[ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Starting Load/Save RF Kill Switch Status... [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.1.16' (ECDSA) to the list of known hosts. 2020/04/18 10:25:41 fuzzer started 2020/04/18 10:25:43 dialing manager at 10.128.0.26:40919 2020/04/18 10:25:43 syscalls: 2837 2020/04/18 10:25:43 code coverage: enabled 2020/04/18 10:25:43 comparison tracing: enabled 2020/04/18 10:25:43 extra coverage: enabled 2020/04/18 10:25:43 setuid sandbox: enabled 2020/04/18 10:25:43 namespace sandbox: enabled 2020/04/18 10:25:43 Android sandbox: /sys/fs/selinux/policy does not exist 2020/04/18 10:25:43 fault injection: enabled 2020/04/18 10:25:43 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/04/18 10:25:43 net packet injection: enabled 2020/04/18 10:25:43 net device setup: enabled 2020/04/18 10:25:43 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/04/18 10:25:43 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/04/18 10:25:43 USB emulation: /dev/raw-gadget does not exist 10:28:10 executing program 0: syzkaller login: [ 209.268708][ T7052] IPVS: ftp: loaded support on port[0] = 21 10:28:11 executing program 1: [ 209.428044][ T7052] chnl_net:caif_netlink_parms(): no params data found [ 209.521495][ T7052] bridge0: port 1(bridge_slave_0) entered blocking state [ 209.530551][ T7052] bridge0: port 1(bridge_slave_0) entered disabled state [ 209.541023][ T7052] device bridge_slave_0 entered promiscuous mode [ 209.552716][ T7052] bridge0: port 2(bridge_slave_1) entered blocking state [ 209.560780][ T7052] bridge0: port 2(bridge_slave_1) entered disabled state [ 209.571248][ T7052] device bridge_slave_1 entered promiscuous mode [ 209.602780][ T7052] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 209.618298][ T7052] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 209.651343][ T7052] team0: Port device team_slave_0 added [ 209.660327][ T7052] team0: Port device team_slave_1 added [ 209.686005][ T7052] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 209.693001][ T7052] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.715906][ T7198] IPVS: ftp: loaded support on port[0] = 21 [ 209.720791][ T7052] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 209.739084][ T7052] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 209.746957][ T7052] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 209.773699][ T7052] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 10:28:11 executing program 2: [ 209.898855][ T7052] device hsr_slave_0 entered promiscuous mode [ 209.966321][ T7052] device hsr_slave_1 entered promiscuous mode [ 210.071595][ T7230] IPVS: ftp: loaded support on port[0] = 21 10:28:11 executing program 3: [ 210.330330][ T7198] chnl_net:caif_netlink_parms(): no params data found 10:28:12 executing program 4: [ 210.668198][ T7052] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 210.704670][ T7475] IPVS: ftp: loaded support on port[0] = 21 [ 210.750964][ T7230] chnl_net:caif_netlink_parms(): no params data found [ 210.772793][ T7052] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 210.785550][ T7484] IPVS: ftp: loaded support on port[0] = 21 10:28:12 executing program 5: [ 210.840556][ T7052] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 210.963879][ T7052] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 211.007326][ T7198] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.019380][ T7198] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.027872][ T7198] device bridge_slave_0 entered promiscuous mode [ 211.047219][ T7510] IPVS: ftp: loaded support on port[0] = 21 [ 211.075291][ T7198] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.082416][ T7198] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.092202][ T7198] device bridge_slave_1 entered promiscuous mode [ 211.144454][ T7198] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.156983][ T7198] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.210229][ T7198] team0: Port device team_slave_0 added [ 211.226389][ T7198] team0: Port device team_slave_1 added [ 211.258130][ T7230] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.265604][ T7230] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.273842][ T7230] device bridge_slave_0 entered promiscuous mode [ 211.315054][ T7198] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 211.322064][ T7198] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.348622][ T7198] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 211.361313][ T7230] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.371791][ T7230] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.381128][ T7230] device bridge_slave_1 entered promiscuous mode [ 211.401696][ T7198] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 211.412526][ T7198] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 211.440521][ T7198] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 211.508683][ T7230] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.559469][ T7198] device hsr_slave_0 entered promiscuous mode [ 211.615352][ T7198] device hsr_slave_1 entered promiscuous mode [ 211.654894][ T7198] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 211.662505][ T7198] Cannot create hsr debugfs directory [ 211.676790][ T7230] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 211.840954][ T7230] team0: Port device team_slave_0 added [ 211.913108][ T7230] team0: Port device team_slave_1 added [ 211.962515][ T7475] chnl_net:caif_netlink_parms(): no params data found [ 211.988999][ T7484] chnl_net:caif_netlink_parms(): no params data found [ 212.043856][ T7230] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 212.051917][ T7230] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 212.078964][ T7230] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 212.094149][ T7510] chnl_net:caif_netlink_parms(): no params data found [ 212.135182][ T7230] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 212.142183][ T7230] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 212.170523][ T7230] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 212.339958][ T7230] device hsr_slave_0 entered promiscuous mode [ 212.395248][ T7230] device hsr_slave_1 entered promiscuous mode [ 212.434831][ T7230] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 212.442465][ T7230] Cannot create hsr debugfs directory [ 212.481699][ T7484] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.489582][ T7484] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.498886][ T7484] device bridge_slave_0 entered promiscuous mode [ 212.511893][ T7484] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.520787][ T7484] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.529476][ T7484] device bridge_slave_1 entered promiscuous mode [ 212.574355][ T7052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.623550][ T7475] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.631095][ T7475] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.641976][ T7475] device bridge_slave_0 entered promiscuous mode [ 212.650418][ T7510] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.658241][ T7510] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.666503][ T7510] device bridge_slave_0 entered promiscuous mode [ 212.681331][ T7510] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.692306][ T7510] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.702029][ T7510] device bridge_slave_1 entered promiscuous mode [ 212.739031][ T7484] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.749546][ T7475] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.759196][ T7475] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.769565][ T7475] device bridge_slave_1 entered promiscuous mode [ 212.790147][ T7510] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.808039][ T7484] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.831165][ T7052] 8021q: adding VLAN 0 to HW filter on device team0 [ 212.866733][ T7510] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.897011][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 212.908431][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 212.931460][ T7475] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.960239][ T7198] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 213.017402][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.030460][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.040386][ T3576] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.047926][ T3576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.058012][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.067425][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.076159][ T3576] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.083402][ T3576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.099643][ T7475] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.123126][ T7484] team0: Port device team_slave_0 added [ 213.132915][ T7198] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 213.179390][ T7198] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 213.228634][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.237019][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.262278][ T7510] team0: Port device team_slave_0 added [ 213.270169][ T7484] team0: Port device team_slave_1 added [ 213.288308][ T7198] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 213.358377][ T7475] team0: Port device team_slave_0 added [ 213.367943][ T7510] team0: Port device team_slave_1 added [ 213.377133][ T7475] team0: Port device team_slave_1 added [ 213.392252][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 213.401916][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 213.411464][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 213.482741][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 213.491758][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 213.501503][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 213.533027][ T7475] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 213.540692][ T7475] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.568332][ T7475] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 213.583848][ T7475] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 213.592153][ T7475] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.618987][ T7475] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 213.631927][ T7484] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 213.639219][ T7484] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.667444][ T7484] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 213.683725][ T7484] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 213.691570][ T7484] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.719883][ T7484] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 213.743731][ T7510] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 213.751829][ T7510] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.779704][ T7510] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 213.791995][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 213.800715][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.858912][ T7510] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 213.869832][ T7510] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 213.903856][ T7510] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 213.916456][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 213.929192][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.030983][ T7510] device hsr_slave_0 entered promiscuous mode [ 214.075658][ T7510] device hsr_slave_1 entered promiscuous mode [ 214.125061][ T7510] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 214.132677][ T7510] Cannot create hsr debugfs directory [ 214.187637][ T7475] device hsr_slave_0 entered promiscuous mode [ 214.225262][ T7475] device hsr_slave_1 entered promiscuous mode [ 214.275083][ T7475] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 214.282827][ T7475] Cannot create hsr debugfs directory [ 214.300363][ T7230] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 214.442359][ T7484] device hsr_slave_0 entered promiscuous mode [ 214.495361][ T7484] device hsr_slave_1 entered promiscuous mode [ 214.575025][ T7484] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 214.582675][ T7484] Cannot create hsr debugfs directory [ 214.590439][ T7052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.642452][ T7230] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 214.736739][ T7230] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 214.782908][ T7230] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 214.968232][ T7052] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.992208][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 215.000163][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 215.069469][ T7198] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.151715][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.161503][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.191014][ T7198] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.230373][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 215.251469][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 215.261175][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.273524][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.282741][ T3578] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.289875][ T3578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.299360][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.315775][ T7475] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 215.378905][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.391400][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.402096][ T2681] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.409285][ T2681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.418577][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 215.428307][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 215.441922][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 215.450490][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 215.459636][ T7475] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 215.511165][ T7475] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 215.570506][ T7475] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 215.635634][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.653711][ T7052] device veth0_vlan entered promiscuous mode [ 215.676849][ T7510] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 215.710119][ T7510] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 215.759919][ T7510] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 215.833536][ T7510] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 215.892956][ T7052] device veth1_vlan entered promiscuous mode [ 215.925651][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 215.933925][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.947328][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.958200][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.969421][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.979593][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.988799][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.998706][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.051518][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 216.061151][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.070133][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.078732][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.110372][ T7484] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 216.142929][ T7484] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 216.195578][ T7230] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.210897][ T7198] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.225167][ T7484] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 216.270383][ T7484] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 216.365939][ T7052] device veth0_macvtap entered promiscuous mode [ 216.373885][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 216.383717][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 216.404241][ T7230] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.438044][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 216.447858][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.457087][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.481196][ T7052] device veth1_macvtap entered promiscuous mode [ 216.515438][ T7198] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.536385][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 216.544498][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.554544][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.563403][ T3577] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.570681][ T3577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.579081][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 216.586940][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 216.594380][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.603728][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.612683][ T3577] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.619818][ T3577] bridge0: port 2(bridge_slave_1) entered forwarding state [ 216.630541][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.675940][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.684880][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.695225][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.703970][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.723846][ T7510] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.756022][ T7052] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 216.764504][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.774384][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.782725][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.790882][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.799967][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.808738][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 216.818429][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 216.844435][ T7510] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.864376][ T7052] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 216.888296][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.900508][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.910039][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 216.922508][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 216.932446][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 216.941605][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 216.959478][ T7230] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 216.977576][ T7230] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.999566][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.013471][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.023999][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.032846][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.041588][ T3576] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.048864][ T3576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.094817][ T7475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 217.109707][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.122240][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 217.132179][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 217.140905][ T3577] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.148084][ T3577] bridge0: port 2(bridge_slave_1) entered forwarding state [ 217.326398][ T7198] device veth0_vlan entered promiscuous mode [ 217.346707][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 217.364131][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 217.373597][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 217.391091][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 217.404886][ T3577] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 10:28:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_EDID(r3, 0xc0285629, &(0x7f00000002c0)={0x0, 0x0, 0x7, [], 0x0}) [ 217.424156][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 217.441160][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 217.496098][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 217.525278][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.534787][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.552582][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.561717][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 217.597006][ T7198] device veth1_vlan entered promiscuous mode [ 217.613012][ T7230] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 217.634632][ T7475] 8021q: adding VLAN 0 to HW filter on device team0 [ 217.655604][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 217.663882][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 217.681513][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 217.690494][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 217.699984][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 217.710045][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 217.729837][ T7510] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 217.747406][ T7510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:28:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000580)='./bus\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@ng, 0x2, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) [ 217.773540][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 217.783368][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 217.793021][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 217.822022][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 217.835897][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.843008][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 217.935354][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 217.944000][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 217.958102][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 217.968836][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 10:28:19 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) [ 217.979589][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 10:28:19 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 218.006046][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.032556][ T8042] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.039709][ T8042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.058833][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.081812][ T7484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.129412][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.145480][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 218.154373][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 218.202592][ T7484] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.222154][ T7198] device veth0_macvtap entered promiscuous mode [ 218.237433][ T7510] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 218.245528][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 218.253940][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.269445][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.281508][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 218.295097][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.304336][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 218.317056][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 218.324491][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.333211][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.341594][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 218.350317][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 218.367135][ T7230] device veth0_vlan entered promiscuous mode [ 218.387770][ T7198] device veth1_macvtap entered promiscuous mode [ 218.406589][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.414793][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 218.423713][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 218.432061][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 218.441246][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 218.450760][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.460705][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.469607][ T3578] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.476753][ T3578] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.484330][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 218.493152][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 218.503031][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.521863][ T7230] device veth1_vlan entered promiscuous mode [ 218.536806][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 218.548608][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 10:28:20 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000006fc0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 218.558928][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.568477][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.575628][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.625055][ T7475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:28:20 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 218.678305][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 218.689543][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 218.700816][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 218.713949][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 218.754006][ T7198] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 218.775628][ T7198] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.794159][ T7198] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 218.835308][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 218.844195][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 218.858938][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 218.871169][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 218.881667][ T2681] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 218.925883][ T7198] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 218.944161][ T7198] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 218.956544][ T7198] batman_adv: batadv0: Interface activated: batadv_slave_1 10:28:20 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000440)={0x0, 0x9, 0x1, {0xb, @sdr={0x0, 0x1}}}) r1 = syz_open_dev$swradio(0x0, 0x1, 0x2) mmap$binder(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x1, 0x11, r1, 0x0) [ 218.970255][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 218.978375][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 218.987755][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.001168][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.011459][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.050401][ T7475] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.071597][ T7510] device veth0_vlan entered promiscuous mode [ 219.094797][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 219.104504][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 219.116805][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.126370][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.135084][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 219.143221][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.151123][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.160268][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.182702][ T7230] device veth0_macvtap entered promiscuous mode [ 219.212714][ T7510] device veth1_vlan entered promiscuous mode [ 219.232554][ T7484] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 219.247049][ T7484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.255709][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 219.265043][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 219.273677][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 219.283076][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 219.292018][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.302317][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.377696][ T7230] device veth1_macvtap entered promiscuous mode [ 219.574144][ T7230] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.587757][ T7230] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.598502][ T7230] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 219.609128][ T7230] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.621905][ T7230] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 219.632773][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.643130][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.654297][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 219.663683][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 10:28:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r0, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 219.722528][ T7230] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.770605][ T7230] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.782239][ T7230] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 219.794538][ T7230] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 219.808063][ T7230] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 219.818553][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 219.829568][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 219.840010][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 219.848947][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.862865][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 219.873559][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 219.889039][ T7510] device veth0_macvtap entered promiscuous mode [ 219.931195][ T7484] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.967746][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 219.988140][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 220.003510][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.016946][ T7475] device veth0_vlan entered promiscuous mode [ 220.038659][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.052576][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.072722][ T7510] device veth1_macvtap entered promiscuous mode [ 220.140090][ T7475] device veth1_vlan entered promiscuous mode [ 220.160071][ T7510] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.184386][ T7510] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.195774][ T7510] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.217910][ T7510] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.230059][ T7510] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 220.242567][ T7510] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.255791][ T7510] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 220.307755][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 220.319602][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 220.329043][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 220.338260][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 220.347510][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 220.359675][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 220.369426][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 220.382400][ T7510] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 220.397361][ T7510] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.407767][ T7510] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 220.418324][ T7510] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.428284][ T7510] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 220.438818][ T7510] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 220.451796][ T7510] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 220.559531][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 220.574006][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:28:22 executing program 2: ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x4058534c, &(0x7f0000000240)={0x80, 0x0, 0x0, 'queue0\x00'}) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1}, 0x8800) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000480)}], 0x1) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x6, 0x8}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/timer_list\x00', 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4000000000010046) [ 220.603639][ T7475] device veth0_macvtap entered promiscuous mode [ 220.695798][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 220.705058][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 220.729529][ T7475] device veth1_macvtap entered promiscuous mode [ 220.783766][ T7484] device veth0_vlan entered promiscuous mode [ 220.797831][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 220.827612][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 220.836160][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 220.844570][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.920570][ T7484] device veth1_vlan entered promiscuous mode [ 220.946997][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.962951][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.971437][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 220.992820][ T7475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.007534][ T7475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.018131][ T7475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.029013][ T7475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.039283][ T7475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.050168][ T7475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.060805][ T7475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.072197][ T7475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.093799][ T7475] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 221.113951][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 221.123496][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 221.132437][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 221.148746][ T7475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.159487][ T7475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.186503][ T7475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.204340][ T7475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.229646][ T7475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.256477][ T7475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.275887][ T7475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.295607][ T7475] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.307806][ T7475] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 221.335792][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 221.348506][ T3578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.418169][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 221.427351][ T2692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 221.443320][ T7484] device veth0_macvtap entered promiscuous mode [ 221.460322][ T7484] device veth1_macvtap entered promiscuous mode [ 221.668474][ T7484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.685883][ T7484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.697390][ T7484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.709433][ T7484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.719953][ T7484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.732894][ T7484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.743403][ T7484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.754213][ T7484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.764206][ T7484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 221.774758][ T7484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.788834][ T7484] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 221.807150][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 221.816325][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 221.824567][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 221.836687][ T3576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 221.851972][ T7484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 10:28:23 executing program 3: [ 221.876173][ T7484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.905886][ T7484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.933628][ T7484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 221.955631][ T7484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 221.991573][ T7484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.007140][ T7484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 222.018378][ T7484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.029203][ T7484] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 222.040127][ T7484] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.074153][ T7484] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 222.094540][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 222.103570][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 10:28:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000024000b0f00"/20, @ANYRES32, @ANYBLOB="00000000ffffffff000000000d00010066715f636f64656c000000001400020008000200000000000800040000000000"], 0x48}}, 0x10080) 10:28:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="d7cf"]) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 10:28:24 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet(0x10, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4) 10:28:24 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 10:28:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') dup(0xffffffffffffffff) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) sendfile(r0, r1, 0x0, 0x4) 10:28:24 executing program 3: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1ae46888dd8ba493ec3abb4c458d5e01b8d16d5a34fc60bd7fb43e269a2724ec0a2407088fe07f7a4282a0c950e7566f3244b662"], 0x13}, 0x0) clone(0x80002300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xfffffffffffffd4e}], 0x1000000000000125, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}, 0x30}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 10:28:24 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000040)=0x8) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000040)=0x8) [ 222.421308][ T8383] netlink: 41451 bytes leftover after parsing attributes in process `syz-executor.2'. [ 222.436149][ T8388] ptrace attach of "/root/syz-executor.3"[8385] was attempted by "/root/syz-executor.3"[8388] [ 222.444759][ T8386] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 10:28:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r3, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001000000"], 0x3c}}, 0x0) 10:28:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000600)=ANY=[@ANYBLOB="dc"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@newtfilter={0x24, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 10:28:24 executing program 1: 10:28:24 executing program 4: 10:28:24 executing program 3: 10:28:24 executing program 1: 10:28:24 executing program 0: 10:28:24 executing program 2: 10:28:24 executing program 4: 10:28:24 executing program 5: 10:28:24 executing program 3: 10:28:24 executing program 1: 10:28:25 executing program 2: 10:28:25 executing program 1: 10:28:25 executing program 5: 10:28:25 executing program 3: 10:28:25 executing program 4: 10:28:25 executing program 0: 10:28:25 executing program 2: 10:28:25 executing program 1: 10:28:25 executing program 3: 10:28:25 executing program 4: 10:28:25 executing program 5: 10:28:25 executing program 0: 10:28:25 executing program 2: 10:28:25 executing program 1: 10:28:25 executing program 4: 10:28:25 executing program 3: 10:28:25 executing program 2: 10:28:25 executing program 5: 10:28:25 executing program 1: 10:28:25 executing program 0: 10:28:25 executing program 2: 10:28:25 executing program 4: 10:28:25 executing program 3: 10:28:25 executing program 5: 10:28:25 executing program 0: 10:28:25 executing program 1: 10:28:25 executing program 2: 10:28:25 executing program 4: 10:28:25 executing program 5: 10:28:25 executing program 3: 10:28:25 executing program 0: 10:28:25 executing program 1: 10:28:25 executing program 2: 10:28:25 executing program 4: 10:28:25 executing program 5: 10:28:25 executing program 3: 10:28:25 executing program 1: 10:28:25 executing program 0: 10:28:25 executing program 2: 10:28:25 executing program 4: 10:28:25 executing program 5: 10:28:26 executing program 3: 10:28:26 executing program 1: 10:28:26 executing program 2: 10:28:26 executing program 0: 10:28:26 executing program 4: 10:28:26 executing program 3: 10:28:26 executing program 5: 10:28:26 executing program 1: 10:28:26 executing program 0: 10:28:26 executing program 2: 10:28:26 executing program 3: 10:28:26 executing program 4: 10:28:26 executing program 5: 10:28:26 executing program 1: 10:28:26 executing program 2: 10:28:26 executing program 0: 10:28:26 executing program 3: 10:28:26 executing program 5: 10:28:26 executing program 4: 10:28:26 executing program 1: 10:28:26 executing program 0: 10:28:26 executing program 2: 10:28:26 executing program 3: 10:28:26 executing program 4: 10:28:26 executing program 5: 10:28:26 executing program 1: 10:28:26 executing program 0: 10:28:26 executing program 2: 10:28:26 executing program 4: 10:28:26 executing program 3: 10:28:26 executing program 5: 10:28:26 executing program 0: 10:28:26 executing program 1: 10:28:26 executing program 4: 10:28:26 executing program 2: 10:28:26 executing program 5: 10:28:26 executing program 3: 10:28:27 executing program 0: 10:28:27 executing program 1: 10:28:27 executing program 4: 10:28:27 executing program 5: 10:28:27 executing program 2: 10:28:27 executing program 3: 10:28:27 executing program 1: 10:28:27 executing program 4: 10:28:27 executing program 5: 10:28:27 executing program 0: 10:28:27 executing program 2: 10:28:27 executing program 3: 10:28:27 executing program 1: 10:28:27 executing program 0: 10:28:27 executing program 4: 10:28:27 executing program 5: 10:28:27 executing program 2: 10:28:27 executing program 1: 10:28:27 executing program 0: 10:28:27 executing program 3: 10:28:27 executing program 5: 10:28:27 executing program 4: 10:28:27 executing program 2: 10:28:27 executing program 1: 10:28:27 executing program 0: 10:28:27 executing program 5: 10:28:27 executing program 4: 10:28:27 executing program 3: 10:28:27 executing program 2: 10:28:27 executing program 5: 10:28:27 executing program 0: 10:28:27 executing program 4: 10:28:27 executing program 1: 10:28:27 executing program 3: 10:28:27 executing program 2: 10:28:27 executing program 5: 10:28:27 executing program 4: 10:28:27 executing program 0: 10:28:27 executing program 1: 10:28:28 executing program 3: 10:28:28 executing program 2: 10:28:28 executing program 5: 10:28:28 executing program 4: 10:28:28 executing program 1: 10:28:28 executing program 0: 10:28:28 executing program 4: 10:28:28 executing program 3: 10:28:28 executing program 2: 10:28:28 executing program 5: 10:28:28 executing program 0: 10:28:28 executing program 1: 10:28:28 executing program 3: 10:28:28 executing program 4: 10:28:28 executing program 0: 10:28:28 executing program 5: 10:28:28 executing program 2: 10:28:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x0, 0x400001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/stat\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) prctl$PR_SET_FP_MODE(0x2d, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffc6b, 0x24}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00') preadv(r1, 0x0, 0x0, 0x9) accept$alg(0xffffffffffffffff, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 10:28:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x0, 0x400001, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/stat\x00', 0x0, 0x0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000140)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb230328931deb95ef3fcafb1ce27743a93f4715976ede8860ab49c3a4f", 0x69, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000001d80)={'syz', 0x1, 0x2e}, 0x0) r2 = request_key(&(0x7f00000004c0)='rxrpc\x00', &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)='nl80211\x00', 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x2}, r2) sendfile(r0, r1, 0x0, 0x4000000000010046) dup(0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00') preadv(r1, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000500)=""/175, 0xaf}, {0x0}], 0x3, 0x9) accept$alg(0xffffffffffffffff, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 10:28:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfffffd2d) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x6e) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x9, 0x3, 0x0, 0x0, 0x1000002}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x67b45432ed9c7e67, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 10:28:28 executing program 0: 10:28:28 executing program 2: 10:28:28 executing program 5: 10:28:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @random="0982e32fef90", @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@lsrr={0x83, 0x7, 0x30, [@dev]}, @timestamp={0x44, 0x4}]}}}}}}, 0x0) 10:28:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fffffff, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x80}]}}) 10:28:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0xd, 0x70, 0x40, 0x3, 0x80, 0x0, 0x0, 0x4, 0x4008, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x7, @perf_bp={&(0x7f00000000c0), 0x4}, 0x800, 0x7, 0x0, 0x7, 0x400, 0x401}, r0, 0x1, 0xffffffffffffffff, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_open_procfs(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000f13000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320f) 10:28:28 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000100), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[], 0xfffffd2d) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x9, 0x3, 0x0, 0x0, 0x1000002}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x67b45432ed9c7e67, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 10:28:28 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/181, 0xb5}], 0x1, 0x0) 10:28:28 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]}, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80002300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xfffffffffffffd4e}], 0x1000000000000125, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@ipv4={[], [], @multicast2}, 0x30}) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x1b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 10:28:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f00000003c0)) 10:28:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1f, 0x0, "a62bf9d13309b1c9f49ba105a7445c9e6813f9"}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r3, 0x5412, &(0x7f0000000000)=0x5305) 10:28:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0xd, 0x70, 0x40, 0x3, 0x80, 0x5, 0x0, 0x4, 0x4008, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x7, @perf_bp={&(0x7f00000000c0), 0x4}, 0x800, 0x7, 0x7e, 0x7, 0x400, 0x401}, r0, 0x1, 0xffffffffffffffff, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) syz_open_procfs(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000f13000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320f) 10:28:29 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) linkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x0) 10:28:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0xd, 0x70, 0x40, 0x3, 0x80, 0x0, 0x0, 0x4, 0x4008, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x7, @perf_bp={&(0x7f00000000c0), 0x4}, 0x800, 0x7, 0x0, 0x7, 0x400, 0x401}, r0, 0x1, 0xffffffffffffffff, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000f13000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320f) 10:28:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320f) 10:28:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000280)={'bond_slave_0\x00', &(0x7f0000000040)=@ethtool_dump={0x40}}) 10:28:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x3, 0x0) 10:28:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0xfe51) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000002f, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f0000000000)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 10:28:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000100), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[], 0xfffffd2d) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x9, 0x3, 0x0, 0x0, 0x1000002}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x67b45432ed9c7e67, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 10:28:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001}, 0x1c) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000340)="ba0924799c32039d314305dd0bd1e9dc9103d2383319cdffff7f0000f0666679b01f6fd071a41b1e339a9b65ffd63a427c463deece4e114014082266869d931c097e871a00420abb53c83d33317e4cc48662027233ed576eb1a10cd9fa8ed05a5b9271ee1586f43be1fd2675329315fd788853e6cd487dbc82d295ad23ab43cde1993ab0bc651361ed0d1b83355b7f4811ec9193c8682044e22402b5f75bb27a2b271d4487738f17dad7d992e1e033c2bd6e3611e054e88624b33915289a647e028868", 0xc3, 0x2004c805, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/219, 0xdb}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/189, 0xbd}], 0x2, &(0x7f0000006940)=""/78, 0x4e}, 0xfffffffc}, {{&(0x7f00000069c0)=@un=@abs, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/209, 0xd1}], 0x1, &(0x7f0000006b80)=""/77, 0x4d}, 0x4}], 0x4, 0x1, 0x0) 10:28:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/stat\x00', 0x0, 0x0) add_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000140)="dee7030022cf9e5e1dbac27b0426fc0299c41fb9b9761a1b44dac894f365ae68edf335abf35ec53d6751467ebd2c187491bcab2c8d34fec505fc8a14622dba33ff9b054eb7e8a5bc4ab2719cb23032", 0x4f, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000001d80)={'syz', 0x1, 0x2e}, 0x0) request_key(&(0x7f00000004c0)='rxrpc\x00', &(0x7f0000000600)={'syz', 0x1}, &(0x7f0000000640)='nl80211\x00', 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) dup(0xffffffffffffffff) preadv(r1, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000500)=""/175, 0xaf}, {0x0}], 0x3, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) 10:28:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0xd, 0x70, 0x40, 0x3, 0x80, 0x0, 0x0, 0x4, 0x4008, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x7, @perf_bp={&(0x7f00000000c0), 0x4}, 0x800, 0x7, 0x7e, 0x7, 0x400, 0x401}, r0, 0x1, 0xffffffffffffffff, 0x10) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000f13000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r4, r5, 0x0, 0x320f) 10:28:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r3, r4, 0x0, 0x320f) 10:28:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000003c0)={'veth1_vlan\x00', &(0x7f0000000380)=@ethtool_gstrings={0x1b, 0x4}}) 10:28:29 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0xd, 0x70, 0x40, 0x3, 0x80, 0x0, 0x0, 0x4, 0x4008, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x7, 0x7e, 0x7, 0x400, 0x401}, r0, 0x1, 0xffffffffffffffff, 0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) syz_open_procfs(0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f13000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') sendfile(r2, r3, 0x0, 0x320f) [ 228.084522][ T8673] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 10:28:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) close(r0) 10:28:30 executing program 3: futex(&(0x7f0000000100), 0x800000000006, 0x0, &(0x7f0000000080)={0x77359400}, 0x0, 0x3) pipe(&(0x7f0000000180)) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f00000001c0)) dup(r0) setns(0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000140)=0xd0, 0x2) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0xfffffe7e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bc, 0xc000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x1ff}, &(0x7f0000000440)={0x0, r2+30000000}, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x13) 10:28:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001}, 0x1c) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000340)="ba0924799c32039d314305dd0bd1e9dc9103d2383319cdffff7f0000f0666679b01f6fd071a41b1e339a9b65ffd63a427c463deece4e114014082266869d931c097e871a00420abb53c83d33317e4cc48662027233ed576eb1a10cd9fa8ed05a5b9271ee1586f43be1fd2675329315fd788853e6cd487dbc82d295ad23ab43cde1993ab0bc651361ed0d1b83355b7f4811ec9193c8682044e22402b5f75bb27a2b271d4487738f17dad7d992e1e033c2bd6e3611e054e88624b33915289a647e028868", 0xc3, 0x2004c805, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/219, 0xdb}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/189, 0xbd}], 0x2, &(0x7f0000006940)=""/78, 0x4e}, 0xfffffffc}, {{&(0x7f00000069c0)=@un=@abs, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/209, 0xd1}], 0x1, &(0x7f0000006b80)=""/77, 0x4d}, 0x4}], 0x4, 0x1, 0x0) 10:28:30 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) write$binfmt_aout(r2, &(0x7f0000000240)=ANY=[], 0xfffffd2d) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fcntl$setpipe(r1, 0x407, 0x6e) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x9, 0x3}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x64, 0x0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0x3}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'veth1\x00'}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x80, 0x1}}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'team0\x00'}]}, 0x64}}, 0x20004800) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x67b45432ed9c7e67, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 10:28:30 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1}, 0x0) pipe(0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0xfffffd2d) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x6e) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 10:28:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000100), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[], 0xfffffd2d) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x9, 0x3, 0x0, 0x0, 0x1000002}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x67b45432ed9c7e67, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 10:28:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001}, 0x1c) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000340)="ba0924799c32039d314305dd0bd1e9dc9103d2383319cdffff7f0000f0666679b01f6fd071a41b1e339a9b65ffd63a427c463deece4e114014082266869d931c097e871a00420abb53c83d33317e4cc48662027233ed576eb1a10cd9fa8ed05a5b9271ee1586f43be1fd2675329315fd788853e6cd487dbc82d295ad23ab43cde1993ab0bc651361ed0d1b83355b7f4811ec9193c8682044e22402b5f75bb27a2b271d4487738f17dad7d992e1e033c2bd6e3611e054e88624b33915289a647e028868", 0xc3, 0x2004c805, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/219, 0xdb}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/189, 0xbd}], 0x2, &(0x7f0000006940)=""/78, 0x4e}, 0xfffffffc}, {{&(0x7f00000069c0)=@un=@abs, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/209, 0xd1}], 0x1, &(0x7f0000006b80)=""/77, 0x4d}, 0x4}], 0x4, 0x1, 0x0) 10:28:30 executing program 0: r0 = socket$inet6(0x10, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003080)={0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="5500000018007f5f00fe01b2a4a29093020604000272000102f908003900090035000c030b00000019000b0000081101000022dc1338d54404009b84136ef75afb83de4411000500", 0x48}, {&(0x7f0000000200)="7200f55c61762244b154f5c600", 0xd}], 0x2}, 0x0) 10:28:30 executing program 3: open(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000240)=0x8d) sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f00000004c0)="5d6d014e0433c1135418b940808ffe0a", 0x10}], 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) write$P9_RUNLINKAT(r5, &(0x7f00000002c0)={0x7, 0x4d, 0x1}, 0x7) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b828becc03555e5689d91b59672a8b298a679507003ff2ea0130397f747843a708b0c132a8994aff03000000000000dfe3e71bf847784a5a000000"], 0x31) 10:28:30 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff}}) 10:28:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000002840)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000180)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7fffffff, 0x0, [{0x0, 0x2}]}}) 10:28:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001}, 0x1c) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000340)="ba0924799c32039d314305dd0bd1e9dc9103d2383319cdffff7f0000f0666679b01f6fd071a41b1e339a9b65ffd63a427c463deece4e114014082266869d931c097e871a00420abb53c83d33317e4cc48662027233ed576eb1a10cd9fa8ed05a5b9271ee1586f43be1fd2675329315fd788853e6cd487dbc82d295ad23ab43cde1993ab0bc651361ed0d1b83355b7f4811ec9193c8682044e22402b5f75bb27a2b271d4487738f17dad7d992e1e033c2bd6e3611e054e88624b33915289a647e028868", 0xc3, 0x2004c805, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/219, 0xdb}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/189, 0xbd}], 0x2, &(0x7f0000006940)=""/78, 0x4e}, 0xfffffffc}, {{&(0x7f00000069c0)=@un=@abs, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/209, 0xd1}], 0x1, &(0x7f0000006b80)=""/77, 0x4d}, 0x4}], 0x4, 0x1, 0x0) 10:28:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="000000000000000026e81a719473e20b8ce0a5ecec898240f139d3e8b8a327b662d6f91b3c64310b5df60bda35aa1dcdd119c099e23d56060098a5b59af4fc99a63c2aa0b42c08b32a023f2591f462b4131f062e50d220f372994bca6ea78437e2d108402c38f22dcb242e18195b84670ca807edc395e357a150e7539e178a225cf0e7e668a93c4e6fa995c2e8c315be9d48cbfa90950f7e99f661be6da8"], 0x8) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000080)=0x800, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 10:28:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=@newlink={0x60, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_XMIT_HASH_POLICY={0x5}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}, @IFLA_BROADCAST={0xa}, @IFLA_MASTER={0x8}, @IFLA_MTU={0x8, 0x4, 0x9642}]}, 0x60}}, 0x0) 10:28:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001}, 0x1c) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000006c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/219, 0xdb}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/189, 0xbd}], 0x2, &(0x7f0000006940)=""/78, 0x4e}, 0xfffffffc}, {{&(0x7f00000069c0)=@un=@abs, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/209, 0xd1}], 0x1, &(0x7f0000006b80)=""/77, 0x4d}, 0x4}], 0x4, 0x1, 0x0) 10:28:31 executing program 2: mlockall(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x800000000000000, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) [ 229.511335][ T8756] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 229.682361][ C1] hrtimer: interrupt took 27632 ns 10:28:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001}, 0x1c) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000006c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/219, 0xdb}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/189, 0xbd}], 0x2, &(0x7f0000006940)=""/78, 0x4e}, 0xfffffffc}, {{&(0x7f00000069c0)=@un=@abs, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/209, 0xd1}], 0x1, &(0x7f0000006b80)=""/77, 0x4d}, 0x4}], 0x4, 0x1, 0x0) 10:28:31 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4) ioctl$GIO_SCRNMAP(r1, 0x4b40, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81) memfd_create(0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000fffffffd) 10:28:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001}, 0x1c) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r1, &(0x7f0000006c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/219, 0xdb}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/189, 0xbd}], 0x2, &(0x7f0000006940)=""/78, 0x4e}, 0xfffffffc}, {{&(0x7f00000069c0)=@un=@abs, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/209, 0xd1}], 0x1, &(0x7f0000006b80)=""/77, 0x4d}, 0x4}], 0x4, 0x1, 0x0) 10:28:31 executing program 0: socket$nl_route(0x10, 0x3, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000001200)={0x4c000000, 0x103, 0x3, 0x0}) 10:28:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 10:28:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000100), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[], 0xfffffd2d) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x9, 0x3, 0x0, 0x0, 0x1000002}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x67b45432ed9c7e67, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 10:28:31 executing program 2: mlockall(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x800000000000000, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) 10:28:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x20, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x4e8}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$hwrng(0xffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4c8]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0x8001}) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 10:28:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001}, 0x1c) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000340)="ba0924799c32039d314305dd0bd1e9dc9103d2383319cdffff7f0000f0666679b01f6fd071a41b1e339a9b65ffd63a427c463deece4e114014082266869d931c097e871a00420abb53c83d33317e4cc48662027233ed576eb1a10cd9fa8ed05a5b9271ee1586f43be1fd2675329315fd788853e6cd487dbc82d295ad23ab43cde1993ab0bc651361ed0d1b83355b7f4811ec9193c8682044e22402b5f75bb27a2b271d4487738f17dad7d992e1e033c2bd6e3611e054e88624b33915289a647e028868", 0xc3, 0x2004c805, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/219, 0xdb}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/189, 0xbd}], 0x2, &(0x7f0000006940)=""/78, 0x4e}, 0xfffffffc}, {{&(0x7f00000069c0)=@un=@abs, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/209, 0xd1}], 0x1, &(0x7f0000006b80)=""/77, 0x4d}, 0x4}], 0x4, 0x1, 0x0) 10:28:32 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4) ioctl$GIO_SCRNMAP(r1, 0x4b40, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81) memfd_create(0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000fffffffd) 10:28:32 executing program 2: mlockall(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x800000000000000, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) [ 230.470178][ T8839] kvm: pic: single mode not supported [ 230.470248][ T8839] kvm: pic: level sensitive irq not supported [ 230.515624][ T8839] kvm: pic: single mode not supported [ 230.564690][ T8839] kvm: pic: single mode not supported [ 230.570320][ T8839] kvm: pic: level sensitive irq not supported [ 230.593226][ T8839] kvm: pic: single mode not supported 10:28:32 executing program 3: open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000040)=ANY=[@ANYBLOB="29000000010000000b"], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') getdents64(r0, &(0x7f0000000140)=""/238, 0xee) [ 230.599494][ T8839] kvm: pic: level sensitive irq not supported [ 230.633405][ T8839] kvm: pic: single mode not supported 10:28:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001}, 0x1c) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000340)="ba0924799c32039d314305dd0bd1e9dc9103d2383319cdffff7f0000f0666679b01f6fd071a41b1e339a9b65ffd63a427c463deece4e114014082266869d931c097e871a00420abb53c83d33317e4cc48662027233ed576eb1a10cd9fa8ed05a5b9271ee1586f43be1fd2675329315fd788853e6cd487dbc82d295ad23ab43cde1993ab0bc651361ed0d1b83355b7f4811ec9193c8682044e22402b5f75bb27a2b271d4487738f17dad7d992e1e033c2bd6e3611e054e88624b33915289a647e028868", 0xc3, 0x2004c805, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/219, 0xdb}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/189, 0xbd}], 0x2, &(0x7f0000006940)=""/78, 0x4e}, 0xfffffffc}, {{&(0x7f00000069c0)=@un=@abs, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/209, 0xd1}], 0x1, &(0x7f0000006b80)=""/77, 0x4d}, 0x4}], 0x4, 0x1, 0x0) [ 230.639810][ T8839] kvm: pic: level sensitive irq not supported [ 230.689147][ T8839] kvm: pic: single mode not supported [ 230.695336][ T8839] kvm: pic: level sensitive irq not supported [ 230.743088][ T8839] kvm: pic: single mode not supported [ 230.778128][ T8839] kvm: pic: single mode not supported 10:28:32 executing program 2: mlockall(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x800000000000000, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) [ 230.783620][ T8839] kvm: pic: level sensitive irq not supported [ 230.824553][ T8839] kvm: pic: level sensitive irq not supported [ 230.853236][ T8839] kvm: pic: single mode not supported 10:28:32 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000100), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[], 0xfffffd2d) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x9, 0x3, 0x0, 0x0, 0x1000002}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x67b45432ed9c7e67, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) 10:28:32 executing program 3: mlockall(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getsockname(r0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000040)={0x31, 0x4, 0x0, {0x0, 0x800, 0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x31) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x800000000000000, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) 10:28:32 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4) ioctl$GIO_SCRNMAP(r1, 0x4b40, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81) memfd_create(0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000fffffffd) 10:28:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001}, 0x1c) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000340)="ba0924799c32039d314305dd0bd1e9dc9103d2383319cdffff7f0000f0666679b01f6fd071a41b1e339a9b65ffd63a427c463deece4e114014082266869d931c097e871a00420abb53c83d33317e4cc48662027233ed576eb1a10cd9fa8ed05a5b9271ee1586f43be1fd2675329315fd788853e6cd487dbc82d295ad23ab43cde1993ab0bc651361ed0d1b83355b7f4811ec9193c8682044e22402b5f75bb27a2b271d4487738f17dad7d992e1e033c2bd6e3611e054e88624b33915289a647e028868", 0xc3, 0x2004c805, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/219, 0xdb}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/189, 0xbd}], 0x2, &(0x7f0000006940)=""/78, 0x4e}, 0xfffffffc}, {{&(0x7f00000069c0)=@un=@abs, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/209, 0xd1}], 0x1, &(0x7f0000006b80)=""/77, 0x4d}, 0x4}], 0x4, 0x1, 0x0) 10:28:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2000, 0x121041) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x12, 0x9}], 0x10) 10:28:32 executing program 2: mlockall(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x800000000000000, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) 10:28:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001}, 0x1c) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000340)="ba0924799c32039d314305dd0bd1e9dc9103d2383319cdffff7f0000f0666679b01f6fd071a41b1e339a9b65ffd63a427c463deece4e114014082266869d931c097e871a00420abb53c83d33317e4cc48662027233ed576eb1a10cd9fa8ed05a5b9271ee1586f43be1fd2675329315fd788853e6cd487dbc82d295ad23ab43cde1993ab0bc651361ed0d1b83355b7f4811ec9193c8682044e22402b5f75bb27a2b271d4487738f17dad7d992e1e033c2bd6e3611e054e88624b33915289a647e028868", 0xc3, 0x2004c805, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/219, 0xdb}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/189, 0xbd}], 0x2, &(0x7f0000006940)=""/78, 0x4e}, 0xfffffffc}, {{&(0x7f00000069c0)=@un=@abs, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/209, 0xd1}], 0x1, &(0x7f0000006b80)=""/77, 0x4d}, 0x4}], 0x4, 0x1, 0x0) 10:28:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2000, 0x121041) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x12}], 0x10) 10:28:33 executing program 3: mlockall(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getsockname(r0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x3da, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000040)={0x31, 0x4, 0x0, {0x0, 0x800, 0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x31) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x800000000000000, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) 10:28:33 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4) ioctl$GIO_SCRNMAP(r1, 0x4b40, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81) memfd_create(0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0) ftruncate(r3, 0x7fff) sendfile(r1, r3, 0x0, 0x8000fffffffd) 10:28:33 executing program 2: mlockall(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x3, 0x800000000000000, 0x21000000, &(0x7f0000fff000/0x1000)=nil}) socket$inet_udp(0x2, 0x2, 0x0) 10:28:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001}, 0x1c) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000340)="ba0924799c32039d314305dd0bd1e9dc9103d2383319cdffff7f0000f0666679b01f6fd071a41b1e339a9b65ffd63a427c463deece4e114014082266869d931c097e871a00420abb53c83d33317e4cc48662027233ed576eb1a10cd9fa8ed05a5b9271ee1586f43be1fd2675329315fd788853e6cd487dbc82d295ad23ab43cde1993ab0bc651361ed0d1b83355b7f4811ec9193c8682044e22402b5f75bb27a2b271d4487738f17dad7d992e1e033c2bd6e3611e054e88624b33915289a647e028868", 0xc3, 0x2004c805, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/219, 0xdb}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/189, 0xbd}], 0x2, &(0x7f0000006940)=""/78, 0x4e}, 0xfffffffc}, {{&(0x7f00000069c0)=@un=@abs, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/209, 0xd1}], 0x1, &(0x7f0000006b80)=""/77, 0x4d}, 0x4}], 0x4, 0x1, 0x0) [ 230.866194][ T8839] kvm: pic: single mode not supported [ 231.732077][ T8912] ================================================================== [ 231.745967][ T8912] BUG: KASAN: slab-out-of-bounds in gfn_to_hva+0x4a0/0x4c0 [ 231.753291][ T8912] Read of size 8 at addr ffff88809de76468 by task syz-executor.2/8912 [ 231.761462][ T8912] [ 231.763799][ T8912] CPU: 1 PID: 8912 Comm: syz-executor.2 Not tainted 5.7.0-rc1-syzkaller #0 [ 231.772390][ T8912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.782463][ T8912] Call Trace: [ 231.785769][ T8912] dump_stack+0x188/0x20d [ 231.790124][ T8912] print_address_description.constprop.0.cold+0xd3/0x315 [ 231.797194][ T8912] ? gfn_to_hva+0x4a0/0x4c0 [ 231.801724][ T8912] __kasan_report.cold+0x35/0x4d [ 231.806675][ T8912] ? gfn_to_hva+0x4a0/0x4c0 [ 231.811194][ T8912] ? gfn_to_hva+0x4a0/0x4c0 [ 231.815709][ T8912] kasan_report+0x33/0x50 [ 231.820053][ T8912] gfn_to_hva+0x4a0/0x4c0 [ 231.824404][ T8912] kvm_arch_mmu_notifier_invalidate_range+0x21/0x80 [ 231.831015][ T8912] kvm_mmu_notifier_invalidate_range_start+0x1a1/0x280 [ 231.837888][ T8912] ? kvm_flush_remote_tlbs+0x120/0x120 [ 231.843364][ T8912] __mmu_notifier_invalidate_range_start+0x4bc/0x6b0 [ 231.850081][ T8912] change_protection+0x1ed0/0x2710 [ 231.855224][ T8912] ? __vma_adjust+0xbf6/0x1c50 [ 231.860010][ T8912] ? prot_none_pte_entry+0x150/0x150 [ 231.865310][ T8912] ? vma_wants_writenotify+0x223/0x4f0 [ 231.870799][ T8912] ? vma_set_page_prot+0x19c/0x250 [ 231.875927][ T8912] mprotect_fixup+0x46c/0x940 [ 231.880626][ T8912] ? change_protection+0x2710/0x2710 [ 231.885949][ T8912] ? vmacache_find+0x62/0x300 [ 231.890653][ T8912] ? apparmor_file_mprotect+0xe8/0x110 [ 231.896130][ T8912] do_mprotect_pkey+0x542/0x950 [ 231.901022][ T8912] ? mprotect_fixup+0x940/0x940 [ 231.905887][ T8912] ? handle_mm_fault+0x29e/0x660 [ 231.910839][ T8912] ? trace_hardirqs_off_caller+0x55/0x230 [ 231.916579][ T8912] __x64_sys_mprotect+0x74/0xb0 [ 231.921465][ T8912] ? lockdep_hardirqs_on+0x463/0x620 [ 231.926763][ T8912] do_syscall_64+0xf6/0x7d0 [ 231.931365][ T8912] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 231.937263][ T8912] RIP: 0033:0x45c987 [ 231.941164][ T8912] Code: 00 00 00 b8 0b 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 0a 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.960874][ T8912] RSP: 002b:0000000000c7fb08 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 231.969304][ T8912] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 000000000045c987 [ 231.977317][ T8912] RDX: 0000000000000000 RSI: 0000000000001000 RDI: 00007fe88dd4c000 [ 231.985389][ T8912] RBP: 0000000000c7fbf0 R08: 00000000007217e0 R09: 00000000007217e0 [ 231.993377][ T8912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000c7fce0 [ 232.001372][ T8912] R13: 00007fe88dd6c700 R14: 00007fe88dd6c9c0 R15: 000000000076bfac [ 232.009395][ T8912] [ 232.011738][ T8912] Allocated by task 8917: [ 232.016510][ T8912] save_stack+0x1b/0x40 [ 232.020698][ T8912] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 232.026358][ T8912] kvmalloc_node+0x61/0xf0 [ 232.030784][ T8912] kvm_set_memslot+0x115/0x1530 [ 232.035645][ T8912] __kvm_set_memory_region+0xcf7/0x1320 [ 232.041197][ T8912] kvm_set_memory_region+0x29/0x50 [ 232.046406][ T8912] kvm_vm_ioctl+0x678/0x23e0 [ 232.051010][ T8912] ksys_ioctl+0x11a/0x180 [ 232.055368][ T8912] __x64_sys_ioctl+0x6f/0xb0 [ 232.059972][ T8912] do_syscall_64+0xf6/0x7d0 [ 232.064492][ T8912] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 232.070386][ T8912] [ 232.072719][ T8912] Freed by task 7475: [ 232.076743][ T8912] save_stack+0x1b/0x40 [ 232.080909][ T8912] __kasan_slab_free+0xf7/0x140 [ 232.085774][ T8912] kfree+0x109/0x2b0 [ 232.089680][ T8912] kvfree+0x42/0x50 [ 232.093502][ T8912] __do_replace+0x6a3/0x8c0 [ 232.098027][ T8912] do_ip6t_set_ctl+0x2e8/0x457 [ 232.102800][ T8912] nf_setsockopt+0x6f/0xc0 [ 232.107222][ T8912] ipv6_setsockopt+0x145/0x180 [ 232.111994][ T8912] tcp_setsockopt+0x86/0xd0 [ 232.116507][ T8912] __sys_setsockopt+0x248/0x480 [ 232.121380][ T8912] __x64_sys_setsockopt+0xba/0x150 [ 232.126498][ T8912] do_syscall_64+0xf6/0x7d0 [ 232.131017][ T8912] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 232.136906][ T8912] [ 232.139242][ T8912] The buggy address belongs to the object at ffff88809de76000 [ 232.139242][ T8912] which belongs to the cache kmalloc-2k of size 2048 [ 232.153340][ T8912] The buggy address is located 1128 bytes inside of [ 232.153340][ T8912] 2048-byte region [ffff88809de76000, ffff88809de76800) [ 232.166796][ T8912] The buggy address belongs to the page: [ 232.172443][ T8912] page:ffffea0002779d80 refcount:1 mapcount:0 mapping:0000000045b2df41 index:0x0 [ 232.181562][ T8912] flags: 0xfffe0000000200(slab) [ 232.186459][ T8912] raw: 00fffe0000000200 ffffea00027a3a88 ffffea00022cf9c8 ffff8880aa000e00 [ 232.195061][ T8912] raw: 0000000000000000 ffff88809de76000 0000000100000001 0000000000000000 [ 232.203677][ T8912] page dumped because: kasan: bad access detected [ 232.210091][ T8912] [ 232.212424][ T8912] Memory state around the buggy address: [ 232.218080][ T8912] ffff88809de76300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 232.226280][ T8912] ffff88809de76380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 232.234380][ T8912] >ffff88809de76400: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc [ 232.242546][ T8912] ^ [ 232.250015][ T8912] ffff88809de76480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 232.258103][ T8912] ffff88809de76500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 232.266180][ T8912] ================================================================== [ 232.274252][ T8912] Disabling lock debugging due to kernel taint 10:28:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000100), 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[], 0xfffffd2d) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x9, 0x3, 0x0, 0x0, 0x1000002}, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x67b45432ed9c7e67, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:28:34 executing program 0: 10:28:34 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4) ioctl$GIO_SCRNMAP(r1, 0x4b40, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81) memfd_create(0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0) sendfile(r1, r3, 0x0, 0x8000fffffffd) 10:28:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001}, 0x1c) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000340)="ba0924799c32039d314305dd0bd1e9dc9103d2383319cdffff7f0000f0666679b01f6fd071a41b1e339a9b65ffd63a427c463deece4e114014082266869d931c097e871a00420abb53c83d33317e4cc48662027233ed576eb1a10cd9fa8ed05a5b9271ee1586f43be1fd2675329315fd788853e6cd487dbc82d295ad23ab43cde1993ab0bc651361ed0d1b83355b7f4811ec9193c8682044e22402b5f75bb27a2b271d4487738f17dad7d992e1e033c2bd6e3611e054e88624b33915289a647e028868", 0xc3, 0x2004c805, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/219, 0xdb}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/189, 0xbd}], 0x2, &(0x7f0000006940)=""/78, 0x4e}, 0xfffffffc}, {{&(0x7f00000069c0)=@un=@abs, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/209, 0xd1}], 0x1, &(0x7f0000006b80)=""/77, 0x4d}, 0x4}], 0x4, 0x1, 0x0) 10:28:34 executing program 0: 10:28:34 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000140)=0x3, 0x4) ioctl$GIO_SCRNMAP(r1, 0x4b40, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000180)=ANY=[@ANYBLOB="010002000000000048b88a96ff969a4db16bc904b78f5780d46626f620205b977047d055198470eb3f3b4b62ab077002fc8941098fb776d1b0313e7d28ee970b4b6406f6f6cfcb90ca91e4d4347f8875499794200000000000000062e077d5b6b2a0121232344196d3c00bc1618de741d909af2858a84fc017ef13c6a03f4496ac08d5010400000000000091e57095c31962fd9bff54a7b2dc3a30a5e2ea15ec58a378c92724213ecf8d0f9164606f87439b2fd1193806831d4b4ef34c0d45cdcd65ce0dce3d89b7a3a7fe064cdd8f8053f32acdb192f7a15827edcebd8373495c90b41932398d468acbc5d432a617e49ac23431497c44b802fc1a89956192592c7420a222f3c282da09bab729010000000000000000000000000000005bb56bb540403727f65663f85b7f1a365eb952e0d5017bd8adb507025870248a6ca6e6ee1f7bbd5187a9943315033c787978fcbcfd82eb777038801d618137033540747af6db017304cbbf8e87b9422b6103001600000000000000000000290000a7cbcbdde00000000000000000000100000015f6fd165f8e60d062b2b89497648acdd7e2c07dd376a26a555ad9005f0bc752671c9bb88588b348ad209788db95aa249f65b29b5480ac3e408b374eb700344b99448e7f1f0f0efe45f191e81c07efbcde8bee97de3cbbc297b355d3f683f04d1bcbfd60a2b573ab2566601ce95551a4e3ba2feb1253fff860a3aed9d54599565c2a987c5ab19ce269c2d5ebc3495ebe9ac9eeb46d120000000000009855273616b47461e6ddaf625aa8b61294f715edd876ac4f6399b220e4d63dd39ee33b32fc88d258b931d4867244fa009c68477bf1bd4d3133d64086d59240ef3cda025e6c1c8564f348bbe89c37eb4197103a93bd6c3b0b2c4290ea8aa5d16ee33fa0b230aa3d7f838718d9b8beacd75762df37703ae7519218ae87"], 0x8) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x81) memfd_create(0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, r2, 0x0) sendfile(r1, r3, 0x0, 0x8000fffffffd) 10:28:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001}, 0x1c) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009ff000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000340)="ba0924799c32039d314305dd0bd1e9dc9103d2383319cdffff7f0000f0666679b01f6fd071a41b1e339a9b65ffd63a427c463deece4e114014082266869d931c097e871a00420abb53c83d33317e4cc48662027233ed576eb1a10cd9fa8ed05a5b9271ee1586f43be1fd2675329315fd788853e6cd487dbc82d295ad23ab43cde1993ab0bc651361ed0d1b83355b7f4811ec9193c8682044e22402b5f75bb27a2b271d4487738f17dad7d992e1e033c2bd6e3611e054e88624b33915289a647e028868", 0xc3, 0x2004c805, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000440)=""/219, 0xdb}], 0x1}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/189, 0xbd}], 0x2, &(0x7f0000006940)=""/78, 0x4e}, 0xfffffffc}, {{&(0x7f00000069c0)=@un=@abs, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006a40)=""/209, 0xd1}], 0x1, &(0x7f0000006b80)=""/77, 0x4d}, 0x4}], 0x4, 0x1, 0x0) 10:28:34 executing program 0: [ 233.260637][ T8912] Kernel panic - not syncing: panic_on_warn set ... [ 233.267288][ T8912] CPU: 0 PID: 8912 Comm: syz-executor.2 Tainted: G B 5.7.0-rc1-syzkaller #0 [ 233.277283][ T8912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.287343][ T8912] Call Trace: [ 233.290642][ T8912] dump_stack+0x188/0x20d [ 233.295014][ T8912] panic+0x2e3/0x75c [ 233.298919][ T8912] ? add_taint.cold+0x16/0x16 [ 233.303606][ T8912] ? preempt_schedule_common+0x5e/0xc0 [ 233.309338][ T8912] ? gfn_to_hva+0x4a0/0x4c0 [ 233.313869][ T8912] ? preempt_schedule_thunk+0x16/0x18 [ 233.319251][ T8912] ? trace_hardirqs_on+0x55/0x220 [ 233.324283][ T8912] ? gfn_to_hva+0x4a0/0x4c0 [ 233.328890][ T8912] end_report+0x4d/0x53 [ 233.333053][ T8912] __kasan_report.cold+0xd/0x4d [ 233.337912][ T8912] ? gfn_to_hva+0x4a0/0x4c0 [ 233.342431][ T8912] ? gfn_to_hva+0x4a0/0x4c0 [ 233.346938][ T8912] kasan_report+0x33/0x50 [ 233.351266][ T8912] gfn_to_hva+0x4a0/0x4c0 [ 233.355594][ T8912] kvm_arch_mmu_notifier_invalidate_range+0x21/0x80 [ 233.362215][ T8912] kvm_mmu_notifier_invalidate_range_start+0x1a1/0x280 [ 233.369070][ T8912] ? kvm_flush_remote_tlbs+0x120/0x120 [ 233.374546][ T8912] __mmu_notifier_invalidate_range_start+0x4bc/0x6b0 [ 233.381225][ T8912] change_protection+0x1ed0/0x2710 [ 233.386429][ T8912] ? __vma_adjust+0xbf6/0x1c50 [ 233.391192][ T8912] ? prot_none_pte_entry+0x150/0x150 [ 233.396476][ T8912] ? vma_wants_writenotify+0x223/0x4f0 [ 233.401940][ T8912] ? vma_set_page_prot+0x19c/0x250 [ 233.407052][ T8912] mprotect_fixup+0x46c/0x940 [ 233.411734][ T8912] ? change_protection+0x2710/0x2710 [ 233.417021][ T8912] ? vmacache_find+0x62/0x300 [ 233.421700][ T8912] ? apparmor_file_mprotect+0xe8/0x110 [ 233.427163][ T8912] do_mprotect_pkey+0x542/0x950 [ 233.432035][ T8912] ? mprotect_fixup+0x940/0x940 [ 233.436881][ T8912] ? handle_mm_fault+0x29e/0x660 [ 233.441826][ T8912] ? trace_hardirqs_off_caller+0x55/0x230 [ 233.447549][ T8912] __x64_sys_mprotect+0x74/0xb0 [ 233.452404][ T8912] ? lockdep_hardirqs_on+0x463/0x620 [ 233.457693][ T8912] do_syscall_64+0xf6/0x7d0 [ 233.462199][ T8912] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 233.468094][ T8912] RIP: 0033:0x45c987 [ 233.471983][ T8912] Code: 00 00 00 b8 0b 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 0a 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 233.491588][ T8912] RSP: 002b:0000000000c7fb08 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 233.500008][ T8912] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 000000000045c987 [ 233.507974][ T8912] RDX: 0000000000000000 RSI: 0000000000001000 RDI: 00007fe88dd4c000 [ 233.515941][ T8912] RBP: 0000000000c7fbf0 R08: 00000000007217e0 R09: 00000000007217e0 [ 233.523909][ T8912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000c7fce0 [ 233.531876][ T8912] R13: 00007fe88dd6c700 R14: 00007fe88dd6c9c0 R15: 000000000076bfac [ 233.541057][ T8912] Kernel Offset: disabled [ 233.545415][ T8912] Rebooting in 86400 seconds..