[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 58.119859][ T27] audit: type=1800 audit(1575357872.685:25): pid=8806 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 58.155386][ T27] audit: type=1800 audit(1575357872.685:26): pid=8806 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 58.195770][ T27] audit: type=1800 audit(1575357872.685:27): pid=8806 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.1.50' (ECDSA) to the list of known hosts. 2019/12/03 07:24:44 fuzzer started 2019/12/03 07:24:46 dialing manager at 10.128.0.26:44481 2019/12/03 07:24:46 syscalls: 2694 2019/12/03 07:24:46 code coverage: enabled 2019/12/03 07:24:46 comparison tracing: enabled 2019/12/03 07:24:46 extra coverage: enabled 2019/12/03 07:24:46 setuid sandbox: enabled 2019/12/03 07:24:46 namespace sandbox: enabled 2019/12/03 07:24:46 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/03 07:24:46 fault injection: enabled 2019/12/03 07:24:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/03 07:24:46 net packet injection: enabled 2019/12/03 07:24:46 net device setup: enabled 2019/12/03 07:24:46 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/03 07:24:46 devlink PCI setup: PCI device 0000:00:10.0 is not available 07:26:36 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@rand_addr="f081d299d622c76a0f18356498b116d4"}, 0x14) 07:26:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040003,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) utime(&(0x7f0000000280)='./file0\x00', 0x0) read$FUSE(r2, &(0x7f00000040c0), 0x14ec) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_ATTR(r2, &(0x7f0000000680)={0x78, 0x0, 0x2, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) syzkaller login: [ 182.323120][ T8971] IPVS: ftp: loaded support on port[0] = 21 [ 182.510820][ T8974] IPVS: ftp: loaded support on port[0] = 21 [ 182.542662][ T8971] chnl_net:caif_netlink_parms(): no params data found 07:26:37 executing program 2: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pipe(0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$inet6(r4, &(0x7f00000060c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) bind$isdn_base(r4, &(0x7f00000000c0)={0x22, 0x0, 0x1, 0x20, 0x5}, 0x6) getuid() accept4(0xffffffffffffffff, &(0x7f0000000000)=@nfc, 0x0, 0x0) ppoll(&(0x7f0000000500)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x800000000000000) [ 182.649600][ T8971] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.662006][ T8971] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.671400][ T8971] device bridge_slave_0 entered promiscuous mode [ 182.681246][ T8971] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.689491][ T8971] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.697798][ T8971] device bridge_slave_1 entered promiscuous mode [ 182.773969][ T8971] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 182.803352][ T8971] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 182.851952][ T8974] chnl_net:caif_netlink_parms(): no params data found [ 182.870142][ T8971] team0: Port device team_slave_0 added [ 182.881092][ T8971] team0: Port device team_slave_1 added 07:26:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x3}, 0x3c) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46600) io_setup(0x0, &(0x7f00000001c0)) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000640)="d4d647", 0x3, 0xfffffffffffffffc}]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), &(0x7f00000006c0)=0x4) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000380)='./file0\x00', 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r3) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, 0x0) keyctl$invalidate(0x15, r4) request_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0xfffffffffffffffb) request_key(&(0x7f00000001c0)='\x02\x00\x00\x00\x00\x00\x00\x00ego\x00', &(0x7f00000004c0)={'\x00', 0x2}, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) mount$9p_xen(&(0x7f0000000200)='net/', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x80000, &(0x7f0000000600)={'trans=xen,', {[{@access_user='access=user'}, {@msize={'msize'}}, {@cache_fscache='cache=fscache'}], [{@audit='audit'}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)}], 0x1}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r5, 0x0, 0xe, 0x1000, &(0x7f0000000100)="a4dbae5a340ce56385b874bfe370", &(0x7f0000002040)=""/4096, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 182.933784][ T8977] IPVS: ftp: loaded support on port[0] = 21 [ 183.000720][ T8971] device hsr_slave_0 entered promiscuous mode [ 183.056649][ T8971] device hsr_slave_1 entered promiscuous mode [ 183.152445][ T8974] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.175560][ T8974] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.195593][ T8974] device bridge_slave_0 entered promiscuous mode 07:26:37 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 183.231221][ T8974] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.246165][ T8974] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.254474][ T8974] device bridge_slave_1 entered promiscuous mode [ 183.317497][ T8979] IPVS: ftp: loaded support on port[0] = 21 [ 183.343784][ T8974] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 183.375839][ T8974] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.438287][ T8971] netdevsim netdevsim0 netdevsim0: renamed from eth0 07:26:38 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)) [ 183.513761][ T8971] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 183.601306][ T8974] team0: Port device team_slave_0 added [ 183.628030][ T8971] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 183.709577][ T8974] team0: Port device team_slave_1 added [ 183.724145][ T8981] IPVS: ftp: loaded support on port[0] = 21 [ 183.735564][ T8971] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 183.788215][ T8977] chnl_net:caif_netlink_parms(): no params data found [ 183.844212][ T8983] IPVS: ftp: loaded support on port[0] = 21 [ 183.898725][ T8974] device hsr_slave_0 entered promiscuous mode [ 183.965891][ T8974] device hsr_slave_1 entered promiscuous mode [ 184.015650][ T8974] debugfs: Directory 'hsr0' with parent '/' already present! [ 184.044953][ T8977] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.052468][ T8977] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.060285][ T8977] device bridge_slave_0 entered promiscuous mode [ 184.069254][ T8977] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.076430][ T8977] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.084132][ T8977] device bridge_slave_1 entered promiscuous mode [ 184.163442][ T8977] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.182787][ T8979] chnl_net:caif_netlink_parms(): no params data found [ 184.202354][ T8977] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.246596][ T8977] team0: Port device team_slave_0 added [ 184.254733][ T8977] team0: Port device team_slave_1 added [ 184.272306][ T8974] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 184.360206][ T8974] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 184.453538][ T8979] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.461231][ T8979] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.469426][ T8979] device bridge_slave_0 entered promiscuous mode [ 184.483666][ T8974] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 184.537669][ T8974] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 184.608960][ T8977] device hsr_slave_0 entered promiscuous mode [ 184.665958][ T8977] device hsr_slave_1 entered promiscuous mode [ 184.705611][ T8977] debugfs: Directory 'hsr0' with parent '/' already present! [ 184.713277][ T8979] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.720424][ T8979] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.728817][ T8979] device bridge_slave_1 entered promiscuous mode [ 184.755006][ T8979] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 184.767636][ T8981] chnl_net:caif_netlink_parms(): no params data found [ 184.801629][ T8979] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 184.861728][ T8977] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 184.930918][ T8977] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 184.990140][ T8977] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 185.040600][ T8977] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 185.098122][ T8979] team0: Port device team_slave_0 added [ 185.107220][ T8979] team0: Port device team_slave_1 added [ 185.124883][ T8983] chnl_net:caif_netlink_parms(): no params data found [ 185.170822][ T8981] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.181351][ T8981] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.189336][ T8981] device bridge_slave_0 entered promiscuous mode [ 185.199145][ T8981] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.206315][ T8981] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.214207][ T8981] device bridge_slave_1 entered promiscuous mode [ 185.234063][ T8983] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.241855][ T8983] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.250424][ T8983] device bridge_slave_0 entered promiscuous mode [ 185.258780][ T8983] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.266076][ T8983] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.273687][ T8983] device bridge_slave_1 entered promiscuous mode [ 185.304069][ T8981] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.329015][ T8981] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.340770][ T8983] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 185.389619][ T8979] device hsr_slave_0 entered promiscuous mode [ 185.446294][ T8979] device hsr_slave_1 entered promiscuous mode [ 185.485670][ T8979] debugfs: Directory 'hsr0' with parent '/' already present! [ 185.496453][ T8971] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.518904][ T8983] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 185.549202][ T8983] team0: Port device team_slave_0 added [ 185.563224][ T8983] team0: Port device team_slave_1 added [ 185.571388][ T8981] team0: Port device team_slave_0 added [ 185.584590][ T8981] team0: Port device team_slave_1 added [ 185.678731][ T8981] device hsr_slave_0 entered promiscuous mode [ 185.728005][ T8981] device hsr_slave_1 entered promiscuous mode [ 185.785688][ T8981] debugfs: Directory 'hsr0' with parent '/' already present! [ 185.848870][ T8983] device hsr_slave_0 entered promiscuous mode [ 185.885998][ T8983] device hsr_slave_1 entered promiscuous mode [ 185.945672][ T8983] debugfs: Directory 'hsr0' with parent '/' already present! [ 185.961458][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 185.970286][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.014972][ T8971] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.038591][ T8979] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 186.077528][ T8979] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 186.145375][ T8981] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 186.183589][ T8979] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 186.238331][ T8979] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 186.278182][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.287521][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.296169][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.303365][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.311439][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 186.321046][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.329556][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.336675][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.344163][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 186.353588][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 186.361767][ T8983] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 186.427795][ T8981] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 186.474378][ T8974] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.492520][ T8983] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 186.549724][ T8981] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 186.602582][ T8981] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 186.659374][ T8977] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.666576][ T8983] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 186.711795][ T8983] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 186.766945][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 186.779646][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 186.788546][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 186.797708][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 186.806449][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 186.816239][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 186.860761][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.872090][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.880435][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 186.892021][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.904207][ T8974] 8021q: adding VLAN 0 to HW filter on device team0 [ 186.928307][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 186.936493][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.944140][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 186.953504][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.961962][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 186.971227][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.979691][ T3110] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.986791][ T3110] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.994843][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.030146][ T8977] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.045725][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.059011][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.068289][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.075508][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.083048][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.121125][ T8971] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.134812][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.144447][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.159094][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.166344][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.174258][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.183138][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.191490][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.198573][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.206525][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.213935][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.221438][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.230207][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.239529][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.271281][ T8974] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 187.282481][ T8974] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 187.299259][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.308534][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.317014][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.326355][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.335113][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.344346][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.353144][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.361845][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.370413][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.378873][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.391260][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.419289][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 187.428165][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.464038][ T8979] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.471631][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.488193][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 187.506972][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.527781][ T8983] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.562935][ T8977] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 187.574189][ T8977] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 187.598113][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 07:26:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{}, "76b8137a1166c329", "7dad73059dcfcce38766286438cb07de", "7ca215b6", "cad138d2700cfa4b"}, 0x28) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 187.612496][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.621631][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.661355][ T8994] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 187.678356][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.687201][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.696377][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.703912][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.743906][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.762748][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.771098][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 187.778980][ T3110] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 187.796425][ T8974] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.802997][ T8977] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.823721][ T8981] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.830706][ T8983] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.832508][ T8979] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.876367][ T8981] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.908766][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.916935][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.941098][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.954130][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.970415][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.977583][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 187.985143][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.993124][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 188.001541][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.010378][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.019356][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.026484][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.034671][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.043948][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.052602][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.059669][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.068079][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.076919][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.085242][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.092335][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.100718][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.108656][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 07:26:42 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x3}, 0x3c) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46600) io_setup(0x0, &(0x7f00000001c0)) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000640)="d4d647", 0x3, 0xfffffffffffffffc}]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), &(0x7f00000006c0)=0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000380)='./file0\x00', 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r3) request_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffb) socket$inet6(0xa, 0x2, 0x0) mount$9p_xen(&(0x7f0000000200)='net/', &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, &(0x7f0000000600)={'trans=xen,', {[{@access_user='access=user'}, {@msize={'msize'}}, {@cache_fscache='cache=fscache'}], [{@audit='audit'}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r4, 0x0, 0xe, 0x1000, &(0x7f0000000100)="a4dbae5a340ce56385b874bfe370", &(0x7f0000002040)=""/4096}, 0x28) [ 188.154363][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 188.175046][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 188.183589][ T8987] bridge0: port 1(bridge_slave_0) entered blocking state [ 188.190704][ T8987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 188.200155][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.209043][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.223945][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.233114][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.261192][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.286044][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.294713][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.310257][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 188.335482][ C1] hrtimer: interrupt took 46233 ns [ 188.365761][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 188.373659][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.455023][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 188.482913][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 188.534733][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 188.578609][ T8987] bridge0: port 2(bridge_slave_1) entered blocking state [ 188.585803][ T8987] bridge0: port 2(bridge_slave_1) entered forwarding state [ 188.594782][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.642609][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.686937][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 188.695962][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.704505][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.726004][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 188.734736][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 188.785147][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 188.803283][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 188.821666][ T8979] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 07:26:43 executing program 1: write$FUSE_GETXATTR(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000011c0)=@req3={0x0, 0xf0, 0x4, 0x0, 0xc8, 0x0, 0x100}, 0x1c) syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x2000) ioctl$SIOCX25GDTEFACILITIES(r1, 0x89ea, &(0x7f0000000140)) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) [ 188.837158][ T8979] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.866728][ T8983] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 188.901440][ T8983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 188.915660][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.924127][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.940702][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 188.952088][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 188.970816][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 188.983518][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 188.995082][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 189.062520][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 189.070786][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 189.089177][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 189.101622][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 07:26:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x3}, 0x3c) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46600) io_setup(0x0, &(0x7f00000001c0)) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000640)="d4d647", 0x3, 0xfffffffffffffffc}]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), &(0x7f00000006c0)=0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000380)='./file0\x00', 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r3) request_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffb) socket$inet6(0xa, 0x2, 0x0) mount$9p_xen(&(0x7f0000000200)='net/', &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, &(0x7f0000000600)={'trans=xen,', {[{@access_user='access=user'}, {@msize={'msize'}}, {@cache_fscache='cache=fscache'}], [{@audit='audit'}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r4, 0x0, 0xe, 0x1000, &(0x7f0000000100)="a4dbae5a340ce56385b874bfe370", &(0x7f0000002040)=""/4096}, 0x28) [ 189.113642][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 189.157787][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 189.192571][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 189.223152][ T8981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 189.281650][ T8979] 8021q: adding VLAN 0 to HW filter on device batadv0 07:26:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x3}, 0x3c) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46600) io_setup(0x0, &(0x7f00000001c0)) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000640)="d4d647", 0x3, 0xfffffffffffffffc}]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), &(0x7f00000006c0)=0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000380)='./file0\x00', 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r3) request_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffb) socket$inet6(0xa, 0x2, 0x0) mount$9p_xen(&(0x7f0000000200)='net/', &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, &(0x7f0000000600)={'trans=xen,', {[{@access_user='access=user'}, {@msize={'msize'}}, {@cache_fscache='cache=fscache'}], [{@audit='audit'}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r4, 0x0, 0xe, 0x1000, &(0x7f0000000100)="a4dbae5a340ce56385b874bfe370", &(0x7f0000002040)=""/4096}, 0x28) 07:26:44 executing program 2: r0 = getpid() sched_setattr(r0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x1}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, 0x0) 07:26:44 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = open(0x0, 0x0, 0x40) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 07:26:44 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000080)="1b0000001e0025eaa87865f51ef6580a000000000000f20182ab00", 0x289) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x6}, 0x28, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r1 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0xa6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = socket$kcm(0x11, 0xa, 0x300) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) fsetxattr$system_posix_acl(r3, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="020000000100eb8000000000020001", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ceead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c2650306152e474b", @ANYBLOB='\x00', @ANYRES32=0x0, @ANYRESHEX=r5, @ANYRESDEC=r7], 0x8, 0x1) r8 = socket(0xa, 0x3, 0x8) r9 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) sendmsg$key(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) [ 189.921451][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 189.929850][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.115740][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 190.121716][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:26:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x3}, 0x3c) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46600) io_setup(0x0, &(0x7f00000001c0)) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000640)="d4d647", 0x3, 0xfffffffffffffffc}]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), &(0x7f00000006c0)=0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000380)='./file0\x00', 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r3) request_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffb) socket$inet6(0xa, 0x2, 0x0) mount$9p_xen(&(0x7f0000000200)='net/', &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, &(0x7f0000000600)={'trans=xen,', {[{@access_user='access=user'}, {@msize={'msize'}}, {@cache_fscache='cache=fscache'}], [{@audit='audit'}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r4, 0x0, 0xe, 0x1000, &(0x7f0000000100)="a4dbae5a340ce56385b874bfe370", &(0x7f0000002040)=""/4096}, 0x28) [ 190.170744][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.180815][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.193327][ T8983] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 190.214079][ T9042] bridge0: port 3(gretap0) entered blocking state [ 190.223881][ T9042] bridge0: port 3(gretap0) entered disabled state [ 190.242659][ T9042] device gretap0 entered promiscuous mode [ 190.250327][ T9042] bridge0: port 3(gretap0) entered blocking state [ 190.257030][ T9042] bridge0: port 3(gretap0) entered forwarding state [ 190.292404][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 190.305202][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 190.423690][ T8981] 8021q: adding VLAN 0 to HW filter on device batadv0 07:26:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x3}, 0x3c) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46600) io_setup(0x0, &(0x7f00000001c0)) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000640)="d4d647", 0x3, 0xfffffffffffffffc}]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), &(0x7f00000006c0)=0x4) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000380)='./file0\x00', 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r3 = add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$invalidate(0x15, r3) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, 0x0) keyctl$invalidate(0x15, r4) request_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={'syz', 0x1}, 0x0, 0xfffffffffffffffb) request_key(&(0x7f00000001c0)='\x02\x00\x00\x00\x00\x00\x00\x00ego\x00', &(0x7f00000004c0)={'\x00', 0x2}, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) mount$9p_xen(&(0x7f0000000200)='net/', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x80000, &(0x7f0000000600)={'trans=xen,', {[{@access_user='access=user'}, {@msize={'msize'}}, {@cache_fscache='cache=fscache'}], [{@audit='audit'}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)}], 0x1}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r5, 0x0, 0xe, 0x1000, &(0x7f0000000100)="a4dbae5a340ce56385b874bfe370", &(0x7f0000002040)=""/4096, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 07:26:45 executing program 4: 07:26:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x15, 0x10, 0x3}, 0x3c) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x46600) io_setup(0x0, &(0x7f00000001c0)) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000640)="d4d647", 0x3, 0xfffffffffffffffc}]) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f0000000680), &(0x7f00000006c0)=0x4) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000380)='./file0\x00', 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$revoke(0x3, r3) request_key(&(0x7f00000002c0)='.dead\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f00000003c0)='\x00', 0xfffffffffffffffb) socket$inet6(0xa, 0x2, 0x0) mount$9p_xen(&(0x7f0000000200)='net/', &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, &(0x7f0000000600)={'trans=xen,', {[{@access_user='access=user'}, {@msize={'msize'}}, {@cache_fscache='cache=fscache'}], [{@audit='audit'}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)}], 0x1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x270, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r4, 0x0, 0xe, 0x1000, &(0x7f0000000100)="a4dbae5a340ce56385b874bfe370", &(0x7f0000002040)=""/4096}, 0x28) 07:26:45 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000080)="1b0000001e0025eaa87865f51ef6580a000000000000f20182ab00", 0x289) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x6}, 0x28, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r1 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0xa6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = socket$kcm(0x11, 0xa, 0x300) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) fsetxattr$system_posix_acl(r3, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="020000000100eb8000000000020001", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ceead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c2650306152e474b", @ANYBLOB='\x00', @ANYRES32=0x0, @ANYRESHEX=r5, @ANYRESDEC=r7], 0x8, 0x1) r8 = socket(0xa, 0x3, 0x8) r9 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) sendmsg$key(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) 07:26:45 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000040)) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty}, @tcp={{0x0, 0x0, 0x42424242, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 07:26:45 executing program 5: 07:26:45 executing program 3: 07:26:45 executing program 4: 07:26:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffff9c, 0x0, 0xa01c0, 0x8) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 191.315632][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 191.321470][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 191.395538][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 191.401349][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:26:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x21}}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000080)={'syz1\x00', {}, 0x0, [0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) lsetxattr$trusted_overlay_nlink(&(0x7f0000000640)='./file1/file0\x00', &(0x7f00000006c0)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x70bd2b, 0x25dfdbfc, {}, ["", ""]}, 0x1c}}, 0x90) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000005c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f0000000600)=0x10) prctl$PR_GET_THP_DISABLE(0x2a) getsockname$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x75) bind(0xffffffffffffffff, &(0x7f0000000740)=@nfc={0x27, 0x0, 0x2, 0x5}, 0x80) 07:26:46 executing program 4: 07:26:46 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000080)="1b0000001e0025eaa87865f51ef6580a000000000000f20182ab00", 0x289) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x6}, 0x28, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r1 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0xa6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = socket$kcm(0x11, 0xa, 0x300) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) fsetxattr$system_posix_acl(r3, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="020000000100eb8000000000020001", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ceead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c2650306152e474b", @ANYBLOB='\x00', @ANYRES32=0x0, @ANYRESHEX=r5, @ANYRESDEC=r7], 0x8, 0x1) r8 = socket(0xa, 0x3, 0x8) r9 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) sendmsg$key(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) [ 191.558272][ T21] tipc: TX() has been purged, node left! [ 191.715552][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 191.721409][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:26:46 executing program 4: [ 191.955694][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 191.961585][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:26:46 executing program 4: [ 194.763685][ T9147] IPVS: ftp: loaded support on port[0] = 21 [ 194.838258][ T9147] chnl_net:caif_netlink_parms(): no params data found [ 194.870558][ T9147] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.878620][ T9147] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.887094][ T9147] device bridge_slave_0 entered promiscuous mode [ 194.899525][ T9147] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.906764][ T9147] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.914857][ T9147] device bridge_slave_1 entered promiscuous mode [ 194.947929][ T9147] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.960555][ T9147] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.062464][ T9147] team0: Port device team_slave_0 added [ 195.077613][ T9147] team0: Port device team_slave_1 added [ 195.079528][ T9150] IPVS: ftp: loaded support on port[0] = 21 [ 195.159070][ T9147] device hsr_slave_0 entered promiscuous mode [ 195.226602][ T9147] device hsr_slave_1 entered promiscuous mode [ 195.265646][ T9147] debugfs: Directory 'hsr0' with parent '/' already present! [ 195.368237][ T9147] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.375542][ T9147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.382824][ T9147] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.389933][ T9147] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.488288][ T9150] chnl_net:caif_netlink_parms(): no params data found [ 195.525244][ T9150] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.532758][ T9150] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.540661][ T9150] device bridge_slave_0 entered promiscuous mode [ 195.633841][ T9150] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.641310][ T9150] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.653283][ T9150] device bridge_slave_1 entered promiscuous mode [ 195.674013][ T9150] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 195.692390][ T9150] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.721953][ T9150] team0: Port device team_slave_0 added [ 195.730445][ T9150] team0: Port device team_slave_1 added [ 195.799401][ T9150] device hsr_slave_0 entered promiscuous mode [ 195.845812][ T9150] device hsr_slave_1 entered promiscuous mode [ 195.895641][ T9150] debugfs: Directory 'hsr0' with parent '/' already present! [ 195.905903][ T9147] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.913683][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.921660][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.932953][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 195.949208][ T21] device bridge_slave_1 left promiscuous mode [ 195.956084][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.998845][ T21] device bridge_slave_0 left promiscuous mode [ 196.005021][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.037080][ T21] device hsr_slave_0 left promiscuous mode [ 198.095785][ T21] device hsr_slave_1 left promiscuous mode [ 198.150409][ T21] team0 (unregistering): Port device team_slave_1 removed [ 198.166878][ T21] team0 (unregistering): Port device team_slave_0 removed [ 198.181397][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 198.230849][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 198.352367][ T21] bond0 (unregistering): Released all slaves [ 198.557319][ T9147] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.566339][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.574095][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.592724][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.601599][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.610727][ T2730] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.617855][ T2730] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.646865][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.657824][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.666333][ T9004] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.673397][ T9004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.681322][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.689934][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.706451][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.715220][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.724545][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.742188][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.751325][ T2730] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.771619][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.780949][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.802467][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.811348][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.821222][ T9147] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.834708][ T9150] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.860614][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.868908][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.883996][ T9150] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.898158][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.906848][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.915099][ T8987] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.922269][ T8987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.930285][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.938864][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.947672][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.964143][ T9147] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.986164][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.994792][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.012657][ T9031] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.019794][ T9031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.027653][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.036697][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.055710][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.064537][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.073833][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.083108][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.092261][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.112795][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.121467][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.135101][ T9150] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 199.147816][ T9150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.162505][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.171871][ T9031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.198121][ T9150] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.206938][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.214711][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.229214][ T9004] BUG: sleeping function called from invalid context at mm/page_alloc.c:4681 [ 199.239096][ T9004] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 9004, name: kworker/1:4 [ 199.248299][ T9004] 4 locks held by kworker/1:4/9004: [ 199.253508][ T9004] #0: ffff8880aa026d28 ((wq_completion)events){+.+.}, at: process_one_work+0x88b/0x1740 [ 199.263363][ T9004] #1: ffffc900026dfdc0 (pcpu_balance_work){+.+.}, at: process_one_work+0x8c1/0x1740 [ 199.272840][ T9004] #2: ffffffff89a3ff20 (pcpu_alloc_mutex){+.+.}, at: pcpu_balance_workfn+0xb7/0x1310 [ 199.282409][ T9004] #3: ffffffff89a51ad8 (vmap_area_lock){+.+.}, at: pcpu_get_vm_areas+0x3b27/0x3f00 [ 199.291780][ T9004] Preemption disabled at: [ 199.291789][ T9004] [] pcpu_get_vm_areas+0x3b27/0x3f00 [ 199.302934][ T9004] CPU: 1 PID: 9004 Comm: kworker/1:4 Not tainted 5.4.0-next-20191202-syzkaller #0 [ 199.312108][ T9004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.322173][ T9004] Workqueue: events pcpu_balance_workfn [ 199.327707][ T9004] Call Trace: [ 199.330977][ T9004] dump_stack+0x197/0x210 [ 199.335303][ T9004] ? pcpu_get_vm_areas+0x3b27/0x3f00 [ 199.340568][ T9004] ___might_sleep.cold+0x1fb/0x23e [ 199.345659][ T9004] __might_sleep+0x95/0x190 [ 199.350152][ T9004] __alloc_pages_nodemask+0x523/0x910 [ 199.355599][ T9004] ? __kasan_check_read+0x11/0x20 [ 199.360600][ T9004] ? __alloc_pages_slowpath+0x2900/0x2900 [ 199.366296][ T9004] ? kasan_populate_vmalloc_pte+0xfd/0x1c0 [ 199.372081][ T9004] ? __kasan_check_read+0x11/0x20 [ 199.377092][ T9004] ? __lock_acquire+0x16f2/0x4a00 [ 199.382097][ T9004] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 199.388316][ T9004] alloc_pages_current+0x107/0x210 [ 199.393413][ T9004] __get_free_pages+0xc/0x40 [ 199.397983][ T9004] kasan_populate_vmalloc_pte+0x2f/0x1c0 [ 199.403600][ T9004] apply_to_page_range+0x445/0x700 [ 199.408697][ T9004] ? memset+0x40/0x40 [ 199.412656][ T9004] kasan_populate_vmalloc+0x68/0x90 [ 199.417832][ T9004] pcpu_get_vm_areas+0x3c77/0x3f00 [ 199.422918][ T9004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.429145][ T9004] pcpu_create_chunk+0x24e/0x7f0 [ 199.434058][ T9004] pcpu_balance_workfn+0xf1b/0x1310 [ 199.439241][ T9004] ? __alloc_percpu+0x30/0x30 [ 199.443894][ T9004] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 199.449425][ T9004] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 199.455387][ T9004] ? trace_hardirqs_on+0x67/0x240 [ 199.460408][ T9004] process_one_work+0x9af/0x1740 [ 199.465333][ T9004] ? pwq_dec_nr_in_flight+0x320/0x320 [ 199.470678][ T9004] ? lock_acquire+0x190/0x410 [ 199.475336][ T9004] worker_thread+0x98/0xe40 [ 199.479827][ T9004] ? trace_hardirqs_on+0x67/0x240 [ 199.484831][ T9004] kthread+0x361/0x430 [ 199.488874][ T9004] ? process_one_work+0x1740/0x1740 [ 199.494048][ T9004] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 199.499748][ T9004] ret_from_fork+0x24/0x30 [ 199.635938][ C0] net_ratelimit: 2 callbacks suppressed [ 199.635947][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 199.647475][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:26:54 executing program 0: 07:26:54 executing program 3: 07:26:54 executing program 4: 07:26:54 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000080)="1b0000001e0025eaa87865f51ef6580a000000000000f20182ab00", 0x289) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x6}, 0x28, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) r1 = open(&(0x7f0000032ff8)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) pread64(r2, 0x0, 0x0, 0xa6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) r6 = socket$kcm(0x11, 0xa, 0x300) fcntl$getownex(r6, 0x10, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfef0) fsetxattr$system_posix_acl(r3, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="020000000100eb8000000000020001", @ANYRES32, @ANYRES32, @ANYBLOB="b8e365400357609aeb2c35eb6346b93ee6a8ccac064b28045fb5ccc42eb61c604bd9bc6f06af127321df7559522954af9fbdf181f025e9a65d7a17310597d62a318833df89a57e5b53778aa3e66844fc416fc7e2cee11b08996b374e80f611201000be976c77795ceead35bdcf1b23c88334501831ff741891ff83bd8103282caf9b66fa23cc7ad8ce987b956942c2650306152e474b", @ANYBLOB='\x00', @ANYRES32=0x0, @ANYRESHEX=r5, @ANYRESDEC=r7], 0x8, 0x1) r8 = socket(0xa, 0x3, 0x8) r9 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)}}, 0x20) sendmsg$key(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) 07:26:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffff9c, 0x0, 0xa01c0, 0x8) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 07:26:54 executing program 1: 07:26:54 executing program 4: 07:26:54 executing program 3: 07:26:54 executing program 1: 07:26:54 executing program 2: 07:26:54 executing program 4: [ 200.035576][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 200.041413][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:26:54 executing program 3: [ 200.275576][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 200.281401][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 200.577648][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 200.583668][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:26:55 executing program 0: 07:26:55 executing program 1: 07:26:55 executing program 4: 07:26:55 executing program 2: 07:26:55 executing program 5: 07:26:55 executing program 3: 07:26:55 executing program 4: 07:26:55 executing program 2: 07:26:55 executing program 1: 07:26:55 executing program 3: 07:26:55 executing program 4: 07:26:55 executing program 5: 07:26:55 executing program 0: 07:26:55 executing program 2: 07:26:55 executing program 1: 07:26:55 executing program 5: 07:26:55 executing program 2: 07:26:55 executing program 4: 07:26:55 executing program 3: 07:26:55 executing program 1: 07:26:56 executing program 5: 07:26:56 executing program 4: 07:26:56 executing program 2: 07:26:56 executing program 3: [ 203.010784][ T9242] IPVS: ftp: loaded support on port[0] = 21 [ 203.084606][ T9242] chnl_net:caif_netlink_parms(): no params data found [ 203.126634][ T9242] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.133772][ T9242] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.142371][ T9242] device bridge_slave_0 entered promiscuous mode [ 203.151932][ T9242] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.160995][ T9242] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.169095][ T9242] device bridge_slave_1 entered promiscuous mode [ 203.191474][ T9242] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 203.204594][ T9242] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 203.229245][ T9242] team0: Port device team_slave_0 added [ 203.237559][ T9242] team0: Port device team_slave_1 added [ 203.277928][ T9242] device hsr_slave_0 entered promiscuous mode [ 203.328547][ T9242] device hsr_slave_1 entered promiscuous mode [ 203.382538][ T9242] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.389649][ T9242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.397039][ T9242] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.404111][ T9242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.458314][ T9242] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.472068][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 203.482237][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.490970][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 203.499815][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 203.516346][ T9242] 8021q: adding VLAN 0 to HW filter on device team0 [ 203.528588][ T8987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 203.537966][ T8987] bridge0: port 1(bridge_slave_0) entered blocking state [ 203.545019][ T8987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 203.564775][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 203.573592][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 203.580697][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 203.598403][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 203.607179][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 203.621600][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 203.634467][ T9004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 203.650999][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 203.663787][ T9242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 203.688624][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 203.697459][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 203.713849][ T9242] 8021q: adding VLAN 0 to HW filter on device batadv0 07:26:58 executing program 0: 07:26:58 executing program 1: 07:26:58 executing program 5: 07:26:58 executing program 2: 07:26:58 executing program 4: 07:26:58 executing program 3: 07:26:58 executing program 5: 07:26:58 executing program 2: 07:26:58 executing program 1: 07:26:58 executing program 3: 07:26:58 executing program 4: 07:26:58 executing program 0: 07:26:58 executing program 5: 07:26:58 executing program 3: 07:26:58 executing program 4: 07:26:58 executing program 2: 07:26:58 executing program 5: 07:26:58 executing program 1: 07:26:58 executing program 0: 07:26:58 executing program 4: 07:26:58 executing program 3: 07:26:58 executing program 2: 07:26:59 executing program 5: 07:26:59 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r1) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r2, r3}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f0000000580)={'crct10dif\x00'}}) 07:26:59 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, &(0x7f0000000080)) 07:26:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0xc, r1, 0x0, 0x80000000000}) 07:26:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f36460234432479aed75d492b41fd983f79e65199615607672c59957ab364bf68e6faa53367f05f4ad61421349f2f11e931e7d62ead5e7cd2157df6b2bcb47fb53455560c8ef00fca4fafa924edfe92175aaa1c4ecc7aeeb72e0d050feace34b52d9e5f755563698c7e24ab61f0866f", 0x9c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 07:26:59 executing program 2: sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000940)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 07:26:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0x175d900f) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000100)=[@assoc], 0x17}], 0x4924924924924f9, 0x0) 07:26:59 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$packet(0x11, 0x3, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="bf16000000000000b70700000100e0ff50700000000000007f0000000000000095000000000000007ae9413df864c78baf332a2ead6507c9fe0af86bf5aa35339f099ed2cba2fe4f6e303fb1e98e21754b382c32af9db6fa7a9b857b7aabaca1d0fb2b20f502374400000000000000000000000000000000acdfbc94fa042f456af4a3334fda60862d07543b6a61ec7f997eaeb9"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') [ 204.790526][ T9308] fuse: Bad value for 'fd' [ 204.815714][ T9316] fuse: Bad value for 'fd' 07:26:59 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000000)) 07:26:59 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x801, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x2006d3d6) 07:26:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x9, &(0x7f0000000240)='ip6_vti0\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=':/nodevwlan1ppp1\xcclo\x02\x00') sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x50}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r3, 0x0, 0x9, &(0x7f0000000240)='ip6_vti0\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r3}) perf_event_open$cgroup(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000047c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 07:26:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000180)={&(0x7f0000000580)={'crct10dif\x00'}}) 07:26:59 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) accept$unix(r3, &(0x7f0000000340)=@abs, &(0x7f0000000140)=0x6e) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) rmdir(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x8085683249dba1f2, 0x1a1) syz_open_pts(0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) write$binfmt_script(r4, &(0x7f00000004c0)=ANY=[], 0x190) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x11, 0xffffffffffffffff, 0x0) linkat(r4, &(0x7f0000000300)='./file0\x00', r3, 0x0, 0x400) preadv(0xffffffffffffffff, &(0x7f0000002880)=[{&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000001480)=""/114, 0x72}, {&(0x7f0000001780)=""/217, 0xbf}, {&(0x7f00000015c0)=""/83, 0xfffffffffffffc89}], 0x4, 0x101) dup(0xffffffffffffffff) 07:26:59 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10125) write$binfmt_elf32(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020003000000000000000000380000000000000000000000000020"], 0x2b) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 07:26:59 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000001e000503ed0080637e6394f20500d2000500fcb711407f480a0006000300000002000000f88000f01700", 0x2e}], 0x1}, 0x0) 07:26:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x9, &(0x7f0000000240)='ip6_vti0\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)=':/nodevwlan1ppp1\xcclo\x02\x00') sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x50}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r3, 0x0, 0x9, &(0x7f0000000240)='ip6_vti0\x00'}, 0x30) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r3}) perf_event_open$cgroup(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xf, 0x3, 0x2, &(0x7f00000047c0)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 205.496138][ T2605] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 205.509712][ T9357] F2FS-fs (loop2): Unable to read 1th superblock [ 205.516905][ T2605] blk_update_request: I/O error, dev loop2, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 205.528133][ T9357] F2FS-fs (loop2): Unable to read 2th superblock 07:27:02 executing program 3: unshare(0x6c060000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00\x00\x00\x00\x00\x05\x00', 0x4001}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000700)='dctcp\x00', 0x6) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x5, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbb24fec2fba09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x3e8}, 0x100) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00', 0x0, 0x4}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={r2, &(0x7f0000000380)="0ef4e18aa76f87ea18e260fa485d4921c2c7fec44d44222b34bd12ab909ad4678181c3c93be4529ab6c297b2b32171a4a968231da3545a237dbdf32091a2d756ce5ac831aab670a01430f4a046f3c45848b444a0b8f2b4376ffb1aecaacefde705b4ec8936c2ea4cffcd2dcb70fc97f910315ea911cb5fd93a8c63e693d130ad3131a8d36c29cca27266a1c6ee3947747761b02916106c225ca275c20fc805a07304fdc232974cbc1caaa6555d7e452008bf653a838e7dcbb27548e2d5491d6090b8b515df", &(0x7f0000000480)="a4915430e51a83a935505d6f6a01b9c0e791ae75d4de8f520aaceec3686105e43dc5e8c3360e004113989d0482980565a8639afaedd6719ea898f71245c76c335e51c5b69fcdeb994206ac72219139fc6abc094d4a06008b687de96f"}, 0x20) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 07:27:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f0000000140)="430f2291b9000a00000f32b9800000c00f3235001000000f308f297812c5c402650a584bb9ef0800000f322ef326f30f001066baf80cb85857a78eef66bafc0ced0fc77700", 0x1f2}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:27:02 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10125) write$binfmt_elf32(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020003000000000000000000380000000000000000000000000020"], 0x2b) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 07:27:02 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) accept$unix(r3, &(0x7f0000000340)=@abs, &(0x7f0000000140)=0x6e) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) rmdir(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x8085683249dba1f2, 0x1a1) syz_open_pts(0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x200000000011, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) write$binfmt_script(r4, &(0x7f00000004c0)=ANY=[], 0x190) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x11, 0xffffffffffffffff, 0x0) linkat(r4, &(0x7f0000000300)='./file0\x00', r3, 0x0, 0x400) preadv(0xffffffffffffffff, &(0x7f0000002880)=[{&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000001480)=""/114, 0x72}, {&(0x7f0000001780)=""/217, 0xbf}, {&(0x7f00000015c0)=""/83, 0xfffffffffffffc89}], 0x4, 0x101) dup(0xffffffffffffffff) 07:27:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4048ae9b, &(0x7f0000000000)=ANY=[@ANYBLOB="073c5fbafd96fce1ee9dcff4b8392c31"]) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 07:27:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f00000000c0)='./file0\x00') r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000500)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) syz_mount_image$vfat(0x0, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 207.777736][ T9375] overlayfs: conflicting lowerdir path 07:27:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fb], 0x0, 0x205211}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x0, 0x0, @pic={0x0, 0x8a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 207.970377][ T9382] IPVS: ftp: loaded support on port[0] = 21 07:27:02 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x10125) write$binfmt_elf32(r0, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46000000000000000000000000020003000000000000000000380000000000000000000000000020"], 0x2b) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 208.031539][ T9401] overlayfs: conflicting lowerdir path [ 208.070742][ T9376] kvm: emulating exchange as write 07:27:02 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002400)=""/4096, 0x10b6}], 0x1) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) 07:27:02 executing program 4: r0 = socket(0x22, 0x2, 0x4) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, 0x0, 0x0) 07:27:02 executing program 5: ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x0, 0x0, 0x0) r1 = epoll_create(0x2000000000000006) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) 07:27:03 executing program 1: r0 = getpgid(0x0) capset(&(0x7f0000000100)={0x19980330, r0}, 0x0) [ 208.436722][ T21] tipc: TX() has been purged, node left! [ 208.471482][ T21] tipc: TX() has been purged, node left! [ 208.646440][ T9450] capability: warning: `syz-executor.1' uses 32-bit capabilities (legacy support in use) [ 208.866813][ T9451] IPVS: ftp: loaded support on port[0] = 21