9, 0x0, 0x0, 0x8, 0x53d5ec22, 0x6, 0x1ff, 0x9aa, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8000, 0xfffe8000, 0x97a, 0xfffffffc, 0x5, 0xfffffffa, 0x0, 0x6, 0x4, 0x401, 0x0, 0x0, 0xef, 0x6b, 0x0, 0xffffffc0, 0xf34, 0x9, 0x1ff, 0xa000, 0x1000], [0x80000001, 0x0, 0x80, 0xfffffffb, 0x5, 0x7fffffff, 0x40, 0x200, 0x0, 0x2, 0x80000000, 0x9, 0x1000, 0x7fffffff, 0x0, 0x1, 0x8ba, 0x5, 0x0, 0x9, 0xa370, 0x3, 0x7fff, 0xdc, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x2fb, 0x0, 0x0, 0x100, 0xffff, 0x40, 0x3, 0x0, 0x0, 0x0, 0xe8, 0x9, 0x9, 0x5, 0x7, 0x7, 0x0, 0x2, 0x4, 0x0, 0x9, 0x0, 0xffffffe0, 0xdf, 0x10000, 0xe6cf, 0x2ee, 0x0, 0xfffffffc, 0xc1, 0x5, 0x0, 0x4a35], 0x36, ['pagemap\x00', '\x00', 'bdev+nodev&\\\x00', 'pagemap\x00', 'pagemap\x00', 'pagemap\x00', 'pagemap\x00']}, ["", ""]}, 0x458}, 0x1, 0x0, 0x0, 0x48044}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x2, 0xec3, 0x7d}}, 0x28) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x14}, 0x14}}, 0x10) munlockall() 00:25:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b45, &(0x7f0000000200)={0xff, "f596ec085de281047d5e16eeb5b731ad67afc2c4436a639ac085f220c3a400fd04c41f73b6592fd727d66f988e1161191bd43bc7d31b5fb278207e64b5cc16d390866fb98f691552ffb7541eb70cd398ac70733416184743434d197e7161e6f4bba0398ba8ffec27aeaa412957316cad4666cc391f664ef7712b88fe985be7e27141a3edb98a54cfc87272abe59596c18fdd1e7131d25cb43532f91ab13ba8d94999237026dbf5a0aab11c919725c76fef8325e0b8723740969843bce4f61ffc650a8e09be0b0c1647c6689ac12ed97a343afebe3cf732690e5c883681550e0075b1a293747975e4ab0d86ee61abf7c176730d84612dffc02464ced3f10873f43f723841f0972fd72db440d029949513a97be611df47044f0b29baa505aeee9c937792d1370ee6388f5bbf158737f12c780de909b3b30d126a5603854026ed3de00d2cb6c6906036c97c3a1843cc04fe3c8b63e5e10265a8712388d9bf83e7a845d6975860aa6650e87b457be35e5b973be12f3ec900ef2cb81092d9346a3617cd8df38b867679471e35c466277e14cb1f15eaa7d4d760949e72bf1c020df887dac96fa76a0c3532efdb401332e96c414d9e6edb16f1d6a102fc6537af9a293b6edb4f09fb73f415c8915a03a8418811127f4c217abbba5e1c0f31b9aa20e02d7c1a9dceffdcbf554f2e7cdb98b9da274b09a14c21d47bf62a87c3d9a86e51e5"}) 00:25:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'bridge0\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_fanout(r2, 0x107, 0x12, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000200)=0x8f) sendmmsg(r2, &(0x7f0000005040)=[{{&(0x7f0000000180)=@xdp={0x2c, 0x0, r5}, 0x80, 0x0}}], 0x300, 0x0) 00:25:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) 00:25:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000002c0)={0x7, 0xa94, 0x200, 0x3, 0x8}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0x8) lseek(0xffffffffffffffff, 0x0, 0x3) r1 = creat(&(0x7f0000000200)='./file2\x00', 0x0) lseek(r1, 0x800005, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) write$binfmt_aout(r1, &(0x7f0000000100)=ANY=[@ANYRES64=0x0], 0x8) lseek(r1, 0x0, 0x3) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x840, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x9, 0x323000) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x70, 0x0, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x7}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xfffffffffffffffb}, @NBD_ATTR_SOCKETS={0x2c, 0x7, 0x0, 0x1, [{0x8}, {0x8}, {0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xe}]}, 0x70}, 0x1, 0x0, 0x0, 0xb05a7bee68da8eb0}, 0x40804) r4 = creat(&(0x7f0000000280)='./bus\x00', 0x14c) shmget(0x2, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) syncfs(r4) 00:25:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b46, &(0x7f0000000200)={0xff, "f596ec085de281047d5e16eeb5b731ad67afc2c4436a639ac085f220c3a400fd04c41f73b6592fd727d66f988e1161191bd43bc7d31b5fb278207e64b5cc16d390866fb98f691552ffb7541eb70cd398ac70733416184743434d197e7161e6f4bba0398ba8ffec27aeaa412957316cad4666cc391f664ef7712b88fe985be7e27141a3edb98a54cfc87272abe59596c18fdd1e7131d25cb43532f91ab13ba8d94999237026dbf5a0aab11c919725c76fef8325e0b8723740969843bce4f61ffc650a8e09be0b0c1647c6689ac12ed97a343afebe3cf732690e5c883681550e0075b1a293747975e4ab0d86ee61abf7c176730d84612dffc02464ced3f10873f43f723841f0972fd72db440d029949513a97be611df47044f0b29baa505aeee9c937792d1370ee6388f5bbf158737f12c780de909b3b30d126a5603854026ed3de00d2cb6c6906036c97c3a1843cc04fe3c8b63e5e10265a8712388d9bf83e7a845d6975860aa6650e87b457be35e5b973be12f3ec900ef2cb81092d9346a3617cd8df38b867679471e35c466277e14cb1f15eaa7d4d760949e72bf1c020df887dac96fa76a0c3532efdb401332e96c414d9e6edb16f1d6a102fc6537af9a293b6edb4f09fb73f415c8915a03a8418811127f4c217abbba5e1c0f31b9aa20e02d7c1a9dceffdcbf554f2e7cdb98b9da274b09a14c21d47bf62a87c3d9a86e51e5"}) 00:25:23 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x81, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x8002}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) accept4$unix(r3, 0x0, 0x0, 0x80000) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x12400, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}, 0x0, 0x8, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000006c0)) io_submit(0x0, 0x1, &(0x7f0000000040)=[0x0]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x23, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x30, r4, 0x81e6c000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, 0x0, 0x0) sendmmsg(r5, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) r6 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r6, 0x0, 0x0) 00:25:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b47, &(0x7f0000000200)={0xff, "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"}) [ 225.634594][ T9547] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:25:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@type={'type', 0x3d, "0900b7b4"}}]}) 00:25:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b48, &(0x7f0000000200)={0xff, "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"}) [ 225.750207][ T9553] hfsplus: type requires a 4 character value [ 225.757386][ T9553] hfsplus: unable to parse mount options 00:25:23 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_int(r1, 0x0, 0x4, &(0x7f0000000080), 0x4) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000040)=0x9, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 00:25:23 executing program 5: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10a22}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000000)) semget$private(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x458, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x24, [0xfffffff7, 0xecc, 0x0, 0xb05f, 0x0, 0x0, 0x0, 0x7, 0xffff, 0x0, 0x0, 0x200081, 0x3ee, 0x0, 0x0, 0x7, 0x7, 0x0, 0x8, 0x0, 0x0, 0x92, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x5, 0x9, 0x5, 0xaa94, 0x8e04, 0x0, 0x9, 0x0, 0x0, 0x18000000, 0x6, 0x10001, 0x9, 0x0, 0xfda7, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5e, 0x200, 0x7fffffff, 0x7fff, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x5], [0x0, 0x4, 0x0, 0x0, 0xd8600, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x9, 0x4, 0x1, 0x1ff, 0x0, 0xa7, 0x7, 0x1, 0xffff, 0x5, 0x6880, 0x9f1, 0x401, 0x0, 0x800, 0x0, 0xfbfe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x8, 0x0, 0x0, 0x0, 0xc000, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, 0x7f, 0xffffffff, 0x4, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x9], [0xfffff331, 0x8, 0x8000, 0x2, 0x0, 0x0, 0x1000, 0x81, 0x6, 0x7, 0x6, 0x0, 0x0, 0xb84, 0x6, 0xd4, 0x0, 0x0, 0x9, 0x5, 0x837, 0x6, 0x0, 0x81, 0x0, 0x5f, 0xfff, 0x68f1, 0x80, 0x7, 0x9, 0x0, 0x0, 0x8, 0x53d5ec22, 0x6, 0x1ff, 0x9aa, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8000, 0xfffe8000, 0x97a, 0xfffffffc, 0x5, 0xfffffffa, 0x0, 0x6, 0x4, 0x401, 0x0, 0x0, 0xef, 0x6b, 0x0, 0xffffffc0, 0xf34, 0x9, 0x1ff, 0xa000, 0x1000], [0x80000001, 0x0, 0x80, 0xfffffffb, 0x5, 0x7fffffff, 0x40, 0x200, 0x0, 0x2, 0x80000000, 0x9, 0x1000, 0x7fffffff, 0x0, 0x1, 0x8ba, 0x5, 0x0, 0x9, 0xa370, 0x3, 0x7fff, 0xdc, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x2fb, 0x0, 0x0, 0x100, 0xffff, 0x40, 0x3, 0x0, 0x0, 0x0, 0xe8, 0x9, 0x9, 0x5, 0x7, 0x7, 0x0, 0x2, 0x4, 0x0, 0x9, 0x0, 0xffffffe0, 0xdf, 0x10000, 0xe6cf, 0x2ee, 0x0, 0xfffffffc, 0xc1, 0x5, 0x0, 0x4a35], 0x36, ['pagemap\x00', '\x00', 'bdev+nodev&\\\x00', 'pagemap\x00', 'pagemap\x00', 'pagemap\x00', 'pagemap\x00']}, ["", ""]}, 0x458}, 0x1, 0x0, 0x0, 0x48044}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x2, 0xec3, 0x7d}}, 0x28) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x14}, 0x14}}, 0x10) munlockall() 00:25:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1b) 00:25:23 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4a, &(0x7f0000000200)={0xff, "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"}) 00:25:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe2(&(0x7f0000000000), 0x0) 00:25:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4b, &(0x7f0000000200)={0xff, "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"}) 00:25:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@fat=@nfs='nfs'}]}) 00:25:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000100)=0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x22000, 0x0) bind$inet6(r1, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) dup(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000040)='F', 0xfffffffffffffe43, 0x20000003, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendmsg$NL80211_CMD_SET_WIPHY(0xffffffffffffffff, 0x0, 0x0) 00:25:24 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvram\x00', 0x101182, 0x0) [ 226.514482][ T9589] FAT-fs (loop3): bogus number of reserved sectors [ 226.521486][ T9589] FAT-fs (loop3): Can't find a valid FAT filesystem 00:25:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4c, &(0x7f0000000200)={0xff, "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"}) 00:25:24 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x7, r0, 0x0, 0x0) 00:25:24 executing program 5: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10a22}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000000)) semget$private(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1f) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0xedc0) sendmsg$AUDIT_ADD_RULE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)={0x458, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x24, [0xfffffff7, 0xecc, 0x0, 0xb05f, 0x0, 0x0, 0x0, 0x7, 0xffff, 0x0, 0x0, 0x200081, 0x3ee, 0x0, 0x0, 0x7, 0x7, 0x0, 0x8, 0x0, 0x0, 0x92, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0x5, 0x9, 0x5, 0xaa94, 0x8e04, 0x0, 0x9, 0x0, 0x0, 0x18000000, 0x6, 0x10001, 0x9, 0x0, 0xfda7, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5e, 0x200, 0x7fffffff, 0x7fff, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x5], [0x0, 0x4, 0x0, 0x0, 0xd8600, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x9, 0x4, 0x1, 0x1ff, 0x0, 0xa7, 0x7, 0x1, 0xffff, 0x5, 0x6880, 0x9f1, 0x401, 0x0, 0x800, 0x0, 0xfbfe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x8, 0x0, 0x0, 0x0, 0xc000, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, 0x7f, 0xffffffff, 0x4, 0x0, 0x6, 0x3f, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x9], [0xfffff331, 0x8, 0x8000, 0x2, 0x0, 0x0, 0x1000, 0x81, 0x6, 0x7, 0x6, 0x0, 0x0, 0xb84, 0x6, 0xd4, 0x0, 0x0, 0x9, 0x5, 0x837, 0x6, 0x0, 0x81, 0x0, 0x5f, 0xfff, 0x68f1, 0x80, 0x7, 0x9, 0x0, 0x0, 0x8, 0x53d5ec22, 0x6, 0x1ff, 0x9aa, 0x0, 0x2, 0x0, 0x0, 0x0, 0x8000, 0xfffe8000, 0x97a, 0xfffffffc, 0x5, 0xfffffffa, 0x0, 0x6, 0x4, 0x401, 0x0, 0x0, 0xef, 0x6b, 0x0, 0xffffffc0, 0xf34, 0x9, 0x1ff, 0xa000, 0x1000], [0x80000001, 0x0, 0x80, 0xfffffffb, 0x5, 0x7fffffff, 0x40, 0x200, 0x0, 0x2, 0x80000000, 0x9, 0x1000, 0x7fffffff, 0x0, 0x1, 0x8ba, 0x5, 0x0, 0x9, 0xa370, 0x3, 0x7fff, 0xdc, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x2fb, 0x0, 0x0, 0x100, 0xffff, 0x40, 0x3, 0x0, 0x0, 0x0, 0xe8, 0x9, 0x9, 0x5, 0x7, 0x7, 0x0, 0x2, 0x4, 0x0, 0x9, 0x0, 0xffffffe0, 0xdf, 0x10000, 0xe6cf, 0x2ee, 0x0, 0xfffffffc, 0xc1, 0x5, 0x0, 0x4a35], 0x36, ['pagemap\x00', '\x00', 'bdev+nodev&\\\x00', 'pagemap\x00', 'pagemap\x00', 'pagemap\x00', 'pagemap\x00']}, ["", ""]}, 0x458}, 0x1, 0x0, 0x0, 0x48044}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x2, 0xec3, 0x7d}}, 0x28) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x14}, 0x14}}, 0x10) munlockall() [ 226.589607][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 226.681298][ T9589] FAT-fs (loop3): bogus number of reserved sectors [ 226.695997][ T9589] FAT-fs (loop3): Can't find a valid FAT filesystem 00:25:24 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000040)=0x9, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 00:25:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_MCE_KILL(0x21, 0x1, 0x0) 00:25:24 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4d, &(0x7f0000000200)={0xff, "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"}) 00:25:24 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x36a) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040), 0x4) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x25) wait4(0x0, 0x0, 0x0, 0x0) r4 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 00:25:24 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendmsg$sock(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 00:25:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b4e, &(0x7f0000000200)={0xff, "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"}) 00:25:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fchdir(r3) close(r2) open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) sendfile(r2, r1, 0x0, 0x100000001) [ 227.372901][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 00:25:25 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() ptrace(0x4206, 0x0) ptrace(0xffffffffffffffff, r0) 00:25:25 executing program 5: r0 = syz_open_dev$evdev(&(0x7f000004a000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, 0x0) 00:25:25 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000040)=0x9, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 00:25:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b52, &(0x7f0000000200)={0xff, "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"}) [ 227.478149][ T9632] FAT-fs (loop4): bogus number of FAT sectors [ 227.485454][ T9632] FAT-fs (loop4): Can't find a valid FAT filesystem 00:25:25 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b60, &(0x7f0000000200)={0xff, "f596ec085de281047d5e16eeb5b731ad67afc2c4436a639ac085f220c3a400fd04c41f73b6592fd727d66f988e1161191bd43bc7d31b5fb278207e64b5cc16d390866fb98f691552ffb7541eb70cd398ac70733416184743434d197e7161e6f4bba0398ba8ffec27aeaa412957316cad4666cc391f664ef7712b88fe985be7e27141a3edb98a54cfc87272abe59596c18fdd1e7131d25cb43532f91ab13ba8d94999237026dbf5a0aab11c919725c76fef8325e0b8723740969843bce4f61ffc650a8e09be0b0c1647c6689ac12ed97a343afebe3cf732690e5c883681550e0075b1a293747975e4ab0d86ee61abf7c176730d84612dffc02464ced3f10873f43f723841f0972fd72db440d029949513a97be611df47044f0b29baa505aeee9c937792d1370ee6388f5bbf158737f12c780de909b3b30d126a5603854026ed3de00d2cb6c6906036c97c3a1843cc04fe3c8b63e5e10265a8712388d9bf83e7a845d6975860aa6650e87b457be35e5b973be12f3ec900ef2cb81092d9346a3617cd8df38b867679471e35c466277e14cb1f15eaa7d4d760949e72bf1c020df887dac96fa76a0c3532efdb401332e96c414d9e6edb16f1d6a102fc6537af9a293b6edb4f09fb73f415c8915a03a8418811127f4c217abbba5e1c0f31b9aa20e02d7c1a9dceffdcbf554f2e7cdb98b9da274b09a14c21d47bf62a87c3d9a86e51e5"}) 00:25:25 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) r1 = socket(0x40000000002, 0x3, 0x80000000002) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='bridge_slave_0\x00', 0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs={0x0, 0x0, 0x10000e0}, 0x33) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000040)=0x9, 0x4) recvmmsg(r0, &(0x7f0000000240)=[{{0x0, 0xfffffffffffffea7, 0x0, 0x0, 0x0, 0xfffffffffffffec8}}], 0x4000000000002c5, 0x2, 0x0) 00:25:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x200000000801, 0x0) write$uinput_user_dev(r0, &(0x7f0000000c80)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000000)) 00:25:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000000c0)) [ 227.819363][ T9652] input: syz1 as /devices/virtual/input/input5 [ 227.852004][ T9651] ================================================================== [ 227.860287][ T9651] BUG: KASAN: use-after-free in __mutex_lock+0x1033/0x13c0 [ 227.867489][ T9651] Read of size 8 at addr ffff8880895c5158 by task syz-executor.5/9651 [ 227.875630][ T9651] [ 227.877965][ T9651] CPU: 0 PID: 9651 Comm: syz-executor.5 Not tainted 5.7.0-rc6-next-20200522-syzkaller #0 [ 227.887762][ T9651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.897815][ T9651] Call Trace: [ 227.901114][ T9651] dump_stack+0x18f/0x20d [ 227.905450][ T9651] ? __mutex_lock+0x1033/0x13c0 [ 227.910299][ T9651] ? __mutex_lock+0x1033/0x13c0 [ 227.915153][ T9651] print_address_description.constprop.0.cold+0xd3/0x413 [ 227.922182][ T9651] ? cdev_device_del+0x69/0x80 [ 227.926945][ T9651] ? evdev_disconnect+0x3d/0xb0 [ 227.931798][ T9651] ? __input_unregister_device+0x1b0/0x430 [ 227.937602][ T9651] ? input_unregister_device+0xb4/0xf0 [ 227.943064][ T9651] ? uinput_destroy_device+0x1e2/0x240 [ 227.948523][ T9651] ? vprintk_func+0x97/0x1a6 [ 227.953119][ T9651] ? __mutex_lock+0x1033/0x13c0 [ 227.957968][ T9651] kasan_report.cold+0x1f/0x37 [ 227.962732][ T9651] ? __mutex_lock+0x1033/0x13c0 [ 227.967589][ T9651] __mutex_lock+0x1033/0x13c0 [ 227.972279][ T9651] ? evdev_cleanup+0x21/0x190 [ 227.976958][ T9651] ? print_usage_bug+0x240/0x240 [ 227.981906][ T9651] ? trace_hardirqs_off+0x50/0x220 [ 227.987019][ T9651] ? mutex_trylock+0x2c0/0x2c0 [ 227.991789][ T9651] ? mark_held_locks+0x9f/0xe0 [ 227.996556][ T9651] ? kfree+0x1eb/0x2b0 [ 228.000625][ T9651] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 228.006608][ T9651] ? kfree_const+0x51/0x60 [ 228.011034][ T9651] ? evdev_cleanup+0x21/0x190 [ 228.015711][ T9651] evdev_cleanup+0x21/0x190 [ 228.020217][ T9651] evdev_disconnect+0x45/0xb0 [ 228.024903][ T9651] __input_unregister_device+0x1b0/0x430 [ 228.030544][ T9651] input_unregister_device+0xb4/0xf0 [ 228.036444][ T9651] uinput_destroy_device+0x1e2/0x240 [ 228.041772][ T9651] ? uinput_destroy_device+0x240/0x240 [ 228.047263][ T9651] uinput_release+0x37/0x50 [ 228.051770][ T9651] __fput+0x33e/0x880 [ 228.055770][ T9651] task_work_run+0xf4/0x1b0 [ 228.060281][ T9651] exit_to_usermode_loop+0x2fa/0x360 [ 228.065579][ T9651] do_syscall_64+0x6b1/0x7d0 [ 228.070180][ T9651] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 228.076070][ T9651] RIP: 0033:0x416621 [ 228.079967][ T9651] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 228.099573][ T9651] RSP: 002b:00007ffd2c1b6650 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 228.108339][ T9651] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000416621 [ 228.116317][ T9651] RDX: 0000001b30a20000 RSI: 00000000000000d0 RDI: 0000000000000003 [ 228.124298][ T9651] RBP: 0000000000000001 R08: 00000000551800d0 R09: 00000000551800d4 [ 228.132269][ T9651] R10: 00007ffd2c1b6740 R11: 0000000000000293 R12: 0000000000792bc8 [ 228.140243][ T9651] R13: 0000000000037a42 R14: ffffffffffffffff R15: 000000000078bf0c [ 228.148240][ T9651] [ 228.150567][ T9651] Allocated by task 9652: [ 228.154918][ T9651] save_stack+0x1b/0x40 [ 228.159077][ T9651] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 228.164714][ T9651] kmem_cache_alloc_trace+0x153/0x7d0 [ 228.170086][ T9651] evdev_connect+0x80/0x4d0 [ 228.174601][ T9651] input_attach_handler+0x194/0x200 [ 228.179799][ T9651] input_register_device.cold+0xf5/0x246 [ 228.185434][ T9651] uinput_ioctl_handler.isra.0+0x1210/0x1d80 [ 228.191418][ T9651] ksys_ioctl+0x11a/0x180 [ 228.195751][ T9651] __x64_sys_ioctl+0x6f/0xb0 [ 228.200372][ T9651] do_syscall_64+0xf6/0x7d0 [ 228.204883][ T9651] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 228.210765][ T9651] [ 228.213089][ T9651] Freed by task 9651: [ 228.217074][ T9651] save_stack+0x1b/0x40 [ 228.221231][ T9651] __kasan_slab_free+0xf7/0x140 [ 228.226079][ T9651] kfree+0x109/0x2b0 [ 228.229971][ T9651] device_release+0x71/0x200 [ 228.234558][ T9651] kobject_put+0x1c8/0x2f0 [ 228.238973][ T9651] cdev_device_del+0x69/0x80 [ 228.243570][ T9651] evdev_disconnect+0x3d/0xb0 [ 228.248245][ T9651] __input_unregister_device+0x1b0/0x430 [ 228.253883][ T9651] input_unregister_device+0xb4/0xf0 [ 228.259168][ T9651] uinput_destroy_device+0x1e2/0x240 [ 228.264454][ T9651] uinput_release+0x37/0x50 [ 228.268959][ T9651] __fput+0x33e/0x880 [ 228.272939][ T9651] task_work_run+0xf4/0x1b0 [ 228.277445][ T9651] exit_to_usermode_loop+0x2fa/0x360 [ 228.282730][ T9651] do_syscall_64+0x6b1/0x7d0 [ 228.287323][ T9651] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 228.293210][ T9651] [ 228.295538][ T9651] The buggy address belongs to the object at ffff8880895c5000 [ 228.295538][ T9651] which belongs to the cache kmalloc-2k of size 2048 [ 228.309589][ T9651] The buggy address is located 344 bytes inside of [ 228.309589][ T9651] 2048-byte region [ffff8880895c5000, ffff8880895c5800) [ 228.322938][ T9651] The buggy address belongs to the page: [ 228.328576][ T9651] page:ffffea0002257140 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 [ 228.337684][ T9651] flags: 0xfffe0000000200(slab) [ 228.342538][ T9651] raw: 00fffe0000000200 ffffea000242ea08 ffffea0002985b88 ffff8880aa000e00 [ 228.351124][ T9651] raw: 0000000000000000 ffff8880895c5000 0000000100000001 0000000000000000 [ 228.359703][ T9651] page dumped because: kasan: bad access detected [ 228.366111][ T9651] [ 228.368450][ T9651] Memory state around the buggy address: [ 228.374084][ T9651] ffff8880895c5000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 228.382145][ T9651] ffff8880895c5080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 228.390213][ T9651] >ffff8880895c5100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 228.398266][ T9651] ^ [ 228.405197][ T9651] ffff8880895c5180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 228.413258][ T9651] ffff8880895c5200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 228.421312][ T9651] ================================================================== [ 228.429385][ T9651] Disabling lock debugging due to kernel taint [ 228.437153][ T28] audit: type=1804 audit(1590279926.051:15): pid=9631 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir165731439/syzkaller.RdPiOl/84/cgroup.controllers" dev="sda1" ino=16035 res=1 [ 228.461410][ T9651] Kernel panic - not syncing: panic_on_warn set ... [ 228.468005][ T9651] CPU: 0 PID: 9651 Comm: syz-executor.5 Tainted: G B 5.7.0-rc6-next-20200522-syzkaller #0 [ 228.479198][ T9651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.489251][ T9651] Call Trace: [ 228.492537][ T9651] dump_stack+0x18f/0x20d [ 228.498237][ T9651] ? __mutex_lock+0xf50/0x13c0 [ 228.502998][ T9651] panic+0x2e3/0x75c [ 228.506892][ T9651] ? __warn_printk+0xf3/0xf3 [ 228.511481][ T9651] ? preempt_schedule_common+0x5e/0xc0 [ 228.516959][ T9651] ? __mutex_lock+0x1033/0x13c0 [ 228.521806][ T9651] ? __mutex_lock+0x1033/0x13c0 [ 228.526656][ T9651] ? preempt_schedule_thunk+0x16/0x18 [ 228.532027][ T9651] ? trace_hardirqs_on+0x55/0x230 [ 228.537050][ T9651] ? __mutex_lock+0x1033/0x13c0 [ 228.541897][ T9651] ? __mutex_lock+0x1033/0x13c0 [ 228.546746][ T9651] end_report+0x4d/0x53 [ 228.550901][ T9651] kasan_report.cold+0xd/0x37 [ 228.555576][ T9651] ? __mutex_lock+0x1033/0x13c0 [ 228.560422][ T9651] __mutex_lock+0x1033/0x13c0 [ 228.565095][ T9651] ? evdev_cleanup+0x21/0x190 [ 228.569782][ T9651] ? print_usage_bug+0x240/0x240 [ 228.574719][ T9651] ? trace_hardirqs_off+0x50/0x220 [ 228.579822][ T9651] ? mutex_trylock+0x2c0/0x2c0 [ 228.584584][ T9651] ? mark_held_locks+0x9f/0xe0 [ 228.589342][ T9651] ? kfree+0x1eb/0x2b0 [ 228.593409][ T9651] ? lockdep_hardirqs_on_prepare+0x3a2/0x590 [ 228.599396][ T9651] ? kfree_const+0x51/0x60 [ 228.603810][ T9651] ? evdev_cleanup+0x21/0x190 [ 228.608477][ T9651] evdev_cleanup+0x21/0x190 [ 228.612972][ T9651] evdev_disconnect+0x45/0xb0 [ 228.617662][ T9651] __input_unregister_device+0x1b0/0x430 [ 228.623290][ T9651] input_unregister_device+0xb4/0xf0 [ 228.628571][ T9651] uinput_destroy_device+0x1e2/0x240 [ 228.633855][ T9651] ? uinput_destroy_device+0x240/0x240 [ 228.639341][ T9651] uinput_release+0x37/0x50 [ 228.643845][ T9651] __fput+0x33e/0x880 [ 228.647822][ T9651] task_work_run+0xf4/0x1b0 [ 228.652325][ T9651] exit_to_usermode_loop+0x2fa/0x360 [ 228.657607][ T9651] do_syscall_64+0x6b1/0x7d0 [ 228.662198][ T9651] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 228.668090][ T9651] RIP: 0033:0x416621 [ 228.671979][ T9651] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 228.691573][ T9651] RSP: 002b:00007ffd2c1b6650 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 228.699975][ T9651] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000416621 [ 228.707940][ T9651] RDX: 0000001b30a20000 RSI: 00000000000000d0 RDI: 0000000000000003 [ 228.715905][ T9651] RBP: 0000000000000001 R08: 00000000551800d0 R09: 00000000551800d4 [ 228.723871][ T9651] R10: 00007ffd2c1b6740 R11: 0000000000000293 R12: 0000000000792bc8 [ 228.731839][ T9651] R13: 0000000000037a42 R14: ffffffffffffffff R15: 000000000078bf0c [ 228.741477][ T9651] Kernel Offset: disabled [ 228.745838][ T9651] Rebooting in 86400 seconds..