[ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Started OpenBSD Secure Shell server. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.15.214' (ECDSA) to the list of known hosts. 2020/06/30 05:15:14 fuzzer started 2020/06/30 05:15:14 dialing manager at 10.128.0.26:33155 2020/06/30 05:15:15 syscalls: 3149 2020/06/30 05:15:15 code coverage: enabled 2020/06/30 05:15:15 comparison tracing: enabled 2020/06/30 05:15:15 extra coverage: enabled 2020/06/30 05:15:15 setuid sandbox: enabled 2020/06/30 05:15:15 namespace sandbox: enabled 2020/06/30 05:15:15 Android sandbox: /sys/fs/selinux/policy does not exist 2020/06/30 05:15:15 fault injection: enabled 2020/06/30 05:15:15 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/06/30 05:15:15 net packet injection: enabled 2020/06/30 05:15:15 net device setup: enabled 2020/06/30 05:15:15 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/06/30 05:15:15 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/06/30 05:15:15 USB emulation: enabled 05:17:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x121041) write$evdev(r0, 0x0, 0x0) syzkaller login: [ 184.352374][ T6808] IPVS: ftp: loaded support on port[0] = 21 05:17:38 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001880)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x800000) [ 184.477602][ T6808] chnl_net:caif_netlink_parms(): no params data found [ 184.554364][ T6808] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.562559][ T6808] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.572028][ T6808] device bridge_slave_0 entered promiscuous mode [ 184.581672][ T6808] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.588899][ T6808] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.598820][ T6808] device bridge_slave_1 entered promiscuous mode [ 184.622098][ T6808] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.633371][ T6808] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.658427][ T6808] team0: Port device team_slave_0 added [ 184.667087][ T6808] team0: Port device team_slave_1 added [ 184.686749][ T6808] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 184.694508][ T6808] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 184.720890][ T6808] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 184.734477][ T6808] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 184.741521][ T6808] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 184.767494][ T6808] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 184.786178][ T6956] IPVS: ftp: loaded support on port[0] = 21 05:17:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xfffffffffffffffb, 0x1, &(0x7f0000000400)=[{&(0x7f00000002c0)="eb3c906d6b66732e666174000210010002000270fff8dd", 0x17}], 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) chmod(&(0x7f0000000000)='./file0/file0\x00', 0x0) [ 184.872965][ T6808] device hsr_slave_0 entered promiscuous mode [ 184.929945][ T6808] device hsr_slave_1 entered promiscuous mode [ 185.001752][ T6974] IPVS: ftp: loaded support on port[0] = 21 05:17:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000340)={0xffffffffffffffbc}, 0x12a) [ 185.253961][ T6808] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 185.402189][ T6808] netdevsim netdevsim0 netdevsim1: renamed from eth1 05:17:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xfffffffffffffffb, 0x1, &(0x7f0000000400)=[{&(0x7f00000002c0)="eb3c906d6b66732e666174000210010002000270fff8dd", 0x17}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000140)='./file0\x00', r1, 0x0) [ 185.461362][ T6808] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 185.548162][ T6808] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 185.629142][ T7175] IPVS: ftp: loaded support on port[0] = 21 [ 185.633002][ T6974] chnl_net:caif_netlink_parms(): no params data found [ 185.665602][ T6956] chnl_net:caif_netlink_parms(): no params data found [ 185.758825][ T7211] IPVS: ftp: loaded support on port[0] = 21 05:17:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0xfffffffffffffffb, 0x1, &(0x7f0000000400)=[{&(0x7f00000002c0)="eb3c906d6b66732e666174000210010002000270fff8dd", 0x17}], 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) rmdir(&(0x7f00000000c0)='./file0/file0\x00') [ 185.888278][ T6956] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.899732][ T6956] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.907624][ T6956] device bridge_slave_0 entered promiscuous mode [ 185.970158][ T6974] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.977232][ T6974] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.991607][ T6974] device bridge_slave_0 entered promiscuous mode [ 186.002625][ T6956] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.010174][ T6956] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.018043][ T6956] device bridge_slave_1 entered promiscuous mode [ 186.064858][ T6974] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.072122][ T6974] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.084020][ T6974] device bridge_slave_1 entered promiscuous mode [ 186.110353][ T7321] IPVS: ftp: loaded support on port[0] = 21 [ 186.123151][ T7175] chnl_net:caif_netlink_parms(): no params data found [ 186.164950][ T6956] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.190196][ T6974] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.205139][ T6956] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.227597][ T6808] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.242736][ T6974] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.259785][ T6956] team0: Port device team_slave_0 added [ 186.267308][ T6956] team0: Port device team_slave_1 added [ 186.359512][ T6956] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 186.366475][ T6956] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 186.395521][ T6956] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 186.423924][ T6974] team0: Port device team_slave_0 added [ 186.432312][ T7211] chnl_net:caif_netlink_parms(): no params data found [ 186.450266][ T6956] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 186.457241][ T6956] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 186.484631][ T6956] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 186.497275][ T7175] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.505169][ T7175] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.513150][ T7175] device bridge_slave_0 entered promiscuous mode [ 186.523607][ T6974] team0: Port device team_slave_1 added [ 186.532848][ T7175] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.542758][ T7175] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.551190][ T7175] device bridge_slave_1 entered promiscuous mode [ 186.561785][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.570419][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.585199][ T6808] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.644770][ T6974] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 186.652722][ T6974] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 186.679824][ T6974] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 186.730773][ T6956] device hsr_slave_0 entered promiscuous mode [ 186.779329][ T6956] device hsr_slave_1 entered promiscuous mode [ 186.839496][ T6956] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 186.847218][ T6956] Cannot create hsr debugfs directory [ 186.860830][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.873222][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.882012][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.889227][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.898706][ T7175] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 186.914825][ T7175] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 186.926951][ T6974] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 186.933956][ T6974] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 186.959945][ T6974] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 186.982305][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.013806][ T7175] team0: Port device team_slave_0 added [ 187.061059][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.069768][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.078048][ T2511] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.085258][ T2511] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.107568][ T7175] team0: Port device team_slave_1 added [ 187.114152][ T7211] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.121521][ T7211] bridge0: port 1(bridge_slave_0) entered disabled state [ 187.129328][ T7211] device bridge_slave_0 entered promiscuous mode [ 187.144318][ T7211] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.152593][ T7211] bridge0: port 2(bridge_slave_1) entered disabled state [ 187.163817][ T7211] device bridge_slave_1 entered promiscuous mode [ 187.232092][ T6974] device hsr_slave_0 entered promiscuous mode [ 187.249464][ T6974] device hsr_slave_1 entered promiscuous mode [ 187.289212][ T6974] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 187.296774][ T6974] Cannot create hsr debugfs directory [ 187.314639][ T7211] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.325275][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.363691][ T7175] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 187.370782][ T7175] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 187.396790][ T7175] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 187.411809][ T7175] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 187.418744][ T7175] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 187.444931][ T7175] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 187.457533][ T7211] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.467336][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.487362][ T6808] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 187.498465][ T6808] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 187.513924][ T7321] chnl_net:caif_netlink_parms(): no params data found [ 187.538485][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.549937][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.558384][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.568642][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.577833][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.586380][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.596828][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.605395][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.616478][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.624526][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.657817][ T7211] team0: Port device team_slave_0 added [ 187.673656][ T7211] team0: Port device team_slave_1 added [ 187.820703][ T7175] device hsr_slave_0 entered promiscuous mode [ 187.880457][ T7175] device hsr_slave_1 entered promiscuous mode [ 187.918927][ T7175] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 187.926505][ T7175] Cannot create hsr debugfs directory [ 187.940253][ T7211] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 187.947285][ T7211] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 187.974267][ T7211] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 187.989565][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.996965][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 188.006280][ T6956] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 188.086392][ T7211] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 188.094016][ T7211] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.121834][ T7211] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 188.133612][ T6956] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 188.180852][ T7321] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.187932][ T7321] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.197243][ T7321] device bridge_slave_0 entered promiscuous mode [ 188.232032][ T6956] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 188.260882][ T7321] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.267925][ T7321] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.276395][ T7321] device bridge_slave_1 entered promiscuous mode [ 188.314965][ T6956] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 188.388600][ T6808] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 188.398034][ T7321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 188.461733][ T7211] device hsr_slave_0 entered promiscuous mode [ 188.500127][ T7211] device hsr_slave_1 entered promiscuous mode [ 188.539006][ T7211] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 188.546591][ T7211] Cannot create hsr debugfs directory [ 188.571315][ T7321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 188.632738][ T7321] team0: Port device team_slave_0 added [ 188.643601][ T7321] team0: Port device team_slave_1 added [ 188.702917][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 188.714756][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 188.731877][ T7175] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 188.772666][ T7175] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 188.820978][ T7175] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 188.871020][ T7321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 188.877970][ T7321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 188.904407][ T7321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 188.925794][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 188.936512][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 188.947267][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 188.957569][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 188.970078][ T7175] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 189.022584][ T7321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 189.031731][ T7321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 189.059141][ T7321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 189.163979][ T7321] device hsr_slave_0 entered promiscuous mode [ 189.199147][ T7321] device hsr_slave_1 entered promiscuous mode [ 189.269310][ T7321] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 189.276868][ T7321] Cannot create hsr debugfs directory [ 189.291104][ T6808] device veth0_vlan entered promiscuous mode [ 189.310220][ T6974] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 189.351083][ T6974] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 189.415638][ T6974] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 189.468555][ T6808] device veth1_vlan entered promiscuous mode [ 189.485897][ T6974] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 189.625896][ T7211] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 189.653446][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 189.662155][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 189.671973][ T6808] device veth0_macvtap entered promiscuous mode [ 189.683810][ T6956] 8021q: adding VLAN 0 to HW filter on device bond0 [ 189.697282][ T7211] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 189.774934][ T6808] device veth1_macvtap entered promiscuous mode [ 189.802365][ T7211] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 189.864308][ T7211] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 189.939781][ T6808] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 189.965192][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 189.973984][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 189.982414][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 189.990581][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 189.999744][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 190.008104][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 190.024341][ T6956] 8021q: adding VLAN 0 to HW filter on device team0 [ 190.044689][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 190.054114][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 190.063182][ T2511] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.070290][ T2511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 190.079669][ T6808] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 190.115055][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 190.124167][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 190.137219][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 190.146346][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 190.156446][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 190.165257][ T2509] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.172378][ T2509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 190.181934][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 190.223938][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 190.236298][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 190.251837][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 190.350731][ T6956] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 190.363828][ T6956] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 190.390097][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 190.397809][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 190.407716][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 190.416499][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 190.425554][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 190.434346][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 190.443058][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 190.533661][ T6974] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.579110][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 190.633421][ T6956] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.651620][ T7175] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.667244][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.675618][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.690469][ T7211] 8021q: adding VLAN 0 to HW filter on device bond0 [ 190.706877][ T7321] netdevsim netdevsim5 netdevsim0: renamed from eth0 05:17:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}, r0, 0xffffffffffffffff, r2, 0x9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ax25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000340)={@null, @null, 0x2, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @default]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="3400000010000104539300"/20, @ANYBLOB="ddffffffffffffff140012000c0001006272696467650000040002004a7bcdad645e2b4f436b014dbe92b146588c1b6a238e3c4ad8aaf50c71a900efb4ed6f549d620cab62d981eb6d374923a2b1597449331902ca8bdf6a7b128fe8476d4d6652037756d0ac81399ac0582b151d141fe83ed1d9132ab02d67c1c5acd5789c4893db25c5630cca8a430aeff83dd7770e5485b3580e6c37cdf78ebabc56f554ff14196fa347774c415acdeb046e3cf8a5afb70f638ef519604604bdd8af70dd52c26f6c603b8f3e34d021af63b3cfa8316e16c3"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000010453cd74e4373c79e27fffffff00000000000000000000004900009c057559a672f399b09d6b7343f80da58af498a2dfa0644623f7ed37ddc09dd62c9f3bad4ceac09ae45c27b69a97924bf6722daffaecbf599e4f926a40dc8eac4ede545825a4d45fb293e2f0ed62b4213268a3b938efeabdde57d49091ab8493b080297ded24", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r8, @ANYBLOB], 0x28}}, 0x0) [ 190.731731][ T7321] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 190.793682][ T7321] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 190.845916][ C0] hrtimer: interrupt took 39552 ns [ 190.872824][ T8069] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 190.914202][ T7321] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 190.990078][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 190.997672][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.006227][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 191.015528][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 191.026861][ T8069] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 191.046430][ T6974] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.062916][ T7211] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.070367][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.083300][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.091945][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 191.100432][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 191.119555][ T7175] 8021q: adding VLAN 0 to HW filter on device team0 [ 191.133189][ T8070] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 05:17:44 executing program 0: perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xfc, 0x0, 0x8, 0x5, 0x0, 0x41be, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1fc, 0xc0}, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x8000}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x7, 0xb0, 0x9, 0x800}, 0x10) r1 = dup2(r0, r0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req={0x4, 0x1, 0x80000001, 0x10000}, 0x10) r3 = dup2(r2, r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000100)=0x4) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x3, 0x11, r3, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x30000, 0x3, 0x11, r1, 0x0) [ 191.145751][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.181670][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.193918][ T2511] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.201077][ T2511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.225588][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.241219][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.249735][ T2511] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.256802][ T2511] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.265792][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.274694][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 191.283579][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 191.292404][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.301343][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.310269][ T2511] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.317301][ T2511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.342206][ T6956] device veth0_vlan entered promiscuous mode [ 191.355938][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.364058][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 191.371837][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 191.380853][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.389326][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.397689][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 191.406804][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 191.415816][ T2509] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.422913][ T2509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 191.431566][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.440360][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.448767][ T2509] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.455799][ T2509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.463483][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.473114][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.494060][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 191.503455][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.514572][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 191.523963][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 191.535760][ T2511] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.542860][ T2511] bridge0: port 2(bridge_slave_1) entered forwarding state [ 191.553731][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.562820][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.571573][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.587162][ T6956] device veth1_vlan entered promiscuous mode 05:17:45 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYRES16, @ANYRES64=r1], 0x84}, 0x1, 0x0, 0x0, 0xc002811}, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000000)={0x2, {0x4, 0x4, 0x6, 0x0, 0x0, 0x10}}) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x101101, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x46, 0x600) getsockopt$inet_mreqn(r8, 0x0, 0x23, &(0x7f0000000080)={@initdev, @dev}, &(0x7f0000000280)=0xc) [ 191.644702][ T6956] device veth0_macvtap entered promiscuous mode [ 191.665095][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 191.665614][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 191.682450][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 191.695022][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 191.704236][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 191.714010][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.723944][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 191.733007][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 191.766723][ T6956] device veth1_macvtap entered promiscuous mode [ 191.781319][ T6974] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 191.795201][ T6974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 191.804365][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 191.815834][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 191.824430][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 191.833942][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 191.842778][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 191.851100][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.860311][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.868815][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 191.877224][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 191.886400][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 191.895044][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 191.907238][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 191.915291][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 05:17:45 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x2}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, 0x0, 0x4240a2a0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x30004, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x200) [ 191.956427][ T7175] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 191.967395][ T7175] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 191.986716][ T7321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.002434][ T6956] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 192.020734][ T6956] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.032378][ T6956] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 192.045693][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.056602][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.066138][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.074672][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 192.083502][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 192.092296][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 192.100832][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 192.109319][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 192.117436][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 192.126317][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 192.135064][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 192.142992][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 192.169672][ T6974] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 192.187310][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.195262][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 192.204907][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 05:17:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) shutdown(0xffffffffffffffff, 0x1) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100)='NLBL_CALIPSO\x00') [ 192.214679][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 192.223209][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 192.239255][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 192.246663][ T3841] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 192.291731][ T6956] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 192.302524][ T6956] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 192.315112][ T6956] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 192.327635][ T7321] 8021q: adding VLAN 0 to HW filter on device team0 05:17:45 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[{0x10, 0x110, 0x2}], 0x10}}], 0x2, 0x0) [ 192.340199][ T7211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 192.349637][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 192.358164][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 192.388139][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 192.403011][ T3842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 05:17:46 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x100000001, 0x905082) fallocate(r0, 0x11, 0x0, 0x100007e00) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000000c0)={0x1, [0x0]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_DBG_G_CHIP_INFO(r2, 0xc0c85666, &(0x7f0000000200)={{0x3, @addr=0x83}, "1fcf370e2950d21bd88384c3871ad06ec7652f0217503a7313852b303b26f86f", 0x2}) r3 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x6}, @timestamp, @timestamp], 0x3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0x8, 0x2009, 0x20000000000001, 0x0, 0x0}, 0xd) connect(r3, &(0x7f0000000180)=@ethernet={0x306, @broadcast}, 0x80) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r4, &(0x7f0000000000), &(0x7f0000000100)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000100)={r4, &(0x7f0000000040), 0x0}, 0x20) [ 192.565347][ T7175] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 192.622430][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 192.641338][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 192.662691][ T2511] bridge0: port 1(bridge_slave_0) entered blocking state 05:17:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) r2 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r3) r4 = dup(r3) ioctl$BLKROSET(r4, 0x125d, &(0x7f00000001c0)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r7, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r7, 0x84, 0x70, &(0x7f0000000080)={r9}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000140)={r9, 0x0, 0x6, 0x1, 0x23d2, 0x7f}, &(0x7f0000000180)=0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'vlan1\x00', 0x0}) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000300)={@in={0x2, 0x4e23, @multicast2}, {&(0x7f00000006c0)=""/4096, 0x1000}, &(0x7f0000000200)}, 0xa0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xffffff0f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r10}, @IFLA_HSR_SLAVE2={0x8, 0x2, r1}]}}}]}, 0x40}}, 0x0) [ 192.669853][ T2511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.708771][ T7211] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 192.738220][ T6974] device veth0_vlan entered promiscuous mode [ 192.753514][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 192.766148][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 192.783151][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 192.793660][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 192.803076][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 192.812520][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 192.821931][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 192.848139][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.855287][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.889165][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 192.908861][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 192.943889][ T6974] device veth1_vlan entered promiscuous mode [ 193.037371][ T7321] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 193.048171][ T7321] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 193.062710][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 193.070888][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 193.080092][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.089498][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 193.097907][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.107367][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.116192][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.124712][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.133412][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.142395][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.150782][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.159942][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.168141][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.178078][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.186352][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.245505][ T7175] device veth0_vlan entered promiscuous mode [ 193.274002][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 193.288634][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 193.296055][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 193.306186][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.317398][ T7321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 193.339970][ T6974] device veth0_macvtap entered promiscuous mode [ 193.369134][ T7175] device veth1_vlan entered promiscuous mode [ 193.376281][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.392779][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.402118][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 193.410814][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 193.421260][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 193.430851][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 193.441993][ T6974] device veth1_macvtap entered promiscuous mode [ 193.466417][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 193.474467][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 193.485985][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.505208][ T6974] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 193.516850][ T6974] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 193.526780][ T6974] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 193.537792][ T6974] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 193.549643][ T6974] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 193.573047][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 193.582052][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 193.591647][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 193.608026][ T6974] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 193.620017][ T6974] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 193.630601][ T6974] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 193.641902][ T6974] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 193.654281][ T6974] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 193.663984][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 193.676173][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.684744][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 193.696810][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 193.705941][ T7211] device veth0_vlan entered promiscuous mode [ 193.723030][ T7175] device veth0_macvtap entered promiscuous mode [ 193.732296][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.740584][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.748082][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 193.757216][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 193.767080][ T2509] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 193.793974][ T7175] device veth1_macvtap entered promiscuous mode [ 193.806423][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 193.815174][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 193.825902][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.837105][ T7211] device veth1_vlan entered promiscuous mode [ 194.007303][ T7321] device veth0_vlan entered promiscuous mode [ 194.020970][ T7175] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 194.037742][ T7175] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.057637][ T7175] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 194.076883][ T7175] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.086861][ T7175] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 05:17:47 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x2020}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f0000000180), r3}}, 0x18) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000100)={0x2, "c69cb76b5c2580b624d79480746340912b60bb3b09ba4a040640c2d4163b7171", 0x1, 0xfff, 0x1, 0x4}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000380)) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r5, 0x10e, 0x8, &(0x7f00000000c0)=0x1, 0x4) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b00000005000000e80300000000000028020000ffffffff28020000280200005003000050030000ffffff", @ANYBLOB, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000a800000000000000000000000000000000000000000038004d4153515545524144450000000000000000000000000000000000000000010000001e000000e0000002e00000014e2001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000d800000000000000000000000000000000000000000030006164647274797065000000000000000000000000000000000000000000000004000001000000000000000000000038004e45544d4150000000000000000000000000000000000000000000000000010000001c00000000000000ffffffff4e204e2300000000ffffffffac1414bbffffff00000000ff767863616e31000000000000000000007663616e300000000000000000000000ff000000000000000000000000000000ff00000000000000000000000000000000000218000000007000a800000000000000000000000000000000000000000038004e45544d41500000000000000000000000000000000000000000000000000100000028000000ac141413000000000010a2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00028010000000000000000000000000000fc000000000030006970636f6d70000000000000000000000000000000000000000000000000000004d5000004d6010000000000000050006d756c7469706f727400000000000000000000000000000000000000000100044e234e214e244e214e204e224e234e224e204e244e224e214e224e224e2400010000010001010101000001000100380052454449524543540000000000000000000000000000000000000000000001000000180000007f00000100000000001c0068000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028"], 0x3) [ 194.148540][ T7175] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.181920][ T7175] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 194.207809][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 194.216709][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 194.234672][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 194.244918][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 194.255486][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 194.265470][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 194.309979][ T7175] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.336148][ T7175] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.346174][ T7175] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.362989][ T7175] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.375052][ T7175] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.391386][ T7175] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.405284][ T7175] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 194.426775][ T7321] device veth1_vlan entered promiscuous mode [ 194.437027][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 194.446023][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 194.454239][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 194.464257][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 194.472995][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 194.494272][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 194.495789][ T8147] hub 9-0:1.0: USB hub found [ 194.505858][ T7211] device veth0_macvtap entered promiscuous mode [ 194.514814][ T8147] hub 9-0:1.0: 8 ports detected [ 194.532059][ T7211] device veth1_macvtap entered promiscuous mode [ 194.680520][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 194.689321][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 194.697299][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 194.705845][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 194.715445][ T7321] device veth0_macvtap entered promiscuous mode [ 194.724021][ T7211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 194.734528][ T7211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.745099][ T7211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 194.755792][ T7211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.767501][ T7211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 194.778124][ T7211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.788197][ T7211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 194.798857][ T7211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.810405][ T7211] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 194.866418][ T7321] device veth1_macvtap entered promiscuous mode [ 194.880829][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 194.893567][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 194.919135][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 194.939000][ T2511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 194.950624][ T7211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.967507][ T7211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 194.983352][ T7211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 194.995441][ T7211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.006495][ T7211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 195.017437][ T7211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.027727][ T7211] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 195.038897][ T7211] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.050848][ T7211] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 195.068023][ T7321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 195.081141][ T7321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.092139][ T7321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 195.102883][ T7321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.112804][ T7321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 195.123410][ T7321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.133288][ T7321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 195.143799][ T7321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.154307][ T7321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 195.165200][ T7321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.176731][ T7321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 195.185565][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 195.198110][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 195.207199][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 195.219392][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 05:17:48 executing program 3: sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c"], 0x1c}}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r3, @ANYBLOB="0174000000000000240012000c000100627269646765000e140002000800070000000000080027"], 0x44}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5148}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_ROUTER={0x5, 0x16, 0x1}]}}}]}, 0x3c}}, 0x0) [ 195.331344][ T7321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 195.358372][ T7321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.368202][ T7321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 195.379396][ T7321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.389293][ T7321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 195.401019][ T7321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.412985][ T7321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 195.424335][ T7321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.434568][ T7321] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 195.445057][ T7321] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 195.456083][ T7321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 195.471528][ T8159] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 195.481403][ T8159] netlink: 'syz-executor.3': attribute type 39 has an invalid length. [ 195.490456][ T3835] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 195.500767][ T3835] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 195.551155][ T8163] netlink: 'syz-executor.3': attribute type 7 has an invalid length. [ 195.562319][ T8163] netlink: 'syz-executor.3': attribute type 39 has an invalid length. 05:17:49 executing program 1: r0 = socket$inet(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000000)=0xfffffffd, 0x4) sendmsg(r0, &(0x7f000087dfc8)={&(0x7f00000000c0)=@nfc={0x27, 0x7}, 0x80, 0x0}, 0x0) 05:17:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000340)=0x4) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x1, @local, 'veth0_to_bond\x00'}}, 0x1e) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYRES64, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}, 0x1, 0x0, 0x0, 0x608c0}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_IFNAME={0x14, 0x3, 'xfrm0\x00'}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'lo\x00', r7}) accept4(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000040)=0x80, 0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r10) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f00000000c0)={r10}) ioctl$sock_SIOCGIFINDEX(r0, 0x8937, &(0x7f0000000080)={'veth0_to_bond\x00', r8}) 05:17:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000002c0)='\x00', 0x1, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)='F', 0x1, r3) keyctl$read(0xb, r4, &(0x7f00000024c0)=""/4105, 0x1009) r5 = request_key(&(0x7f00000005c0)='big_key\x00', &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000680)='poly1305\x00', r4) r6 = add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f00000005c0), 0x0, r5) keyctl$dh_compute(0x17, &(0x7f0000000300)={r2, r6, r6}, 0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={'poly1305\x00'}}) keyctl$update(0x2, r6, 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000200)='jfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="726573697a653d30783030303030308ff9eb88f3e2c730306cfa7cfc291c033d1f24b44183303030"]) 05:17:49 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r1) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x2, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r2, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000037c0)=ANY=[@ANYBLOB="2c0000001000010804000000020000000000005f", @ANYRES32=r4, @ANYBLOB="00000000000d0d000800168004000180040014"], 0x2c}}, 0x0) socket$kcm(0x10, 0x0, 0x10) 05:17:49 executing program 3: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000400)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e04676cc093ea0ffa364b7ec5a96664ce29245ca2a115dcbb1b07c486166c4cdbc909220b5bf3c52793f6303a30f0f478a2d5a75bd3dc28ceb719c24e043d0e49f2e5565a0b504c9d98d3640eb6eaee403e721202f2f044a0f51dc04be3d94605ac322cfea1a8defdd51adb79055d6a5ad67ed1ae1c39da7137a69c1b75493002a39bde2583d56e87b232de6a", 0xb5) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40, 0x113) getsockname$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0)=0x200, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000100)='\x00A6\xa9\xbbc\xb0\xf6\xda\x0e\xba\xe5\x91\x8f\xfb\x8dR\xac\x1f\xe9qB\xc7\x882\xb8\xf9\x1f9\xa7\xd1\xbb|\xceL\x81\xb3n\x0e\xa5\xde\xe1K\xf4\xc8.r\xff(\xcc\a,\n\x91_\xd5\xf0\xfe\xecz\t\xd2\xd0F\xe5\xba\xb9M\xd9\x8cWJ\xbc?\xda\x99\x1c_\xed,\frL\xf7\v\xafG\xa0\xf7\xd2\xdfU:\xf3\xd3\x8f\n\xaf]\xd0\xdd\xaat>\xc3.\x0e`\x85=\xd5#\xe7\x00\xdd\xb8\x9fC\x13?\xe4P\x02z\r\xab\x03\x83\x8460q\xb4\xe6@>\xd9;\"\x0f\xfd\x19\xa4\xb0\xe5z\xb6:P:\xdc\xbcH\xd3rq\xc4%\xe9\xb9\xa6E\xf4\x15\x7f\r\xd2\x1c\xca\xf58\x1e\xc6\xfb\xb5\xbf\xae\x82R=\xbb\xc6t\\%\'GK\x02\x98\xd3\xfe\xceB\'\x9b\xf6\xee\xb8.\xb3\xad\x9d\xbe\xac^E\xec\xbd\x8b_\xe0\xa2h\xa9}\'\xce1') 05:17:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x20, 0x0, 0x200007c, 0x5, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc, 0xfd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='htcp\x00', 0x5) sendto$inet(r0, &(0x7f00000001c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67a683059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x4d, 0x4004005, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x70, &(0x7f0000000080)={r5}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r5, 0x1}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={r6, 0xb6}, 0x8) 05:17:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000340)=0x4) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x1, @local, 'veth0_to_bond\x00'}}, 0x1e) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYRES64, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}, 0x1, 0x0, 0x0, 0x608c0}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_IFNAME={0x14, 0x3, 'xfrm0\x00'}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'lo\x00', r7}) accept4(r0, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000040)=0x80, 0x800) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r10) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x89e1, &(0x7f00000000c0)={r10}) ioctl$sock_SIOCGIFINDEX(r0, 0x8937, &(0x7f0000000080)={'veth0_to_bond\x00', r8}) [ 196.067353][ T8193] jfs: Unrecognized mount option "resize=0x000000ùëˆóâÇ00lú|ü)=$´Aƒ000" or missing value [ 196.088040][ T8196] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 05:17:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r1, 0x65, 0x3, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000040)) dup2(r0, r1) socket$inet(0x2, 0x0, 0x0) 05:17:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000330774001800090000000001a381", @ANYRES32=0x0, @ANYBLOB="7fff00021f7c00001c0012000b0001006d616373656300b766e10b00020005000600010000000a0005403a00000000000500084acd"], 0x50}}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000000)={{0x1, 0x0, @identifier="2b26d378ba1abf602b27348254fb0ffa"}}) 05:17:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f0000000100)=""/231) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="3c00000010001fff0000268f1c872d2b01000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 05:17:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000800)="480000001500197f09004b0101048c590188ffffcf5d3474bc9240e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee20600d4ff5bffff00c7e5ed", 0x48}], 0x1) 05:17:49 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000040)) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r3 = dup(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f0000000440)={0x6, "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"}) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@dev, @in=@local, 0x0, 0x5, 0x0, 0x0, 0xa}, {0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x5}, {0x0, 0x9}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x4d5, 0x33}, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x0, 0x0, 0x3, 0x4, 0x200}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x1f4) [ 196.355676][ T8209] Unknown ioctl 8834 [ 196.364754][ T8212] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 196.394563][ T8212] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 196.422768][ T8218] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 05:17:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000000c0)=""/165, 0xa5}], 0x1, 0x0) r1 = semget$private(0x0, 0x2000000010a, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000300)={0xa30000, 0x0, 0x3f, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)={0x9b0961, 0x7, [], @value64=0x2}}) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000340), 0x4) semop(r1, &(0x7f0000000200)=[{0x0, 0x0, 0x1000}], 0x1) semctl$IPC_RMID(r1, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000100)={0x0, 0x0, 0x1, 0x0, 0x0, "0192070000ff2f1037bfbf6334b39014200100"}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000200006802000000004000007a40000080000000000000006d5ebe5a0000070053ef", 0x4db, 0x400}], 0x4810, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000180)={0x2e, 0x23, 0x7, 0x17, 0x5, 0xaf, 0x1, 0x8e, 0xffffffffffffffff}) 05:17:50 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x4000, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x2d, &(0x7f00000000c0)=""/6, &(0x7f0000000140)=0x6) close(r0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x32}, 0xc) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) [ 196.578452][ T8209] Unknown ioctl 8834 [ 196.624959][ T8218] device vxlan0 entered promiscuous mode [ 196.723333][ T8235] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 196.756700][ T8218] syz-executor.1 (8218) used greatest stack depth: 23328 bytes left 05:17:50 executing program 3: sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) setrlimit(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41c1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x975, 0x2, @perf_bp, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x20, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000140)=0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x7, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x6}, 0x8) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000180)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r1) 05:17:50 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x9) fsetxattr$security_evm(r1, &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000200)=@sha1={0x1, "562ee049904f925c7cd7948d370bdfea8068ca94"}, 0x15, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xffffffffffffffff) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x14420, &(0x7f0000000040)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB="f4d3d658d5f6a9031f6f"]) r6 = socket$inet(0x2, 0x0, 0xfffffffa) ioctl$sock_inet_tcp_SIOCOUTQ(r6, 0x5411, &(0x7f0000000140)) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'security.', '\x00'}, &(0x7f00000000c0)=""/95, 0x5f) [ 196.771721][ T8229] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 05:17:50 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB='#! ./file0'], 0x194) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom$x25(r3, &(0x7f0000000000)=""/56, 0x38, 0x2022, 0x0, 0x54) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000000c0)=0x0) ptrace$setopts(0x4200, r4, 0x4, 0x100075) 05:17:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$AUDIT_USER_TTY(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x22000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x464, 0x200, 0x70bd2b, 0x25dfdbfb, "aff2b5c7965edff080c9", ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc0}, 0x800) socket$tipc(0x1e, 0x5, 0x0) get_robust_list(0x0, &(0x7f0000000280)=0x0, &(0x7f0000000240)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x14}) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x15) [ 196.928274][ T8241] hugetlbfs: Bad value for 'gid' [ 196.984332][ T8247] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 197.107859][ T29] audit: type=1800 audit(1593494270.682:2): pid=8232 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed comm="syz-executor.5" name="bus" dev="sda1" ino=15772 res=0 05:17:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) syz_emit_ethernet(0x1e, &(0x7f0000000000)=ANY=[@ANYBLOB="d038f6b9e1fc008000070000000000c0040000008adf4863ec53bd980000"], 0x0) 05:17:50 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x4000, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x2d, &(0x7f00000000c0)=""/6, &(0x7f0000000140)=0x6) close(r0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x32}, 0xc) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 05:17:50 executing program 2: socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYRES64=r2, @ANYRESDEC=r4], 0x98}}, 0x0) 05:17:50 executing program 0: syz_open_dev$tty20(0xc, 0x4, 0x0) syz_emit_ethernet(0x34, &(0x7f0000000100)={@broadcast, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @broadcast}, {0x0, 0x88be, 0x12, 0x0, @gue={{0x2}, "9063"}}}}}}, 0x0) 05:17:51 executing program 2: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000)='NLBL_CALIPSO\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8800000010003b0e000200"/20, @ANYRES32=0x0, @ANYBLOB="03000000000000fc08000a00", @ANYRES32=0x6, @ANYBLOB="600012000c000100697036746e6c00005000020014000300ff01"], 0x88}, 0x1, 0x0, 0x0, 0x24000800}, 0x0) 05:17:51 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) recvfrom$x25(r1, 0x0, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x54, &(0x7f0000000240)=[@in6={0xa, 0x4e22, 0xffffffff, @mcast2, 0x3ff}, @in6={0xa, 0x4e20, 0x4, @ipv4={[], [], @private=0xa010100}, 0x1}, @in6={0xa, 0x4e20, 0x6, @empty}]}, &(0x7f0000000140)=0x10) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b800000019000100000006005b000000ff010000000000000000000000000001e000000100000000800000000000000000000000000000000a0001000000002e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000cede6299eb6284070000000000fd85d16e791a2daa2586f6fded0000000005000000000000000000d94bfeadbfce0d4ed61c01bb3c42000000ea000000002655356f5400fbfa0000000000000500000000000000000000000000000000000000ee0100000001"], 0xb8}}, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x60080, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="139b0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) [ 197.584380][ T8306] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. [ 197.747558][ T8331] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. [ 197.879582][ T8329] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 05:17:51 executing program 5: perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x4000, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x2d, &(0x7f00000000c0)=""/6, &(0x7f0000000140)=0x6) close(r0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000ac0)=@sack_info={0x0, 0x0, 0x32}, 0xc) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) [ 198.035695][ T8329] device bond1 entered promiscuous mode [ 198.096251][ T8329] 8021q: adding VLAN 0 to HW filter on device bond1 05:17:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x2, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) 05:17:51 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000040)="9f8194be5ace602f096d07ff00cd66299667b70536342623b372d82fefa01f9a2d83297f99b4e597f4e9fad324868e83f474d0c35449712f00c51c638e6aea4a8dee825286b31a260e60482bb0b4179b3e64", 0xff7c}], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x100000001, 0x905082) fallocate(r6, 0x11, 0x0, 0x100007e00) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0205649, &(0x7f0000000100)={0x980000, 0x9, 0xfff, r6, 0x0, &(0x7f00000000c0)={0xa10001, 0x200, [], @p_u16=&(0x7f0000000000)=0xf588}}) ioctl$KVM_SET_IRQCHIP(r7, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x3e000, 0x2, 0x9, 0x1, 0x0, [{0x5, 0x80, 0x9, [], 0x4}, {0xf, 0x3, 0x8, [], 0x9}, {0x1, 0x20, 0x20, [], 0x6}, {0xc4, 0x9, 0x0, [], 0x3f}, {0x3, 0xff, 0x8, [], 0x2}, {0x41, 0x7, 0x1f, [], 0x3}, {0x9, 0x9, 0x9, [], 0x7}, {0x0, 0x2, 0xf0}, {0x3, 0x9, 0x69, [], 0x2}, {0x80, 0x4, 0x7}, {0x7f, 0x20, 0x4}, {0x40, 0x5, 0x8d, [], 0xf9}, {0x20, 0x0, 0x0, [], 0x1}, {0x6, 0x8, 0x31, [], 0x7f}, {0x5, 0x3f, 0x8, [], 0x1}, {0x5, 0x5, 0x4, [], 0x68}, {0x40, 0x9f, 0x80, [], 0x20}, {0x9, 0x9, 0x7f}, {0xff, 0x2, 0x8, [], 0x6}, {0x7f, 0x0, 0x0, [], 0x3}, {0x5, 0x3, 0x0, [], 0xa4}, {0x2, 0x5, 0x3, [], 0x76}, {0x1, 0x0, 0x1, [], 0x5}, {0x8, 0x3f, 0x8, [], 0x7f}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 198.282697][ T8438] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:17:51 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bsg\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') r6 = socket$tipc(0x1e, 0x2, 0x0) write$midi(0xffffffffffffffff, &(0x7f00000003c0)="207df128", 0x4) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'virt_wifi0\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="1100000000000d0000000200000008000300", @ANYRES32=r7, @ANYBLOB="14df02"], 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_INTERFACE(r3, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r5, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x10000, 0x2}}]}, 0x28}, 0x1, 0x0, 0x0, 0x8094}, 0x40000) r8 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r9 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400400, 0x0) r10 = socket$can_raw(0x1d, 0x3, 0x1) dup2(r9, r10) getsockname$packet(r8, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_RESEND_IGMP={0x8}, @IFLA_BOND_MIN_LINKS={0x8, 0x12, 0xfff}]}}}, @IFLA_MASTER={0x8, 0xa, r11}]}, 0x4c}, 0x1, 0x4000}, 0x0) set_tid_address(&(0x7f0000000380)) 05:17:51 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @remote}}, {{0xa, 0x0, 0x0, @private0, 0x4700}}}, 0x108) clock_gettime(0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_RESETEP(r3, 0x80045503, &(0x7f00000001c0)={0x3, 0x1}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) [ 198.384700][ T8454] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 198.465342][ T8454] bond2 (unregistering): Released all slaves [ 198.655805][ T8497] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 198.667836][ T8484] EXT4-fs (loop5): Unrecognized mount option "" or missing value 05:17:52 executing program 3: unshare(0x40040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x180000f, 0x10010, 0xffffffffffffffff, 0x7d979000) write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) r0 = socket$inet(0x2, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @remote}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={'lo\x00', {0x2, 0x0, @local}}) 05:17:52 executing program 1: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) dup2(r1, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x80001, &(0x7f00000000c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@uid_gt={'uid>', r4}}]}}) mount$fuse(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="fd01"]) 05:17:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, [], [{0x0, 0x6886e2db, 0x0, 0x9, 0x1, 0xff}, {0x9, 0x5, 0xff, 0x7fffffff, 0x27c1, 0x8}], [[], [], []]}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x531, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) [ 198.711630][ T8484] EXT4-fs (loop5): failed to parse options in superblock:  [ 198.772843][ T8484] EXT4-fs (loop5): feature flags set on rev 0 fs, running e2fsck is recommended [ 198.785476][ T8497] bond2 (unregistering): Released all slaves [ 198.822858][ T8484] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 198.874462][ T8595] fuse: Bad value for 'group_id' [ 198.885495][ T8484] EXT4-fs (loop5): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 05:17:52 executing program 2: sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="d84a38", @ANYRES16, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564"], 0x3}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000780)={0x0}}, 0x0) write(0xffffffffffffffff, &(0x7f00000003c0)="96", 0x1) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x4000, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f00000001c0), 0x40000000, &(0x7f0000000400)) select(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x23, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100686cca8000000000000200000002000000004000007a40000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4807, 0x0) [ 198.924102][ T8591] IPVS: ftp: loaded support on port[0] = 21 [ 198.935643][ T8484] EXT4-fs (loop5): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 198.946072][ T8631] fuse: Bad value for 'group_id' [ 199.003363][ T8484] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=128, mo=a802c01c, mo2=0002] [ 199.040133][ T8484] System zones: 0-7 [ 199.054801][ T8484] EXT4-fs (loop5): mounted filesystem without journal. Opts: ; ,errors=continue [ 199.111372][ T8637] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 199.142347][ T8637] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 05:17:52 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="73bc5b5ccc6143accd1d948524aee03253146272cb2bf5d65d6d61636b66737472616e73737472616e736d"]) [ 199.174887][ T8637] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 199.204784][ T8637] EXT4-fs (loop2): no journal found [ 199.336612][ T8647] tmpfs: Unknown parameter 's¼[\ÌaC¬Í”…$®à2SbrË+õÖ]mackfstransstransm' 05:17:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="680000003000ffff00000000000000000000001354000100500001000b2001006d69727265640000240002800c000200"/72, @ANYRES32=0x0, @ANYBLOB="040006000c00070000000000000000000c0008000000000000000000"], 0x68}}, 0x0) [ 199.416418][ T8647] tmpfs: Unknown parameter 's¼[\ÌaC¬Í”…$®à2SbrË+õÖ]mackfstransstransm' 05:17:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000040)={{0x3c, @broadcast, 0x4e23, 0x0, 'sed\x00', 0x14, 0x2, 0x5}, {@multicast2, 0x4e21, 0x1, 0x3, 0x5, 0x5}}, 0x44) syz_usb_connect$uac1(0x1, 0x71, &(0x7f0000000100)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f00000003c0)={0x0, 0x0, 0xf, &(0x7f00000001c0)=ANY=[@ANYBLOB="050f03000000000004000000000000"], 0x3, [{0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}]}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$rose(r3, &(0x7f0000000000)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @null}, 0x1c) 05:17:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0xd9, 0x7, 0x6, 0x21, 0x0, 0x7, 0x4094, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x1, 0x7}, 0x0, 0x0, 0x2, 0x2, 0x4, 0x4, 0x5}, 0xffffffffffffffff, 0xb, r1, 0x5) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, r2, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x7fffdf00f000, 0xa, 0x10, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) r3 = getpid() sched_setscheduler(r3, 0x0, &(0x7f0000000380)) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, 0x0) r4 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r4, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r4, 0x400000001ffffffd) mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r6 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg(r6, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 199.503597][ T8591] IPVS: ftp: loaded support on port[0] = 21 [ 199.532630][ T8678] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.1'. 05:17:53 executing program 1: socket(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) unshare(0x600) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000200040010000400014004000000", 0x58}], 0x1) [ 199.861892][ T8690] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 199.903776][ T8690] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 199.918212][ T3835] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 199.974380][ T8690] EXT4-fs (loop2): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 199.984856][ T8690] EXT4-fs (loop2): no journal found 05:17:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000001c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x3b, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f00000001c0)="600084e002000a0000000001000000c98f13", 0x12, 0x400}, {&(0x7f0000000880)="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", 0x309, 0x34f9}], 0x0, 0x0) acct(&(0x7f0000000480)='./file0\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r3, 0xc0845658, &(0x7f0000000540)={0x0, @bt={0x6, 0x8, 0x0, 0x1, 0x73, 0x6, 0x4, 0x9, 0x4c, 0x7, 0x5dd, 0x2, 0x7fffffff, 0x4a2e, 0x19, 0x8, {0x80, 0xe8bb}, 0x9, 0x5}}) umount2(&(0x7f0000000500)='./file0\x00', 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfb}, 0xc) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000003c0)={0x4c, 0x0, &(0x7f0000000280)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000400)=ANY=[@ANYBLOB="852a62770b00000000000000000000000000852a68770001000001000000000000000000000085c76314d42fc6f2f8000000000000000000000080000000000000000000"], &(0x7f0000000240)={0x0, 0x20, 0x95}}, 0x1000}], 0x2c, 0x0, &(0x7f0000000380)="9ef312fcd349d7cc0a90847ca6cb0817d4459a52566e4663f9dffbb52f5d22f2ffc2b2de393afbd1b7691a18"}) 05:17:53 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x12c}}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000340)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="020028bd7000fedbdf250600000008000700e0000002150001e5c370729b632f706172747c8d7e0fdee2e95dfef1a2f1494b6974696f6e7300000000080002000700000006000b0029009e818b98588dd69e1d92bbec237f64a2d992306965"], 0x44}, 0x1, 0x0, 0x0, 0x20040050}, 0x4081) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r3, 0x800, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x18}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x8}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 05:17:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x2) ioctl$TIOCSETD(r0, 0x5412, &(0x7f0000000000)) [ 200.169953][ T8700] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 200.277857][ T29] audit: type=1800 audit(1593494273.853:3): pid=8704 uid=0 auid=0 ses=4 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=15756 res=0 [ 200.286227][ T8708] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 200.318520][ T3835] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 200.328203][ T3835] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 200.338820][ T3835] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 200.390393][ T8700] Process accounting resumed [ 200.429240][ T8700] minix_free_inode: bit 1 already cleared [ 200.585424][ T8704] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 200.588155][ T3835] usb 1-1: string descriptor 0 read error: -22 [ 200.618215][ T3835] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 200.627381][ T3835] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 200.684265][ T8708] Process accounting resumed [ 200.709989][ T6974] minix_free_inode: bit 1 already cleared [ 200.710551][ T3835] usb 1-1: 0:2 : does not exist [ 200.915233][ T3839] usb 1-1: USB disconnect, device number 2 [ 201.708051][ T3842] usb 1-1: new low-speed USB device number 3 using dummy_hcd [ 202.108086][ T3842] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 202.117076][ T3842] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 202.127565][ T3842] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 05:17:55 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0x5, 0x1d, 0xcc, 0x3, 0x0, 0x1}, 0x74) bpf$MAP_UPDATE_BATCH(0x1b, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480), 0x0, 0x3, r0}, 0x38) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000040)=0xc1eb, 0x4) 05:17:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x80}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000180)="f5b90fbf8569fd74ed7ddb2fea19", 0xe, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$revoke(0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_MAP_BUFS(r3, 0xc0186419, &(0x7f0000000000)={0x5, &(0x7f0000000480)=""/4096, &(0x7f0000000340)=[{0x40, 0xa0, 0x80000000, &(0x7f0000001480)=""/160}, {0x1000, 0xe4, 0xc3, &(0x7f0000001540)=""/228}, {0x9, 0x1000, 0x81, &(0x7f0000001640)=""/4096}, {0x8000, 0x8d, 0x9d, &(0x7f0000002640)=""/141}, {0x3f, 0x71, 0x6, &(0x7f0000000280)=""/113}]}) add_key$user(&(0x7f0000000040)='user\x00', 0x0, &(0x7f0000000240)="c0372354e7f48fc397da175c0898f7326e91ef2c6ea77585942e3475267928533d5152ccaa1b", 0x26, 0x0) 05:17:55 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x11d) close(r0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000e40)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000e80), &(0x7f0000000ec0)=0x4) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000840)=[&(0x7f0000000340)='gcB\xc6+\xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fp\\P\xcf\xee<\\C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xae\xa0\"(\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6z\x00!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x19f\xd3\t\xf8\x96\'\x8c{\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac\xca\xc2-\xfc\xe8\xc3qAt\b\x94\xee\x9e4\x85\xd0\xfe\x9a\x80\xa0\x15\xee+\xc0\x17\xbfE\x15\xfdZ\xce\x954v\x8a\xfb\xde\xaal\xf4\x82b?\xabS\xe4\xe2\xe1\xd83\x17\xfe\xf8~\x04\xb6\x11\xc4K3\x82\x127\xf7\xc7\x06\x177\x8bWF\xb21\xce\xc7\x19|\x9f\xe87\x80\xbc\xac\xb6;\xcc\xafr\xbd\x90\xde9\x0e\xda\x05\x86\xf0i\xf4{\xbf\x82#\xfd9\xdc\xa7\x17\xf1\x12\xea1K\xc9\xe1\xef\xc6\xcd\xfdv#0U\xd2\t\x14\x10\xe6\xfc\xba\xa1\xac=\xfd\xd7\xc5\xff\x18', &(0x7f00000031c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\xda@\xc7-\x93\xbc4.C\f\x193\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acH', &(0x7f0000001440)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\x00\x00Jh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\xfd\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f00000008c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a', &(0x7f0000000f40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\xfd\xcf\xfdY\\d\x03(\x89\xe7\xe1\xcf\xa4m3SQc\xbaG\xcd\xce\xf5o@\xfdi\xd1w~\xc8\xb9\\\a\xeba\x18\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\x87\x02\xcd\xa4\xc0\xa17\x92]_\xa2>\xbb\xc8?\x98\xa6+\xcf^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\x9c|0\xdd\x7f\x85^\xdf\xe0\x84\x17\xe5\xc05\x8av\x00'/614, &(0x7f0000003600)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\xda@\xc7-\x93\xbc4.C\f\x193\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xb2\xea\br\xfb\xdc\'\xb8\xdbh\x02|\xacW\xd5\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xe36\xa1\xd3\xb1o\x7f0:}\xad\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf', &(0x7f0000000ac0)='gcB\xc6+\xbf\xcc_\x81\n\xd5\xb9\x93L9\x87\x98K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x16\xf0\xf9s\x9af$\xb3x\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xcex\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9A\x1brx\x87\xa16\x93\xd5fap\x83k\xf6O\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\xfd\xcf\xfdY\\d\x03(\x89\xe7\xe1\xcf\xa4m3SQc\xbaG\xcd\xce\xf5o@\xfdi\xd1w~\xc8\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\xa6+\xcf^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\xe7\xc7X\xeaf\x9c|0\xdd\x7f\x85^\xdf\x00'/624, &(0x7f0000001f40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\xfd\xcf\xfdY\\d\x03(\x89\xe7\xe1\xcf\xa4m3SQc\xbaG\xcd\xce\xf5o@\xfdi\xd1w~\xc8\xb9\\\a\xeba\x18\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\x87\x02\xcd\xa4\xc0\xa17\x92]_\xa2>\xbb\xc8?\x98\xa6+\xcf^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\x9c|0\xdd\x7f\x85^\xdf\xe0\x84\x17\xe5\xc05\x8av\x00']) 05:17:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1f}, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x2, 0x10000012, 0x3fc, 0x3, 0x0, 0x0, 0x7, 0xee0c}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0x5, 0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0xd4c) clone(0x41970183, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 05:17:55 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x118) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0xd, &(0x7f0000000080)=@raw=[@map={0x18, 0x7, 0x1, 0x0, r0}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x7f}, @map_val={0x18, 0x4, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x2}, @generic={0x3f, 0x9, 0x5, 0x31, 0xb456}, @map={0x18, 0x0, 0x1, 0x0, r6}, @map={0x18, 0x8, 0x1, 0x0, r8}, @call={0x85, 0x0, 0x0, 0x32}, @exit], &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xfffffffd}, 0x8, 0x10, &(0x7f0000000000)={0x4, 0xfffffffe}, 0x10}, 0x78) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@ipv4={[], [], @private=0xa010100}, @dev={0xfe, 0x80, [], 0xe}, @dev={0xfe, 0x80, [], 0xd}, 0x20, 0x6, 0xfffa, 0x0, 0x2532, 0x2000008}) 05:17:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e22, 0x6, @local, 0x8f}, {0xa, 0x4e20, 0x80, @remote, 0x1}, 0x81, [0x0, 0x1ff, 0x80000001, 0x4, 0x8, 0x6a90, 0x5, 0x4]}, 0x5c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2$9p(&(0x7f0000000040), 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000001340)='9p\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f1f", @ANYRESHEX=r2, @ANYBLOB="2c8166ee79f06e54a96d63c68d0a57a5646ea13d", @ANYRESHEX=r3, @ANYBLOB="2c63616368657461673de69b040c0ad81c54c9060ae1ea83cefa5426024794227fabd6aaa2636f"]) [ 202.368368][ T3842] usb 1-1: string descriptor 0 read error: -22 [ 202.374834][ T3842] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 202.419244][ T3842] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 202.426644][ T70] tipc: TX() has been purged, node left! [ 202.434108][ T8776] 9pnet: Insufficient options for proto=fd [ 202.462373][ T8777] 9pnet: Insufficient options for proto=fd [ 202.506117][ T3842] usb 1-1: 0:2 : does not exist 05:17:56 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="c800000000030904000000000000000000000000240001801400018000ffffffff08000200ac1414000c00028005000100000000004c001080300002630000007f0800e83f4ab0031d0800024000000001080008007fffffff080003400071d72cd2638607c5000006080001400000997e88a80240000003e308000240000000083c0002802c00018014000300fc02000000000000000000000000000014000400ff0100000000000000000000000000010c0002800500010000000000080007"], 0xc8}}, 0x0) 05:17:56 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) quotactl(0x40000080000100, 0x0, 0x0, 0x0) 05:17:56 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000001c0), 0x0) r1 = dup(0xffffffffffffffff) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@get={0x1, &(0x7f0000000400)=""/127}) socket(0x11, 0x800000003, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200)=0x20200200, 0x2f) r2 = socket$inet(0x2, 0x5, 0x7) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x4e20, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x70, &(0x7f0000000080)={r5}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=r5, &(0x7f0000000040)=0x4) clone(0xe1004d7c, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000000680)=[{0x0}, {0x0}, {&(0x7f0000000500)=""/198, 0xc6}, {0x0}], 0x4}, 0x0) 05:17:56 executing program 5: perf_event_open(&(0x7f0000001340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control\x00', 0x80, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/344], 0x158) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x1ff, 0x4000000, 0x4, 0x4, 0x4}, 0x14) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x33}, 0x0, @in6=@empty, 0x0, 0x1, 0x0, 0x6}}, 0xe8) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="1400000025000535d25a80648c63940d0424fc6010", 0x15}], 0x1}, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000000)={0x4000000000000000, 0x0, 0x8, 0x0, 0xf}) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="1400000025000535d25a80648c63940d0424fc6010", 0x15}], 0x1}, 0x0) r5 = dup3(0xffffffffffffffff, r4, 0x0) r6 = dup2(r3, r4) ioctl$sock_netrom_SIOCDELRT(r5, 0x890c, &(0x7f0000000440)={0x0, @bcast, @rose={'rose', 0x0}, 0x1, 'syz0\x00', @bcast, 0x4, 0x1, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r7 = syz_genetlink_get_family_id$smc(&(0x7f0000000400)='SMC_PNETID\x00') sendmsg$SMC_PNETID_DEL(r6, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="94000000", @ANYRES16=r7, @ANYBLOB="000128bd7000ffdbdf25030000000900030073797a32000000000900030073797a32000000000900010073797a30000000001400020076657468315f746f5f8f4fea6e30957465616d0000000900030073797a320000000005000400010000001400020076657468305f766972745f7769666900140002006272696467655f736c6176655f3100000900010073797a3100000000"], 0x94}, 0x1, 0x0, 0x0, 0x44}, 0x800) r8 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS32(r8, 0xc0245720, &(0x7f0000000080)={0x1}) 05:17:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20000, 0x0) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000040)='\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff) listen(r0, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x35}}, 0xe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r5) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r5, 0x8982, &(0x7f00000001c0)={0x1, 'netdevsim0\x00', {}, 0x3}) r6 = openat(r4, &(0x7f00000000c0)='./file0\x00', 0x0, 0x80) ioctl$RTC_UIE_OFF(r6, 0x7004) r7 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r7, &(0x7f0000001500), 0x588, 0x0) 05:17:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x100000001, 0x905082) fallocate(r6, 0x11, 0x0, 0x100007e00) ioctl$VIDIOC_S_EXT_CTRLS(r5, 0xc0205648, &(0x7f0000000240)={0xa10000, 0x40, 0x9, r6, 0x0, &(0x7f00000001c0)={0x9a091a, 0x8, [], @p_u16=&(0x7f0000000180)=0x585b}}) ioctl$SNDCTL_DSP_STEREO(r7, 0xc0045003, &(0x7f0000000280)=0x1) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="680000003000020001000000000000000000001354000100500001000d000100636f6e6e6d61726b00000000200002801c000100000000000000000000000000000000000000000000000000040006000c00070000000000000000000c00080000000000000000802661117f4bc0b154641a923cdbbfa3b5a15ce3d7f8befd71ce0d"], 0x68}}, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x5, 0x4) [ 202.559238][ T3842] usb 1-1: USB disconnect, device number 3 [ 202.675854][ T8810] netlink: 144 bytes leftover after parsing attributes in process `syz-executor.0'. 05:17:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@newtaction={0x70, 0x30, 0xffff, 0x0, 0x0, {}, [{0x5c, 0x1, [@m_ife={0x58, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}, @TCA_IFE_METALST={0x10, 0x6, [@IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_SKBMARK={0x8}]}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x70}}, 0x0) 05:17:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x2) r2 = memfd_create(&(0x7f0000000180)='\vem1\xc1\xf8\xa6\x8dL\xc4J\x80\x89K\xf6w\xf3\x97\xac#*\x7f{\x16\xe1\v\xbb\x91gu\x88_[)i\xe1MK_S#%\xd8\x82h\xe2\x1f\xd4\xd6\x80!\xcb`\xbc\xaa%\xed*\xc4\x9fU\"\xa7\xe5SK8\xe5b\xaf^\x02\xb8-Hr\x13\b7\x80\xe0\xb2\xaf\xb6\x98\x02J\xed\x1d\x9cO\x15m\'\xd2\xa2AI\xdb \xc8\x85\xf9\x93\xe0^A{\x8av\xbb{\t\xd3\xf1b\x83\xb4\xa9\x894\xb9m\x8f\x8e:2L\x06J\xf8\xde\xd0nRA\x8d\x8c\xf9\x1cT\x10\x94\x9a\x90\xc6\x87*zBX\xca\x00\xdc\x1b}\xfe\x97\x1al\xdd\xa9 \x18\xcf\xc7\r\xae\xc8 \xb2\x81\xb4\xf6\xa6\xd7$\xda\xc3\x1fN\x8d\x85-%M\xed\xff\x13\x9e\x02\x1e\x9a', 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) r5 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="b7907ac1140001002d057000fbdbdf250a575129", @ANYRES32=r8, @ANYBLOB="140006000300000001010000060000000800000014000200ff020000000000000000000000000001"], 0x40}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$PPPIOCGCHAN(r10, 0x80047437, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x4046811, r2, 0x0) 05:17:56 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x804, 0xfa) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x80000000}, @in={0x2, 0x4e21, @private=0xa010100}], 0x2c) ioctl$KVM_NMI(r1, 0xae9a) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0xfffffffe, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) socket$kcm(0x11, 0x0, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7132}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0x9c}, {0x6}]}) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 05:17:56 executing program 2: syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x802) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0086dd60041400000000aa0000000000000000000000000000000000000500"/57], 0x0) 05:17:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x42}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000180)={0x0, 0x5, 0x8}, 0x14) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f00000001c0)={0x2, &(0x7f0000000140)=[{0x400, 0x7, 0x5, 0xaf5}, {0x9, 0x5, 0x8, 0x9}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100), 0x4) sendto(r2, &(0x7f00000000c0)=':', 0x1, 0x0, 0x0, 0x0) sendto(r2, &(0x7f0000000040)="96", 0x1, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) close(r2) 05:17:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x11, &(0x7f0000000040)=0x5, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) dup(r2) r3 = accept(r2, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, &(0x7f0000000000)=0x80) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x70, &(0x7f0000000080)={r6}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000100)={r6, 0x4}, 0x8) r7 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendto$inet6(r7, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) 05:17:57 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=@newqdisc={0x44, 0x24, 0xd0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9, 0x1, 'gred\x00'}, {0x14, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0x10}}]}}]}, 0x44}}, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000100)=0x4) 05:17:57 executing program 2: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xf1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)=[&(0x7f0000000a80)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y'], &(0x7f0000000140)=[&(0x7f0000000480)='\xa11\xc2\x1fQ\x88\xebH\xe7\xcf/\x83\xb3+\xc5\xa0\xa6\xbf\x85\xf0;\xea\x8a\xd5b\xb0\xe7=\xf41\xf5\xb4\xb9\aPk\x94csn\x8bu\bHD\x06\f\xccU\x19\xaa\xe0\xed\x85\xb1%\xd8\x82\xaeW\x8764\x93\xb6`\x90\xb1\x1d\xd6\x91\x9a\xf5I:=\xd9\x98\t\x03\x13\xa4f\x13\xeb\x11\xd5\x17J]\x8b\xc18v\xfc\xa9\xcb|\xd4\x1a\x91\x81c\xeb\r|\xdbo\xa8?\xa8\x192\t\x10\x1bhGZ\xc0\xe7\xc3{b\xc0Z\xe5&\r\n\x858\x94V\x9f\xbah\x8f\x91\xa4\x8a\x90\xa7\x10\x85kYh\xb6\x0f\t0-\x9f@\xc2\xbbR.>\xc5;\xceJ\x14QJ0CrCP\x1e\xea\x8b\xc3z\xb8\x7f+\x94LV&\x8e\xce\xecA\xd6\x12#\xdb\x90\xf9\x9d\x03T\x89[G\xa8\xa4\xa9\xa7r\xd8x(\x9dv9\x16\x1dH=\x82?>-\x84R\x11\x94\x17\x01\x03\xc4\xa3\xb3?\xecyq\x86Y']) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 203.703173][ T8888] ptrace attach of "/root/syz-executor.2"[8883] was attempted by "/root/syz-executor.2"[8888] [ 203.972418][ T17] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 204.699255][ T8809] IPVS: ftp: loaded support on port[0] = 21 [ 204.999304][ T17] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 205.115882][ T8926] IPVS: ftp: loaded support on port[0] = 21 05:17:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x4000084) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioprio_get$pid(0x2, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x100000001, 0x905082) fallocate(r1, 0x11, 0x0, 0x100007e00) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000001c0)={0x3, 0x100, 0x7fff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00W', @ANYRES16=r2, @ANYBLOB="29100000000000000000010000000000000002410000001000137564703a73797a3100000000"], 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x400, 0x70bd2a, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xb6e4da96b89a1451}, 0x4000880) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) open(0x0, 0x40001, 0x0) 05:17:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x0) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x18) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x6}, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7}, 0x280}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x0, 0x0) close(0xffffffffffffffff) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r4, 0x8983, &(0x7f00000000c0)={0x8, 'geneve0\x00', {'macvlan1\x00'}, 0x6000}) 05:17:58 executing program 2: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000074774270600000000001001a381", @ANYRES32=0x0, @ANYBLOB="7f218102810300001c0012000b0001006d616373656300e10b00020005000d00000300000a0005c0100000000000000008"], 0x50}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_crypto(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@delrng={0x10, 0x14, 0x400, 0x70bd2c, 0x25dfdbfb, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4008005}, 0x20040001) sendmmsg$alg(r0, &(0x7f0000000000), 0x0, 0x80) 05:17:58 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x200000c, 0x10032, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000040)) lseek(r3, 0x4, 0x2) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x70, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0x1a, 0x0, &(0x7f00000000c0)) r6 = dup2(r5, r4) dup3(r6, r3, 0x0) 05:17:58 executing program 5: r0 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000a00)='F', 0x1, 0x0) keyctl$read(0xb, r0, &(0x7f00000024c0)=""/4105, 0x1009) add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="d1fcff0ed52e80a5288793dfe633ea1f81b5a19e60fc58c82b6e1832a66996e96120578a7581b4cc34b3dc9fec85b20b086a17513db5b7f008960d3cf6ddbebaeb56e31da7424d57c596787f79d5df88cc60d80f87a34f953b33f310a5eb96bade8fc7667723d51e948a1684a24c7dd46c41f1976f25c3d7cc16483e812f1e5e", 0x80, 0xfffffffffffffff9) r1 = request_key(&(0x7f00000005c0)='big_key\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000680)='poly1305\x00', r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f0000000100)={0x2, {{0xa, 0x4e22, 0x81, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}}, 0x88) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0xcfe1eaaded15f8d9, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f0000000040)={0x89}, 0x4) add_key$user(&(0x7f0000000640)='user\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f00000005c0), 0x0, r1) keyctl$set_timeout(0xf, r1, 0x101) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_SET_PIT2(r6, 0x4070aea0, &(0x7f0000000300)={[{0xff, 0x4, 0x0, 0xab, 0xfb, 0x0, 0xff, 0x81, 0xc1, 0x3f, 0x5c, 0x1, 0x7}, {0x6, 0x8001, 0x3f, 0x6c, 0x3f, 0x81, 0x79, 0x6, 0xa5, 0x7, 0x3, 0x3, 0x3}, {0x6, 0x8, 0xb5, 0x0, 0xb9, 0x2, 0x9, 0x4, 0x7f, 0x7, 0x7b, 0x6, 0x4}], 0x1ff}) 05:17:58 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000006b40)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a625", 0x39}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee2514903088", 0xb1}, {&(0x7f0000001500)="46a43e3f510e3eac779206060abfc1e723fc59d595e9", 0x16}, {&(0x7f0000000140)="20ccf5cfb5b343981c84cb75c443ab6284ddee5d30218160a24d032353101f8cb1a1687e644a343343472ba606f9806e186845e4601466fecc27d720c94d2c6af6954dd5b7f91272f523cdf2c78055e782142de6a94e4640b7e85dcc0ede7b978bc43199cc1ded7175efe1145b2a628d3d1dfc9000e42648eb29f8139c366d0d13e19ae624212e65728fb4e2f2749a9b1db37d9ba58f22d523511f060402197225ea84ead541bdb991494d9260a62ed5f9490ea9e9358991bf1038c4efc5eeaa8595", 0xc2}, {&(0x7f0000000f00)="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", 0xfc}, {&(0x7f0000001000)="30a130347a37642122a007a07d6bdeb1e2e8e87303f2570339d4ee0d78633dbb7ddfbb8f9c6cb37f49668a94c0272c4d612f998a697ef20c4a5f83cc2992397c3aec901f0788163db0466f976aabd9cdbab58e076a0016cea3bd2a95665887f7621d9325031712c492162033d082ca5b07843af579aae18d6cf2c10e67a6ddfcbf7097c65f980b957b72f7913373941b4096369e4d60b691bdc3ebf755e92b489acc48e5dcd353daa60f08f08637ad47678b287beaafc076bf92812f5ded959d46d1c40aa59edb1f0aebf877f05c9eefada78accfe828a25af1b8a3e6718c64fac0d4eb43b01a01897cc", 0xea}], 0x6}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000000080)="9c", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000640)="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", 0x817}], 0x1}}], 0x3, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)="89", 0x1}], 0x1}, 0x4c011) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r4 = dup(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x4001f8) setsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000040), 0x4) [ 205.310935][ T8958] IPVS: ftp: loaded support on port[0] = 21 05:17:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x100000001, 0x905082) fallocate(r4, 0x11, 0x0, 0x100007e00) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000100)) close(r3) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r6 = openat$smackfs_logging(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/smackfs/logging\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) splice(r6, &(0x7f0000000140)=0x9, r8, &(0x7f0000000180)=0x101, 0xfffffffffffffffd, 0x9) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x1f1b03) r9 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$nl_route(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x0) splice(r2, 0x0, r3, 0x0, 0x100000000, 0x0) 05:17:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x84}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x100000001, 0x905082) fallocate(r4, 0x11, 0x0, 0x100007e00) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000080)={0x990000, 0x40, 0xfffffff7, r4, 0x0, &(0x7f0000000040)={0x9c0902, 0x6, [], @p_u32=&(0x7f0000000000)=0x1}}) ioctl$KVM_GET_NR_MMU_PAGES(r5, 0xae45, 0x1) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f00000000c0)=ANY=[], 0x84}}, 0x0) [ 205.612422][ T3839] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 05:17:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x70, &(0x7f0000000080)={r4}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={r4, 0x6}, &(0x7f0000000100)=0x8) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000700000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 205.676225][ T8958] IPVS: ftp: loaded support on port[0] = 21 [ 205.720294][ T9000] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. 05:17:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000000)={0x40, {0x7b97, 0xcab, 0xc9e6, 0x100, 0x9, 0xbc1b}}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/keys\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000041c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') keyctl$setperm(0x5, 0x0, 0x0) r3 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r3, &(0x7f0000000000/0x13000)=nil, 0x0) shmctl$SHM_LOCK(r3, 0xb) syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') preadv(r2, &(0x7f00000017c0), 0x1a2, 0x0) 05:17:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x410000, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @rand_addr=0x40}]}, &(0x7f0000000180)=0x10) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x70, &(0x7f0000000080)={r4}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000001c0)={r4, 0xf2, "9ba66f113dd06d6dc26d6bae6a5b58bcc48cb95d61c5a594d18d1bcf86f5e961c5ec159fd534a4de0700032d5ece09be5d67d0776924606d2a8c0dbd7e2c0f382eb7ffde8e623d55f883a58b5832652ec86460d00755005bc6cfacf382c1e590f173543458d81b915da2ad7425dcfc519da64eb6daf5832661cc6b9cc6856cb50a421071abafe7f09c601bfbdea78fd545990c7512be2a84ab6f38105a4f7503d1649e4a3db5003aaeaa09baee6e355ab38047de2fefe8551ef2a5caf35515238211fabcd1223dc8025e0d6863bd85943865b6f9e23644be6bd00453c884821b7c556df702d8ade97499809dc5178ce1fbc0"}, &(0x7f0000000100)=0xfa) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="850000000700000057000000000000009500000000000000bb114f9ab0160bdaa57ad1517065e5cad109f2999cca84756ca14b9c5cc4265e7c9258463c19670d2fa5634d737184edaa19ddcca32c5064d0a95365b0af92c6d388a4fe8b7376048b0959c36fa9d236d04c170e830200000000000000bd504d19cb40f927c2059530728dcb750d9a561485f08ae7380cf6913717601d01f6aaa35a3df5d83ce3491c1db9d0548224361351f9311cd784e7d31307a270c9d2aafeb050cd1a3f21b06bd13a639c2741418035b7eab6910ebc87612ee73f64a03a33e14a"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) 05:17:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) write$tun(r0, &(0x7f0000000340)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x8, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, {[], @echo_request}}}}, 0x3a) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) dup(r5) getsockopt$IP_VS_SO_GET_DAEMON(r5, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) [ 205.892844][ T9002] EXT4-fs (loop5): Unsupported filesystem blocksize 131072 (7 log_block_size) 05:17:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_ID={0x8, 0x9}]}}}, @IFLA_IFNAME={0x14, 0x3, 'geneve1\x00'}]}, 0x50}}, 0x0) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000000)=0x1, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) 05:17:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r1, 0x4122, 0x0) r2 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r2, 0x4601, &(0x7f0000000440)={0x0, 0x0, 0x300, 0x40, 0x0, 0x0, 0x4, 0x0, {}, {0x0, 0xfffffffc}, {0x9}, {0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) [ 206.055050][ T2476] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 05:17:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=@newlink={0x5c, 0x10, 0xffffff1f, 0x0, 0xfffffffc, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}, @IFLA_OPERSTATE={0x5, 0x3}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) bind$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x2, @empty}}, 0x1e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 206.133156][ T2511] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog 05:18:00 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x80fb, @loopback, 0xffffffff}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0", 0xc3}], 0x1}, 0x8000) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000)=0x396, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f0000000040)={0x1, 0xfd1f, 0xdae}) recvmsg(r0, &(0x7f00000011c0)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000a80)="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", 0x2d5}], 0x1}, 0x0) epoll_create1(0x0) 05:18:00 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0xe, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x45}, 0x48) r0 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x100) fallocate(r0, 0x63, 0x800, 0x3) 05:18:00 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) clock_gettime(0x0, 0x0) mq_timedsend(r1, &(0x7f0000000100)="13066ff24806bf", 0x7, 0x4, &(0x7f00000002c0)) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x80f5) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) [ 206.433926][ T9047] netlink: 'syz-executor.4': attribute type 9 has an invalid length. [ 206.473465][ T9047] netlink: 'syz-executor.4': attribute type 9 has an invalid length. [ 206.518190][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 206.518517][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 206.518709][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 206.518851][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 206.588265][ T9062] general protection fault, probably for non-canonical address 0x1ffff11015d26b1a: 0000 [#1] PREEMPT SMP KASAN [ 206.588275][ T9062] CPU: 1 PID: 9062 Comm: syz-executor.3 Not tainted 5.8.0-rc2-syzkaller #0 [ 206.588280][ T9062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.588294][ T9062] RIP: 0010:__switch_to_asm+0x0/0x40 [ 206.588308][ T9062] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 206.588313][ T9062] RSP: 0018:ffffc900015877d8 EFLAGS: 00010046 [ 206.588321][ T9062] RAX: 1ffff11015d26b1a RBX: ffff8880ae9358c0 RCX: ffffffff815999e9 [ 206.588326][ T9062] RDX: ffff888047f9ec88 RSI: ffff8880499f8580 RDI: ffff888047f9e3c0 [ 206.588330][ T9062] RBP: ffff888041a70780 R08: dffffc0000000000 R09: fffffbfff12da456 [ 206.588335][ T9062] R10: fffffbfff12da456 R11: 0000000000000000 R12: ffff888047f9e7f0 [ 206.588341][ T9062] R13: dffffc0000000000 R14: 1ffff11008ff3cfe R15: ffff8880499f8580 [ 206.588348][ T9062] FS: 00007f047a8b7700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 206.588353][ T9062] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 206.588357][ T9062] CR2: 000000000078c000 CR3: 00000000499b6000 CR4: 00000000001406e0 [ 206.588366][ T9062] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 206.588370][ T9062] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 206.588373][ T9062] Call Trace: [ 206.588383][ T9062] __schedule+0x7d3/0xc40 [ 206.588397][ T9062] preempt_schedule_irq+0xca/0x150 [ 206.588404][ T9062] idtentry_exit_cond_rcu+0xcb/0xe0 [ 206.588412][ T9062] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 206.588421][ T9062] RIP: 0010:__sanitizer_cov_trace_pc+0x33/0x60 [ 206.588426][ T9062] Code: 00 fe 01 00 65 8b 15 f8 a9 8d 7e f7 c2 00 01 ff 00 74 11 f7 c2 00 01 00 00 74 35 83 b9 04 14 00 00 00 74 2c 8b 91 e0 13 00 00 <83> fa 02 75 21 48 8b 91 e8 13 00 00 48 8b 32 48 8d 7e 01 8b 89 e4 [ 206.588432][ T9062] RSP: 0018:ffffc90001587960 EFLAGS: 00000246 [ 206.588437][ T9062] RAX: ffffffff83d64530 RBX: 0000000000000000 RCX: ffff888047f9e3c0 [ 206.588440][ T9062] RDX: 0000000000000002 RSI: 000000000003ffff RDI: 0000000000040000 [ 206.588444][ T9062] RBP: 000000001f085710 R08: ffffffff83d644eb R09: ffffffff83d63c5f [ 206.588447][ T9062] R10: 0000000000000002 R11: ffff888047f9e3c0 R12: 000000000000003f [ 206.588450][ T9062] R13: ffff88800101a8f0 R14: ffffffffe00000b0 R15: 000000001fffffaf [ 206.588460][ T9062] ? vga16fb_fillrect+0x70f/0x13e0 [ 206.588466][ T9062] ? vga16fb_fillrect+0xf9b/0x13e0 [ 206.588471][ T9062] ? vga16fb_fillrect+0xfe0/0x13e0 [ 206.588478][ T9062] vga16fb_fillrect+0xfe0/0x13e0 [ 206.588489][ T9062] bit_clear_margins+0x266/0x620 [ 206.588497][ T9062] fbcon_switch+0x1448/0x1e40 [ 206.588513][ T9062] redraw_screen+0x4fc/0x16f0 [ 206.588522][ T9062] fbcon_modechanged+0x8d5/0xd90 [ 206.588530][ T9062] fb_set_var+0x825/0xcc0 [ 206.588544][ T9062] do_fb_ioctl+0x502/0x6f0 [ 206.588555][ T9062] ? fb_write+0x540/0x540 [ 206.588562][ T9062] __se_sys_ioctl+0xf9/0x160 [ 206.588569][ T9062] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 206.588574][ T9062] do_syscall_64+0x73/0xe0 [ 206.588580][ T9062] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 207.725224][ T9062] BUG: unable to handle page fault for address: 0000000040000002 [ 207.725226][ T9062] #PF: supervisor write access in kernel mode [ 207.725228][ T9062] #PF: error_code(0x0002) - not-present page [ 207.725230][ T9062] PGD 499b7067 P4D 499b7067 PUD 0 [ 207.725235][ T9062] Oops: 0002 [#2] PREEMPT SMP KASAN [ 207.725237][ T9062] CPU: 1 PID: 9062 Comm: syz-executor.3 Not tainted 5.8.0-rc2-syzkaller #0 [ 207.725240][ T9062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.725241][ T9062] RIP: 0010:in_gate_area_no_mm+0x0/0x50 [ 207.725246][ T9062] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 207.725248][ T9062] RSP: 0018:ffffc90001586f20 EFLAGS: 00010003 [ 207.725251][ T9062] RAX: 0000000040000002 RBX: 000000000045cb19 RCX: ffff888047f9e3c0 [ 207.725253][ T9062] RDX: ffff888047f9e3c0 RSI: ffffffff8c226000 RDI: 000000000045cb19 [ 207.725256][ T9062] RBP: ffffffff81000000 R08: ffffffff816b1d1c R09: ffffffff83bd1eee [ 207.725258][ T9062] R10: 0000000000000002 R11: ffff888047f9e3c0 R12: ffffc90001586f88 [ 207.725260][ T9062] R13: ffffc90001587000 R14: ffffc90001586f90 R15: ffffffff8c226000 [ 207.725263][ T9062] FS: 00007f047a8b7700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 207.725264][ T9062] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 207.725267][ T9062] CR2: 0000000040000002 CR3: 00000000499b6000 CR4: 00000000001406e0 [ 207.725269][ T9062] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 207.725271][ T9062] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 207.725272][ T9062] Call Trace: [ 207.725274][ T9062] kallsyms_lookup+0xa5/0x540 [ 207.725275][ T9062] __sprint_symbol+0x51/0x1b0 [ 207.725276][ T9062] symbol_string+0xb3/0x210 [ 207.725278][ T9062] ? sprintf+0x71/0x90 [ 207.725280][ T9062] BUG: unable to handle page fault for address: 0000000040000002 [ 207.725282][ T9062] #PF: supervisor write access in kernel mode [ 207.725284][ T9062] #PF: error_code(0x0002) - not-present page [ 207.725285][ T9062] PGD 499b7067 P4D 499b7067 PUD 0 [ 207.725289][ T9062] Oops: 0002 [#3] PREEMPT SMP KASAN [ 207.725292][ T9062] CPU: 1 PID: 9062 Comm: syz-executor.3 Not tainted 5.8.0-rc2-syzkaller #0 [ 207.725295][ T9062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.725296][ T9062] RIP: 0010:in_gate_area_no_mm+0x0/0x50 [ 207.725301][ T9062] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 207.725303][ T9062] RSP: 0018:ffffc90001586820 EFLAGS: 00010087 [ 207.725306][ T9062] RAX: 0000000040000002 RBX: ffffffff80ffffff RCX: ffff888047f9e3c0 [ 207.725308][ T9062] RDX: ffff888047f9e3c0 RSI: ffffffff8c226000 RDI: ffffffff80ffffff [ 207.725311][ T9062] RBP: ffffffff81000000 R08: ffffffff816b1d1c R09: ffffffff83bd1eee [ 207.725313][ T9062] R10: 0000000000000002 R11: ffff888047f9e3c0 R12: ffffc90001586888 [ 207.725315][ T9062] R13: ffffc90001586900 R14: ffffc90001586890 R15: ffffffff8c226000 [ 207.725317][ T9062] FS: 00007f047a8b7700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 207.725319][ T9062] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 207.725321][ T9062] CR2: 0000000040000002 CR3: 00000000499b6000 CR4: 00000000001406e0 [ 207.725324][ T9062] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 207.725326][ T9062] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 207.725327][ T9062] Call Trace: [ 207.725328][ T9062] kallsyms_lookup+0xa5/0x540 [ 207.725330][ T9062] ? symbol_string+0x6e/0x210 [ 207.725332][ T9062] BUG: unable to handle page fault for address: 0000000040000002 [ 207.725334][ T9062] #PF: supervisor write access in kernel mode [ 207.725336][ T9062] #PF: error_code(0x0002) - not-present page [ 207.725337][ T9062] PGD 499b7067 P4D 499b7067 PUD 0 [ 207.725341][ T9062] Oops: 0002 [#4] PREEMPT SMP KASAN [ 207.725344][ T9062] CPU: 1 PID: 9062 Comm: syz-executor.3 Not tainted 5.8.0-rc2-syzkaller #0 [ 207.725346][ T9062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.725348][ T9062] RIP: 0010:in_gate_area_no_mm+0x0/0x50 [ 207.725353][ T9062] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 207.725355][ T9062] RSP: 0018:ffffc90001586120 EFLAGS: 00010087 [ 207.725358][ T9062] RAX: 0000000040000002 RBX: ffffffff80ffffff RCX: ffff888047f9e3c0 [ 207.725360][ T9062] RDX: ffff888047f9e3c0 RSI: ffffffff8c226000 RDI: ffffffff80ffffff [ 207.725362][ T9062] RBP: ffffffff81000000 R08: ffffffff816b1d1c R09: ffffffff83bd1eee [ 207.725364][ T9062] R10: 0000000000000002 R11: ffff888047f9e3c0 R12: ffffc90001586188 [ 207.725366][ T9062] R13: ffffc90001586200 R14: ffffc90001586190 R15: ffffffff8c226000 [ 207.725369][ T9062] FS: 00007f047a8b7700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 207.725371][ T9062] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 207.725373][ T9062] CR2: 0000000040000002 CR3: 00000000499b6000 CR4: 00000000001406e0 [ 207.725375][ T9062] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 207.725377][ T9062] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 207.725378][ T9062] Call Trace: [ 207.725380][ T9062] kallsyms_lookup+0xa5/0x540 [ 207.725381][ T9062] ? symbol_string+0x6e/0x210 [ 207.725383][ T9062] BUG: unable to handle page fault for address: 0000000040000002 [ 207.725385][ T9062] #PF: supervisor write access in kernel mode [ 207.725387][ T9062] #PF: error_code(0x0002) - not-present page [ 207.725388][ T9062] PGD 499b7067 P4D 499b7067 PUD 0 [ 207.725393][ T9062] Oops: 0002 [#5] PREEMPT SMP KASAN [ 207.725395][ T9062] CPU: 1 PID: 9062 Comm: syz-executor.3 Not tainted 5.8.0-rc2-syzkaller #0 [ 207.725398][ T9062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.725399][ T9062] RIP: 0010:in_gate_area_no_mm+0x0/0x50 [ 207.725405][ T9062] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 207.725406][ T9062] RSP: 0018:ffffc90001585a20 EFLAGS: 00010087 [ 207.725409][ T9062] RAX: 0000000040000002 RBX: ffffffff80ffffff RCX: ffff888047f9e3c0 [ 207.725412][ T9062] RDX: ffff888047f9e3c0 RSI: ffffffff8c226000 RDI: ffffffff80ffffff [ 207.725414][ T9062] RBP: ffffffff81000000 R08: ffffffff816b1d1c R09: ffffffff83bd1eee [ 207.725416][ T9062] R10: 0000000000000002 R11: ffff888047f9e3c0 R12: ffffc90001585a88 [ 207.725418][ T9062] R13: ffffc90001585b00 R14: ffffc90001585a90 R15: ffffffff8c226000 [ 207.725421][ T9062] FS: 00007f047a8b7700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 207.725422][ T9062] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 207.725425][ T9062] CR2: 0000000040000002 CR3: 00000000499b6000 CR4: 00000000001406e0 [ 207.725427][ T9062] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 207.725429][ T9062] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 207.725430][ T9062] Call Trace: [ 207.725432][ T9062] kallsyms_lookup+0xa5/0x540 [ 207.725433][ T9062] ? symbol_string+0x6e/0x210 [ 207.725435][ T9062] BUG: unable to handle page fault for address: 0000000040000002 [ 207.725437][ T9062] #PF: supervisor write access in kernel mode [ 207.725439][ T9062] #PF: error_code(0x0002) - not-present page [ 207.725440][ T9062] PGD 499b7067 P4D 499b7067 PUD 0 [ 207.725445][ T9062] Oops: 0002 [#6] PREEMPT SMP KASAN [ 207.725447][ T9062] CPU: 1 PID: 9062 Comm: syz-executor.3 Not tainted 5.8.0-rc2-syzkaller #0 [ 207.725450][ T9062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.725451][ T9062] RIP: 0010:in_gate_area_no_mm+0x0/0x50 [ 207.725456][ T9062] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 207.725458][ T9062] RSP: 0018:ffffc90001585320 EFLAGS: 00010087 [ 207.725461][ T9062] RAX: 0000000040000002 RBX: ffffffff80ffffff RCX: ffff888047f9e3c0 [ 207.725463][ T9062] RDX: ffff888047f9e3c0 RSI: ffffffff8c226000 RDI: ffffffff80ffffff [ 207.725466][ T9062] RBP: ffffffff81000000 R08: ffffffff816b1d1c R09: ffffffff83bd1eee [ 207.725468][ T9062] R10: 0000000000000002 R11: ffff888047f9e3c0 R12: ffffc90001585388 [ 207.725470][ T9062] R13: ffffc90001585400 R14: ffffc90001585390 R15: ffffffff8c226000 [ 207.725472][ T9062] FS: 00007f047a8b7700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 207.725474][ T9062] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 207.725476][ T9062] CR2: 0000000040000002 CR3: 00000000499b6000 CR4: 00000000001406e0 [ 207.725478][ T9062] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 207.725481][ T9062] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 207.725482][ T9062] Call Trace: [ 207.725483][ T9062] kallsyms_lookup+0xa5/0x540 [ 207.725485][ T9062] ? symbol_string+0x6e/0x210 [ 207.725487][ T9062] BUG: unable to handle page fault for address: 0000000040000002 [ 207.725489][ T9062] #PF: supervisor write access in kernel mode [ 207.725490][ T9062] #PF: error_code(0x0002) - not-present page [ 207.725492][ T9062] PGD 499b7067 P4D 499b7067 PUD 0 [ 207.725496][ T9062] Oops: 0002 [#7] PREEMPT SMP KASAN [ 207.725498][ T9062] CPU: 1 PID: 9062 Comm: syz-executor.3 Not tainted 5.8.0-rc2-syzkaller #0 [ 207.725501][ T9062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.725502][ T9062] RIP: 0010:in_gate_area_no_mm+0x0/0x50 [ 207.725507][ T9062] Code: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <00> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 207.725509][ T9062] RSP: 0018:ffffc90001584c20 EFLAGS: 00010087 [ 207.725512][ T9062] RAX: 0000000040000002 RBX: ffffffff80ffffff RCX: ffff888047f9e3c0 [ 207.725514][ T9062] RDX: ffff888047f9e3c0 RSI: ffffffff8c226000 RDI: ffffffff80ffffff [ 207.725516][ T9062] RBP: ffffffff81000000 R08: ffffffff816b1d1c R09: ffffffff83bd1eee [ 207.725519][ T9062] R10: 0000000000000002 R11: ffff888047f9e3c0 R12: ffffc90001584c88 [ 207.725521][ T9062] R13: ffffc90001584d00 R14: ffffc90001584c90 R15: ffffffff8c226000 [ 207.725523][ T9062] FS: 00007f047a8b7700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 207.725524][ T9062] CS: 0010 DS: 0000 ES: [ 207.725529][ T9062] Lost 289 message(s)!